{"url":"http://public2.vulnerablecode.io/api/packages/943299?format=json","purl":"pkg:deb/debian/xen@4.8.0~rc3-1?distro=trixie","type":"deb","namespace":"debian","name":"xen","version":"4.8.0~rc3-1","qualifiers":{"distro":"trixie"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"4.8.0-1","latest_non_vulnerable_version":"4.20.2+7-g1badcf5035-1","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4044?format=json","vulnerability_id":"VCID-12wz-93wy-euhs","summary":"libxl leak of pv kernel and initrd on error","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8341.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8341.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8341","reference_id":"","reference_type":"","scores":[{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67755","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67697","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.6751","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67547","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67568","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67546","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67598","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67611","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67634","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.6762","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67588","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67622","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67613","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67632","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67643","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67645","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67621","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67664","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67701","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67672","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8341"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8339","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8339"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8340","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8340"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8341","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8341"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8555","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8555"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1570","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1570"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1571","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1571"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2270","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2270"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2271","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2271"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv2","scoring_elements":"AV:A/AC:L/Au:S/C:N/I:N/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.debian.org/security/2016/dsa-3519","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3519"},{"reference_url":"http://www.securitytracker.com/id/1034389","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034389"},{"reference_url":"http://xenbits.xen.org/xsa/advisory-160.html","reference_id":"","reference_type":"","scores":[],"url":"http://xenbits.xen.org/xsa/advisory-160.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1284933","reference_id":"1284933","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1284933"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823620","reference_id":"823620","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823620"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.1.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.2.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.2.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8341","reference_id":"CVE-2015-8341","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8341"},{"reference_url":"https://security.gentoo.org/glsa/201604-03","reference_id":"GLSA-201604-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201604-03"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-160.html","reference_id":"XSA-160","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-160.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943299?format=json","purl":"pkg:deb/debian/xen@4.8.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.8.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943265?format=json","purl":"pkg:deb/debian/xen@4.14.6-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943263?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943267?format=json","purl":"pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943266?format=json","purl":"pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-1%3Fdistro=trixie"}],"aliases":["CVE-2015-8341"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-12wz-93wy-euhs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4043?format=json","vulnerability_id":"VCID-1ewg-kc47-bucs","summary":"XENMEM_exchange error handling issues","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8340.json","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8340.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8340","reference_id":"","reference_type":"","scores":[{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22096","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.2225","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22296","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.2208","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22161","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22216","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22236","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22196","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22135","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22134","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22129","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22084","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21944","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21931","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21918","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21827","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.219","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21977","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21947","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21971","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22052","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8340"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8339","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8339"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8340","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8340"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8341","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8341"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8555","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8555"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1570","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1570"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1571","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1571"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2270","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2270"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2271","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2271"},{"reference_url":"http://support.citrix.com/article/CTX203451","reference_id":"","reference_type":"","scores":[],"url":"http://support.citrix.com/article/CTX203451"},{"reference_url":"http://www.debian.org/security/2016/dsa-3519","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3519"},{"reference_url":"http://www.securityfocus.com/bid/79038","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/79038"},{"reference_url":"http://www.securitytracker.com/id/1034391","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034391"},{"reference_url":"http://xenbits.xen.org/xsa/advisory-159.html","reference_id":"","reference_type":"","scores":[],"url":"http://xenbits.xen.org/xsa/advisory-159.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1284919","reference_id":"1284919","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1284919"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823620","reference_id":"823620","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823620"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.1.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.2.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.2.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8340","reference_id":"CVE-2015-8340","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:N/I:N/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8340"},{"reference_url":"https://security.gentoo.org/glsa/201604-03","reference_id":"GLSA-201604-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201604-03"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-159.html","reference_id":"XSA-159","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-159.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943299?format=json","purl":"pkg:deb/debian/xen@4.8.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.8.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943265?format=json","purl":"pkg:deb/debian/xen@4.14.6-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943263?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943267?format=json","purl":"pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943266?format=json","purl":"pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-1%3Fdistro=trixie"}],"aliases":["CVE-2015-8340"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1ewg-kc47-bucs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4038?format=json","vulnerability_id":"VCID-2h35-vvte-g7cs","summary":"x86: CPU lockup during exception delivery","references":[{"reference_url":"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cbdb967af3d54993f5814f1cee0ed311a055377d","reference_id":"","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/"}],"url":"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cbdb967af3d54993f5814f1cee0ed311a055377d"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172187.html","reference_id":"","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/"}],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172187.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172300.html","reference_id":"","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/"}],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172300.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172435.html","reference_id":"","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/"}],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172435.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html","reference_id":"","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html","reference_id":"","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html","reference_id":"","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html","reference_id":"","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html","reference_id":"","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html","reference_id":"","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html","reference_id":"","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html","reference_id":"","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/"}],"url":"http://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2015-12/msg00053.html","reference_id":"","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/"}],"url":"http://lists.opensuse.org/opensuse-updates/2015-12/msg00053.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2636.html","reference_id":"","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2015-2636.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2645.html","reference_id":"","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2015-2645.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0046.html","reference_id":"","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-0046.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8104.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8104.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8104","reference_id":"","reference_type":"","scores":[{"value":"0.00298","scoring_system":"epss","scoring_elements":"0.53208","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00298","scoring_system":"epss","scoring_elements":"0.53175","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00298","scoring_system":"epss","scoring_elements":"0.53201","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55511","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55622","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55647","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55625","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55677","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.5568","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55689","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55669","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55651","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.5569","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55693","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55673","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55599","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55616","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55592","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55539","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55586","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00336","scoring_system":"epss","scoring_elements":"0.56512","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8104"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7446","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7446"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3259","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3259"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3340","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3340"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5307","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5307"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6654","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6654"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7311","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7311"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7799","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7799"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7812","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7812"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7813","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7813"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7814","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7814"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7833","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7833"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7969","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7969"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7970","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7970"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7971","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7971"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7972","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7972"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8104","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8104"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0495","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0495"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0592","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0592"},{"reference_url":"https://github.com/torvalds/linux/commit/cbdb967af3d54993f5814f1cee0ed311a055377d","reference_id":"","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/"}],"url":"https://github.com/torvalds/linux/commit/cbdb967af3d54993f5814f1cee0ed311a055377d"},{"reference_url":"https://kb.juniper.net/JSA10783","reference_id":"","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/"}],"url":"https://kb.juniper.net/JSA10783"},{"reference_url":"http://support.citrix.com/article/CTX202583","reference_id":"","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/"}],"url":"http://support.citrix.com/article/CTX202583"},{"reference_url":"http://support.citrix.com/article/CTX203879","reference_id":"","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/"}],"url":"http://support.citrix.com/article/CTX203879"},{"reference_url":"http://www.debian.org/security/2015/dsa-3414","reference_id":"","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/"}],"url":"http://www.debian.org/security/2015/dsa-3414"},{"reference_url":"http://www.debian.org/security/2015/dsa-3426","reference_id":"","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/"}],"url":"http://www.debian.org/security/2015/dsa-3426"},{"reference_url":"http://www.debian.org/security/2016/dsa-3454","reference_id":"","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/"}],"url":"http://www.debian.org/security/2016/dsa-3454"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/11/10/5","reference_id":"","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/"}],"url":"http://www.openwall.com/lists/oss-security/2015/11/10/5"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/10/10/4","reference_id":"","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/10/10/4"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html","reference_id":"","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html","reference_id":"","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/"}],"url":"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html","reference_id":"","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/"}],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html","reference_id":"","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/"}],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html","reference_id":"","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/"}],"url":"http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"},{"reference_url":"http://www.securityfocus.com/bid/77524","reference_id":"","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/"}],"url":"http://www.securityfocus.com/bid/77524"},{"reference_url":"http://www.securityfocus.com/bid/91787","reference_id":"","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/"}],"url":"http://www.securityfocus.com/bid/91787"},{"reference_url":"http://www.securitytracker.com/id/1034105","reference_id":"","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/"}],"url":"http://www.securitytracker.com/id/1034105"},{"reference_url":"http://www.ubuntu.com/usn/USN-2840-1","reference_id":"","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/"}],"url":"http://www.ubuntu.com/usn/USN-2840-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2841-1","reference_id":"","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/"}],"url":"http://www.ubuntu.com/usn/USN-2841-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2841-2","reference_id":"","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/"}],"url":"http://www.ubuntu.com/usn/USN-2841-2"},{"reference_url":"http://www.ubuntu.com/usn/USN-2842-1","reference_id":"","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/"}],"url":"http://www.ubuntu.com/usn/USN-2842-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2842-2","reference_id":"","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/"}],"url":"http://www.ubuntu.com/usn/USN-2842-2"},{"reference_url":"http://www.ubuntu.com/usn/USN-2843-1","reference_id":"","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/"}],"url":"http://www.ubuntu.com/usn/USN-2843-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2843-2","reference_id":"","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/"}],"url":"http://www.ubuntu.com/usn/USN-2843-2"},{"reference_url":"http://www.ubuntu.com/usn/USN-2844-1","reference_id":"","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/"}],"url":"http://www.ubuntu.com/usn/USN-2844-1"},{"reference_url":"http://xenbits.xen.org/xsa/advisory-156.html","reference_id":"","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/"}],"url":"http://xenbits.xen.org/xsa/advisory-156.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1278496","reference_id":"1278496","reference_type":"","scores":[{"value":"10","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1278496"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823620","reference_id":"823620","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823620"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.6.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8104","reference_id":"CVE-2015-8104","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:N/I:N/A:C"},{"value":"10.0","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8104"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2552","reference_id":"RHSA-2015:2552","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2552"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2636","reference_id":"RHSA-2015:2636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2645","reference_id":"RHSA-2015:2645","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2645"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0004","reference_id":"RHSA-2016:0004","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0004"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0024","reference_id":"RHSA-2016:0024","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0024"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0046","reference_id":"RHSA-2016:0046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0103","reference_id":"RHSA-2016:0103","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0103"},{"reference_url":"https://usn.ubuntu.com/2840-1/","reference_id":"USN-2840-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2840-1/"},{"reference_url":"https://usn.ubuntu.com/2841-1/","reference_id":"USN-2841-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2841-1/"},{"reference_url":"https://usn.ubuntu.com/2841-2/","reference_id":"USN-2841-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2841-2/"},{"reference_url":"https://usn.ubuntu.com/2842-1/","reference_id":"USN-2842-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2842-1/"},{"reference_url":"https://usn.ubuntu.com/2842-2/","reference_id":"USN-2842-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2842-2/"},{"reference_url":"https://usn.ubuntu.com/2843-1/","reference_id":"USN-2843-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2843-1/"},{"reference_url":"https://usn.ubuntu.com/2843-2/","reference_id":"USN-2843-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2843-2/"},{"reference_url":"https://usn.ubuntu.com/2844-1/","reference_id":"USN-2844-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2844-1/"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-156.html","reference_id":"XSA-156","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-156.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943299?format=json","purl":"pkg:deb/debian/xen@4.8.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.8.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943265?format=json","purl":"pkg:deb/debian/xen@4.14.6-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943263?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943267?format=json","purl":"pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943266?format=json","purl":"pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-1%3Fdistro=trixie"}],"aliases":["CVE-2015-8104"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2h35-vvte-g7cs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4063?format=json","vulnerability_id":"VCID-49x7-nf2n-4ya6","summary":"arm: Host crash caused by VMID exhaustion","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5242.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5242.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5242","reference_id":"","reference_type":"","scores":[{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33253","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33173","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.3349","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33645","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33679","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33518","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33562","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33596","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.3359","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33548","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33524","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33559","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33536","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33502","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33342","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33323","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33241","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33129","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33196","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33236","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33147","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5242"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8338","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8338"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4962","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4962"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5242","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5242"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6258","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6258"},{"reference_url":"http://www.debian.org/security/2016/dsa-3633","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3633"},{"reference_url":"http://www.securityfocus.com/bid/91015","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/91015"},{"reference_url":"http://www.securitytracker.com/id/1036035","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1036035"},{"reference_url":"http://xenbits.xen.org/xsa/advisory-181.html","reference_id":"","reference_type":"","scores":[],"url":"http://xenbits.xen.org/xsa/advisory-181.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1342529","reference_id":"1342529","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1342529"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.4.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.4.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.5.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5242","reference_id":"CVE-2016-5242","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:N/I:N/A:C"},{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5242"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-181.html","reference_id":"XSA-181","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-181.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943299?format=json","purl":"pkg:deb/debian/xen@4.8.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.8.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943265?format=json","purl":"pkg:deb/debian/xen@4.14.6-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943263?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943267?format=json","purl":"pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943266?format=json","purl":"pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-1%3Fdistro=trixie"}],"aliases":["CVE-2016-5242"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-49x7-nf2n-4ya6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4049?format=json","vulnerability_id":"VCID-5gab-898z-v7h5","summary":"VMX: intercept issue with INVLPG on non-canonical address","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1571.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1571.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1571","reference_id":"","reference_type":"","scores":[{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.53093","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.53021","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.52946","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.52971","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.52995","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.52963","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.53013","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.53007","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.53056","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.53041","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.53024","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.53062","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.53069","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.53051","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.53017","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.53026","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.52986","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.52937","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.52988","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.53029","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1571"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8339","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8339"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8340","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8340"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8341","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8341"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8555","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8555"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1570","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1570"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1571","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1571"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2270","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2270"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2271","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2271"},{"reference_url":"http://support.citrix.com/article/CTX205496","reference_id":"","reference_type":"","scores":[],"url":"http://support.citrix.com/article/CTX205496"},{"reference_url":"http://www.debian.org/security/2016/dsa-3519","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3519"},{"reference_url":"http://www.securitytracker.com/id/1034745","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034745"},{"reference_url":"http://xenbits.xen.org/xsa/advisory-168.html","reference_id":"","reference_type":"","scores":[],"url":"http://xenbits.xen.org/xsa/advisory-168.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1296544","reference_id":"1296544","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1296544"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823620","reference_id":"823620","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823620"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:*:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:citrix:xenserver:*:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:*:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.1.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.2.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.2.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.4.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1571","reference_id":"CVE-2016-1571","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:N/I:N/A:C"},{"value":"6.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1571"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-168.html","reference_id":"XSA-168","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-168.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943299?format=json","purl":"pkg:deb/debian/xen@4.8.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.8.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943265?format=json","purl":"pkg:deb/debian/xen@4.14.6-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943263?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943267?format=json","purl":"pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943266?format=json","purl":"pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-1%3Fdistro=trixie"}],"aliases":["CVE-2016-1571"],"risk_score":2.9,"exploitability":"0.5","weighted_severity":"5.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5gab-898z-v7h5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4048?format=json","vulnerability_id":"VCID-7gba-36c6-r7em","summary":"PV superpage functionality missing sanity checks","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1570.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1570.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1570","reference_id":"","reference_type":"","scores":[{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42358","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42291","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42501","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42571","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42599","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42537","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42589","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42622","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42584","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42556","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42615","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42601","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42535","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42472","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42389","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42248","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42323","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42342","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42263","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1570"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8339","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8339"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8340","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8340"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8341","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8341"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8555","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8555"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1570","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1570"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1571","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1571"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2270","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2270"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2271","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2271"},{"reference_url":"http://www.debian.org/security/2016/dsa-3519","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3519"},{"reference_url":"http://www.securitytracker.com/id/1034744","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034744"},{"reference_url":"http://xenbits.xen.org/xsa/advisory-167.html","reference_id":"","reference_type":"","scores":[],"url":"http://xenbits.xen.org/xsa/advisory-167.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1296539","reference_id":"1296539","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1296539"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823620","reference_id":"823620","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823620"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.1.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.2.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.2.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.4.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1570","reference_id":"CVE-2016-1570","reference_type":"","scores":[{"value":"6.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:C/I:C/A:C"},{"value":"8.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1570"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-167.html","reference_id":"XSA-167","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-167.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943299?format=json","purl":"pkg:deb/debian/xen@4.8.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.8.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943265?format=json","purl":"pkg:deb/debian/xen@4.14.6-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943263?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943267?format=json","purl":"pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943266?format=json","purl":"pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-1%3Fdistro=trixie"}],"aliases":["CVE-2016-1570"],"risk_score":3.9,"exploitability":"0.5","weighted_severity":"7.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7gba-36c6-r7em"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4042?format=json","vulnerability_id":"VCID-83pg-u792-vkht","summary":"XENMEM_exchange error handling issues","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8339.json","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8339.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8339","reference_id":"","reference_type":"","scores":[{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26789","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26832","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26872","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26658","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26726","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26776","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.2678","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26735","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26679","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26687","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26619","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26562","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26555","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26482","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26348","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26417","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26473","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26401","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26418","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26498","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8339"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8339","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8339"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8340","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8340"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8341","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8341"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8555","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8555"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1570","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1570"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1571","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1571"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2270","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2270"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2271","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2271"},{"reference_url":"http://support.citrix.com/article/CTX203451","reference_id":"","reference_type":"","scores":[],"url":"http://support.citrix.com/article/CTX203451"},{"reference_url":"http://www.debian.org/security/2016/dsa-3519","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3519"},{"reference_url":"http://www.securityfocus.com/bid/79038","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/79038"},{"reference_url":"http://www.securitytracker.com/id/1034391","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034391"},{"reference_url":"http://xenbits.xen.org/xsa/advisory-159.html","reference_id":"","reference_type":"","scores":[],"url":"http://xenbits.xen.org/xsa/advisory-159.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1284919","reference_id":"1284919","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1284919"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823620","reference_id":"823620","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823620"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.1.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.2.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.2.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8339","reference_id":"CVE-2015-8339","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:N/I:N/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8339"},{"reference_url":"https://security.gentoo.org/glsa/201604-03","reference_id":"GLSA-201604-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201604-03"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-159.html","reference_id":"XSA-159","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-159.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943299?format=json","purl":"pkg:deb/debian/xen@4.8.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.8.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943265?format=json","purl":"pkg:deb/debian/xen@4.14.6-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943263?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943267?format=json","purl":"pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943266?format=json","purl":"pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-1%3Fdistro=trixie"}],"aliases":["CVE-2015-8339"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-83pg-u792-vkht"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4059?format=json","vulnerability_id":"VCID-8xdy-x7d6-43hk","summary":"Unsanitised driver domain input in libxl device handling","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4963.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4963.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-4963","reference_id":"","reference_type":"","scores":[{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14589","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.1447","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14507","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14523","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14585","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14655","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14464","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14552","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14606","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14514","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14457","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.1435","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14348","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14417","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14445","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14419","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14364","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14227","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14377","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-4963"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4963","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4963"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"1.5","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:S/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/09/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2018/09/msg00006.html"},{"reference_url":"http://www.securitytracker.com/id/1036024","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1036024"},{"reference_url":"http://xenbits.xen.org/xsa/advisory-178.html","reference_id":"","reference_type":"","scores":[],"url":"http://xenbits.xen.org/xsa/advisory-178.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1335442","reference_id":"1335442","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1335442"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.1.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.2.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.2.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.4.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.4.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.5.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4963","reference_id":"CVE-2016-4963","reference_type":"","scores":[{"value":"1.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:N/I:N/A:P"},{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4963"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-178.html","reference_id":"XSA-178","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-178.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943299?format=json","purl":"pkg:deb/debian/xen@4.8.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.8.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943265?format=json","purl":"pkg:deb/debian/xen@4.14.6-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943263?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943267?format=json","purl":"pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943266?format=json","purl":"pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-1%3Fdistro=trixie"}],"aliases":["CVE-2016-4963"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8xdy-x7d6-43hk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4051?format=json","vulnerability_id":"VCID-9yb3-ge9b-sbe1","summary":"VMX: guest user mode may crash guest with non-canonical RIP","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177990.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177990.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178518.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178518.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2271.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2271.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2271","reference_id":"","reference_type":"","scores":[{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20433","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20346","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.2048","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20625","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20684","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20412","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20494","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20553","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20575","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20531","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20475","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20466","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20465","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20463","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20339","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20334","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.203","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20204","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20277","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20363","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20328","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2271"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8339","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8339"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8340","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8340"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8341","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8341"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8555","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8555"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1570","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1570"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1571","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1571"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2270","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2270"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2271","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2271"},{"reference_url":"http://support.citrix.com/article/CTX209443","reference_id":"","reference_type":"","scores":[],"url":"http://support.citrix.com/article/CTX209443"},{"reference_url":"http://www.debian.org/security/2016/dsa-3519","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3519"},{"reference_url":"http://www.securitytracker.com/id/1035043","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1035043"},{"reference_url":"http://xenbits.xen.org/xsa/advisory-170.html","reference_id":"","reference_type":"","scores":[],"url":"http://xenbits.xen.org/xsa/advisory-170.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1304628","reference_id":"1304628","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1304628"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823620","reference_id":"823620","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823620"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-2271","reference_id":"CVE-2016-2271","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:P"},{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-2271"},{"reference_url":"https://security.gentoo.org/glsa/201604-03","reference_id":"GLSA-201604-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201604-03"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-170.html","reference_id":"XSA-170","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-170.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943299?format=json","purl":"pkg:deb/debian/xen@4.8.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.8.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943265?format=json","purl":"pkg:deb/debian/xen@4.14.6-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943263?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943267?format=json","purl":"pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943266?format=json","purl":"pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-1%3Fdistro=trixie"}],"aliases":["CVE-2016-2271"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9yb3-ge9b-sbe1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4047?format=json","vulnerability_id":"VCID-au4w-wt7d-37h4","summary":"information leak in legacy x86 FPU/XMM initialization","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8555.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8555.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8555","reference_id":"","reference_type":"","scores":[{"value":"0.00551","scoring_system":"epss","scoring_elements":"0.6819","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00551","scoring_system":"epss","scoring_elements":"0.68133","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00551","scoring_system":"epss","scoring_elements":"0.67932","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00551","scoring_system":"epss","scoring_elements":"0.67954","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00551","scoring_system":"epss","scoring_elements":"0.67973","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00551","scoring_system":"epss","scoring_elements":"0.67952","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00551","scoring_system":"epss","scoring_elements":"0.68003","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00551","scoring_system":"epss","scoring_elements":"0.68017","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00551","scoring_system":"epss","scoring_elements":"0.6804","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00551","scoring_system":"epss","scoring_elements":"0.68026","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00551","scoring_system":"epss","scoring_elements":"0.67992","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00551","scoring_system":"epss","scoring_elements":"0.68029","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00551","scoring_system":"epss","scoring_elements":"0.68042","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00551","scoring_system":"epss","scoring_elements":"0.68025","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00551","scoring_system":"epss","scoring_elements":"0.68067","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00551","scoring_system":"epss","scoring_elements":"0.68076","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00551","scoring_system":"epss","scoring_elements":"0.68082","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00551","scoring_system":"epss","scoring_elements":"0.68056","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00551","scoring_system":"epss","scoring_elements":"0.68097","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00551","scoring_system":"epss","scoring_elements":"0.6814","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00551","scoring_system":"epss","scoring_elements":"0.68107","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8555"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8339","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8339"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8340","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8340"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8341","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8341"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8555","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8555"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1570","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1570"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1571","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1571"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2270","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2270"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2271","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2271"},{"reference_url":"http://support.citrix.com/article/CTX203879","reference_id":"","reference_type":"","scores":[],"url":"http://support.citrix.com/article/CTX203879"},{"reference_url":"http://www.debian.org/security/2016/dsa-3519","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3519"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"},{"reference_url":"http://www.securityfocus.com/bid/79543","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/79543"},{"reference_url":"http://www.securitytracker.com/id/1034477","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034477"},{"reference_url":"http://xenbits.xen.org/xsa/advisory-165.html","reference_id":"","reference_type":"","scores":[],"url":"http://xenbits.xen.org/xsa/advisory-165.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1289130","reference_id":"1289130","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1289130"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823620","reference_id":"823620","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823620"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:citrix:xenserver:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.4.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.5.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8555","reference_id":"CVE-2015-8555","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:N"},{"value":"8.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8555"},{"reference_url":"https://security.gentoo.org/glsa/201604-03","reference_id":"GLSA-201604-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201604-03"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-165.html","reference_id":"XSA-165","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-165.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943299?format=json","purl":"pkg:deb/debian/xen@4.8.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.8.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943265?format=json","purl":"pkg:deb/debian/xen@4.14.6-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943263?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943267?format=json","purl":"pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943266?format=json","purl":"pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-1%3Fdistro=trixie"}],"aliases":["CVE-2015-8555"],"risk_score":3.9,"exploitability":"0.5","weighted_severity":"7.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-au4w-wt7d-37h4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4037?format=json","vulnerability_id":"VCID-dc9p-tdf1-h7ad","summary":"x86: CPU lockup during exception delivery","references":[{"reference_url":"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=54a20552e1eae07aa240fa370a0293e006b5faed","reference_id":"","reference_type":"","scores":[],"url":"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=54a20552e1eae07aa240fa370a0293e006b5faed"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172187.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172187.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172300.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172300.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172435.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172435.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2015-12/msg00053.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2015-12/msg00053.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2636.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2636.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2645.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2645.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0046.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0046.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5307.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5307.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5307","reference_id":"","reference_type":"","scores":[{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26293","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26337","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26692","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26738","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.2678","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26563","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26631","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26682","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26686","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26642","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26583","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.2659","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26524","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26465","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26459","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.264","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26267","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26336","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26392","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26321","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5307"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3259","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3259"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3340","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3340"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5307","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5307"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6654","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6654"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7311","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7311"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7812","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7812"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7813","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7813"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7814","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7814"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7833","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7833"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7872","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7872"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7969","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7969"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7970","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7970"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7971","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7971"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7972","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7972"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7990","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7990"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8104","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8104"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0495","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0495"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0592","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0592"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:N/I:N/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/torvalds/linux/commit/54a20552e1eae07aa240fa370a0293e006b5faed","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/torvalds/linux/commit/54a20552e1eae07aa240fa370a0293e006b5faed"},{"reference_url":"https://kb.juniper.net/JSA10783","reference_id":"","reference_type":"","scores":[],"url":"https://kb.juniper.net/JSA10783"},{"reference_url":"http://support.citrix.com/article/CTX202583","reference_id":"","reference_type":"","scores":[],"url":"http://support.citrix.com/article/CTX202583"},{"reference_url":"http://www.debian.org/security/2015/dsa-3396","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3396"},{"reference_url":"http://www.debian.org/security/2015/dsa-3414","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3414"},{"reference_url":"http://www.debian.org/security/2016/dsa-3454","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3454"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/11/10/6","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/11/10/6"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"},{"reference_url":"http://www.securityfocus.com/bid/77528","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/77528"},{"reference_url":"http://www.securitytracker.com/id/1034105","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034105"},{"reference_url":"http://www.ubuntu.com/usn/USN-2800-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2800-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2801-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2801-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2802-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2802-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2803-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2803-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2804-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2804-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2805-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2805-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2806-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2806-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2807-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2807-1"},{"reference_url":"http://xenbits.xen.org/xsa/advisory-156.html","reference_id":"","reference_type":"","scores":[],"url":"http://xenbits.xen.org/xsa/advisory-156.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1277172","reference_id":"1277172","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1277172"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823620","reference_id":"823620","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823620"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.4.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.5.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.5.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.6.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.6.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.6.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-5307","reference_id":"CVE-2015-5307","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-5307"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2552","reference_id":"RHSA-2015:2552","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2552"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2587","reference_id":"RHSA-2015:2587","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2587"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2636","reference_id":"RHSA-2015:2636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2645","reference_id":"RHSA-2015:2645","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2645"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0004","reference_id":"RHSA-2016:0004","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0004"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0024","reference_id":"RHSA-2016:0024","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0024"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0046","reference_id":"RHSA-2016:0046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0046"},{"reference_url":"https://usn.ubuntu.com/2800-1/","reference_id":"USN-2800-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2800-1/"},{"reference_url":"https://usn.ubuntu.com/2801-1/","reference_id":"USN-2801-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2801-1/"},{"reference_url":"https://usn.ubuntu.com/2802-1/","reference_id":"USN-2802-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2802-1/"},{"reference_url":"https://usn.ubuntu.com/2803-1/","reference_id":"USN-2803-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2803-1/"},{"reference_url":"https://usn.ubuntu.com/2804-1/","reference_id":"USN-2804-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2804-1/"},{"reference_url":"https://usn.ubuntu.com/2805-1/","reference_id":"USN-2805-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2805-1/"},{"reference_url":"https://usn.ubuntu.com/2806-1/","reference_id":"USN-2806-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2806-1/"},{"reference_url":"https://usn.ubuntu.com/2807-1/","reference_id":"USN-2807-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2807-1/"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-156.html","reference_id":"XSA-156","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-156.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943299?format=json","purl":"pkg:deb/debian/xen@4.8.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.8.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943265?format=json","purl":"pkg:deb/debian/xen@4.14.6-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943263?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943267?format=json","purl":"pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943266?format=json","purl":"pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-1%3Fdistro=trixie"}],"aliases":["CVE-2015-5307"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dc9p-tdf1-h7ad"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4058?format=json","vulnerability_id":"VCID-emjs-dbhy-nqdr","summary":"x86 software guest page walk PS bit handling flaw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4480.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4480.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-4480","reference_id":"","reference_type":"","scores":[{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60371","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60311","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60134","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.6021","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60236","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60203","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60253","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60267","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60288","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60275","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60255","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60295","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60302","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60289","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.6026","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60276","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60264","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60221","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60268","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60327","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60284","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-4480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8338","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8338"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4962","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4962"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5242","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5242"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6258","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6258"},{"reference_url":"http://www.debian.org/security/2016/dsa-3633","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3633"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"},{"reference_url":"http://www.securityfocus.com/bid/90710","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/90710"},{"reference_url":"http://www.securitytracker.com/id/1035901","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1035901"},{"reference_url":"http://xenbits.xen.org/xsa/advisory-176.html","reference_id":"","reference_type":"","scores":[],"url":"http://xenbits.xen.org/xsa/advisory-176.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1332657","reference_id":"1332657","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1332657"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:vm_server:3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:vm_server:3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:vm_server:3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:vm_server:3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:vm_server:3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:vm_server:3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:vm_server:3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:vm_server:3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:vm_server:3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4480","reference_id":"CVE-2016-4480","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:C/I:C/A:C"},{"value":"8.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4480"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-176.html","reference_id":"XSA-176","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-176.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943299?format=json","purl":"pkg:deb/debian/xen@4.8.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.8.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943265?format=json","purl":"pkg:deb/debian/xen@4.14.6-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943263?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943267?format=json","purl":"pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943266?format=json","purl":"pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-1%3Fdistro=trixie"}],"aliases":["CVE-2016-4480"],"risk_score":3.8,"exploitability":"0.5","weighted_severity":"7.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-emjs-dbhy-nqdr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4041?format=json","vulnerability_id":"VCID-fe96-8s69-37fh","summary":"long running memory operations on ARM","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8338.json","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8338.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8338","reference_id":"","reference_type":"","scores":[{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.41934","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.41995","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.42023","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.41949","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.41999","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.4201","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.42032","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.41994","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.4198","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.42029","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.42003","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.41933","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.41872","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.41864","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.41782","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.41643","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.41712","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.41729","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.41639","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.41664","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.41739","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8338"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8338","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8338"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4962","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4962"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5242","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5242"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6258","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6258"},{"reference_url":"http://www.debian.org/security/2016/dsa-3633","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3633"},{"reference_url":"http://www.securityfocus.com/bid/78920","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/78920"},{"reference_url":"http://www.securitytracker.com/id/1034390","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034390"},{"reference_url":"http://xenbits.xen.org/xsa/advisory-158.html","reference_id":"","reference_type":"","scores":[],"url":"http://xenbits.xen.org/xsa/advisory-158.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1284911","reference_id":"1284911","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1284911"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823620","reference_id":"823620","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823620"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8338","reference_id":"CVE-2015-8338","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8338"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-158.html","reference_id":"XSA-158","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-158.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943299?format=json","purl":"pkg:deb/debian/xen@4.8.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.8.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943265?format=json","purl":"pkg:deb/debian/xen@4.14.6-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943263?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943267?format=json","purl":"pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943266?format=json","purl":"pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-1%3Fdistro=trixie"}],"aliases":["CVE-2015-8338"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fe96-8s69-37fh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4050?format=json","vulnerability_id":"VCID-fj2r-tp5w-j3dg","summary":"x86: unintentional logging upon guest changing callback method","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8615.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8615.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8615","reference_id":"","reference_type":"","scores":[{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.4736","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.47329","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.47382","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.47416","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.47437","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.47386","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.47441","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.47438","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.47461","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.47436","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.47442","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.47502","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.47494","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.47446","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.47433","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.47389","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.47305","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.47369","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.47388","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8615"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8615","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8615"},{"reference_url":"http://www.securityfocus.com/bid/79644","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/79644"},{"reference_url":"http://www.securitytracker.com/id/1034512","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034512"},{"reference_url":"http://xenbits.xen.org/xsa/advisory-169.html","reference_id":"","reference_type":"","scores":[],"url":"http://xenbits.xen.org/xsa/advisory-169.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1293675","reference_id":"1293675","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1293675"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823620","reference_id":"823620","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823620"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8615","reference_id":"CVE-2015-8615","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:P"},{"value":"5.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8615"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-169.html","reference_id":"XSA-169","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-169.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943299?format=json","purl":"pkg:deb/debian/xen@4.8.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.8.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943265?format=json","purl":"pkg:deb/debian/xen@4.14.6-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943263?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943267?format=json","purl":"pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943266?format=json","purl":"pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-1%3Fdistro=trixie"}],"aliases":["CVE-2015-8615"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fj2r-tp5w-j3dg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4097?format=json","vulnerability_id":"VCID-gb8y-jxgr-5qdg","summary":"possible memory corruption via failsafe callback","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8905.json","reference_id":"","reference_type":"","scores":[{"value":"8.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8905.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-8905","reference_id":"","reference_type":"","scores":[{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.25031","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24858","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24762","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24781","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.25108","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.25147","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24921","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.2499","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.25035","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.25049","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.25009","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24954","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24968","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.2496","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24933","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24876","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24864","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.2482","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24696","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24772","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24837","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-8905"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10013","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10013"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10024","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10024"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9932","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9932"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7228","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7228"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8903","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8903"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8904","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8904"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8905","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8905"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:H/Au:S/C:C/I:C/A:C"},{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1443220","reference_id":"1443220","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1443220"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=861662","reference_id":"861662","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=861662"},{"reference_url":"https://security.gentoo.org/glsa/201705-11","reference_id":"GLSA-201705-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201705-11"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-215.html","reference_id":"XSA-215","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-215.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943299?format=json","purl":"pkg:deb/debian/xen@4.8.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.8.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943265?format=json","purl":"pkg:deb/debian/xen@4.14.6-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943263?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943267?format=json","purl":"pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943266?format=json","purl":"pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-1%3Fdistro=trixie"}],"aliases":["CVE-2017-8905","XSA-215"],"risk_score":3.9,"exploitability":"0.5","weighted_severity":"7.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gb8y-jxgr-5qdg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4057?format=json","vulnerability_id":"VCID-h4hf-xbq6-n7e1","summary":"Unsanitised guest input in libxl device handling code","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4962.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4962.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-4962","reference_id":"","reference_type":"","scores":[{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25133","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25038","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25056","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.2532","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25393","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25429","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25205","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25275","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25331","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25289","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25237","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25247","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25207","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25163","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25151","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25107","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.24985","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25048","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25108","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-4962"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8338","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8338"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4962","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4962"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5242","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5242"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6258","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6258"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:S/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.debian.org/security/2016/dsa-3633","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3633"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"},{"reference_url":"http://www.securityfocus.com/bid/91006","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/91006"},{"reference_url":"http://www.securitytracker.com/id/1036023","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1036023"},{"reference_url":"http://xenbits.xen.org/xsa/advisory-175.html","reference_id":"","reference_type":"","scores":[],"url":"http://xenbits.xen.org/xsa/advisory-175.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1335438","reference_id":"1335438","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1335438"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:vm_server:3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:vm_server:3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:vm_server:3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:vm_server:3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:vm_server:3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:vm_server:3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.4.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.4.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.5.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4962","reference_id":"CVE-2016-4962","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:C/I:C/A:C"},{"value":"6.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4962"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-175.html","reference_id":"XSA-175","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-175.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943299?format=json","purl":"pkg:deb/debian/xen@4.8.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.8.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943265?format=json","purl":"pkg:deb/debian/xen@4.14.6-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943263?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943267?format=json","purl":"pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943266?format=json","purl":"pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-1%3Fdistro=trixie"}],"aliases":["CVE-2016-4962"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-h4hf-xbq6-n7e1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4035?format=json","vulnerability_id":"VCID-jfmu-gcux-y3et","summary":"x86: inconsistent cachability flags on guest mappings","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177990.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177990.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178518.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178518.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2270.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2270.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2270","reference_id":"","reference_type":"","scores":[{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52925","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52852","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.5277","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52793","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.5282","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52787","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52838","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52832","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52883","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52867","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52851","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52888","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52896","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52879","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52847","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52857","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52819","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52764","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52815","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52859","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52826","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2270"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8339","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8339"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8340","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8340"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8341","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8341"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8555","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8555"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1570","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1570"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1571","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1571"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2270","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2270"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2271","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2271"},{"reference_url":"http://www.debian.org/security/2016/dsa-3519","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3519"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"},{"reference_url":"http://www.securitytracker.com/id/1035042","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1035042"},{"reference_url":"http://xenbits.xen.org/xsa/advisory-154.html","reference_id":"","reference_type":"","scores":[],"url":"http://xenbits.xen.org/xsa/advisory-154.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1304627","reference_id":"1304627","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1304627"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:vm_server:3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:vm_server:3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:vm_server:3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-2270","reference_id":"CVE-2016-2270","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:C"},{"value":"6.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-2270"},{"reference_url":"https://security.gentoo.org/glsa/201604-03","reference_id":"GLSA-201604-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201604-03"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-154.html","reference_id":"XSA-154","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-154.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943299?format=json","purl":"pkg:deb/debian/xen@4.8.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.8.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943265?format=json","purl":"pkg:deb/debian/xen@4.14.6-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943263?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943267?format=json","purl":"pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943266?format=json","purl":"pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-1%3Fdistro=trixie"}],"aliases":["CVE-2016-2270"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jfmu-gcux-y3et"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4026?format=json","vulnerability_id":"VCID-m5h4-49wd-y7b1","summary":"libxl fails to honour readonly flag on disks with qemu-xen","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7311.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7311.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7311","reference_id":"","reference_type":"","scores":[{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20698","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20841","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20898","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20613","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20689","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20749","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20768","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20725","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20673","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20658","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20656","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20647","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20534","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.2053","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20499","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20392","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20463","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.2055","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20527","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20541","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20623","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7311"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3259","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3259"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3340","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3340"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5307","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5307"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6654","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6654"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7311","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7311"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7812","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7812"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7813","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7813"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7814","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7814"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7969","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7969"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7970","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7970"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7971","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7971"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7972","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7972"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8104","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8104"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1265269","reference_id":"1265269","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1265269"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823620","reference_id":"823620","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823620"},{"reference_url":"https://security.gentoo.org/glsa/201604-03","reference_id":"GLSA-201604-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201604-03"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-142.html","reference_id":"XSA-142","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-142.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943299?format=json","purl":"pkg:deb/debian/xen@4.8.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.8.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943265?format=json","purl":"pkg:deb/debian/xen@4.14.6-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943263?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943267?format=json","purl":"pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943266?format=json","purl":"pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-1%3Fdistro=trixie"}],"aliases":["CVE-2015-7311"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-m5h4-49wd-y7b1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4025?format=json","vulnerability_id":"VCID-mmpb-71zs-4fft","summary":"printk is not rate-limited in xenmem_add_to_physmap_one","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-6654.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-6654.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-6654","reference_id":"","reference_type":"","scores":[{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.1462","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14672","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14745","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14554","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14643","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14702","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14663","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14624","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14568","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.1446","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14464","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14532","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14562","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14561","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14501","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.1438","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14514","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14603","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14601","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14645","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14724","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-6654"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3259","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3259"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3340","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3340"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5307","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5307"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6654","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6654"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7311","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7311"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7812","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7812"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7813","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7813"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7814","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7814"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7969","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7969"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7970","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7970"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7971","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7971"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7972","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7972"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8104","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8104"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1256399","reference_id":"1256399","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1256399"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=800128","reference_id":"800128","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=800128"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823620","reference_id":"823620","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823620"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-141.html","reference_id":"XSA-141","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-141.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943299?format=json","purl":"pkg:deb/debian/xen@4.8.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.8.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943265?format=json","purl":"pkg:deb/debian/xen@4.14.6-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943263?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943267?format=json","purl":"pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943266?format=json","purl":"pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-1%3Fdistro=trixie"}],"aliases":["CVE-2015-6654"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mmpb-71zs-4fft"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4065?format=json","vulnerability_id":"VCID-nyst-ybjq-3uet","summary":"x86: Missing SMAP whitelisting in 32-bit exception / event delivery","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6259.json","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6259.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6259","reference_id":"","reference_type":"","scores":[{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.5004","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50106","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50004","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50034","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50075","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50103","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50052","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50107","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50101","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50118","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50092","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50088","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50133","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50105","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50097","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.5005","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.49968","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50023","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6259"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6259","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6259"},{"reference_url":"http://support.citrix.com/article/CTX214954","reference_id":"","reference_type":"","scores":[],"url":"http://support.citrix.com/article/CTX214954"},{"reference_url":"http://www.securityfocus.com/bid/92130","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/92130"},{"reference_url":"http://www.securitytracker.com/id/1036447","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1036447"},{"reference_url":"http://xenbits.xen.org/xsa/advisory-183.html","reference_id":"","reference_type":"","scores":[],"url":"http://xenbits.xen.org/xsa/advisory-183.html"},{"reference_url":"http://xenbits.xen.org/xsa/xsa183-4.6.patch","reference_id":"","reference_type":"","scores":[],"url":"http://xenbits.xen.org/xsa/xsa183-4.6.patch"},{"reference_url":"http://xenbits.xen.org/xsa/xsa183-unstable.patch","reference_id":"","reference_type":"","scores":[],"url":"http://xenbits.xen.org/xsa/xsa183-unstable.patch"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1355983","reference_id":"1355983","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1355983"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:citrix:xenserver:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:6.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:citrix:xenserver:6.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:6.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:citrix:xenserver:6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:6.2.0:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:citrix:xenserver:6.2.0:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:6.2.0:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:6.5.0:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:citrix:xenserver:6.5.0:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:6.5.0:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:citrix:xenserver:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.5.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.6.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-6259","reference_id":"CVE-2016-6259","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:C"},{"value":"6.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-6259"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-183.html","reference_id":"XSA-183","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-183.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943299?format=json","purl":"pkg:deb/debian/xen@4.8.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.8.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943265?format=json","purl":"pkg:deb/debian/xen@4.14.6-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943263?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943267?format=json","purl":"pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943266?format=json","purl":"pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-1%3Fdistro=trixie"}],"aliases":["CVE-2016-6259","XSA-183"],"risk_score":2.9,"exploitability":"0.5","weighted_severity":"5.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nyst-ybjq-3uet"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4064?format=json","vulnerability_id":"VCID-q479-9fry-y7dh","summary":"x86: Privilege escalation in PV guests","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6258.json","reference_id":"","reference_type":"","scores":[{"value":"8.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6258.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6258","reference_id":"","reference_type":"","scores":[{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29776","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29338","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29237","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29258","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29823","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29871","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29685","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29748","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29783","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29788","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29742","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29692","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.2971","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29688","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29644","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29563","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.2945","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29387","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.2924","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29301","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29316","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6258"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8338","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8338"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4962","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4962"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5242","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5242"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6258","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6258"},{"reference_url":"http://support.citrix.com/article/CTX214954","reference_id":"","reference_type":"","scores":[],"url":"http://support.citrix.com/article/CTX214954"},{"reference_url":"http://www.debian.org/security/2016/dsa-3633","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3633"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"},{"reference_url":"http://www.securityfocus.com/bid/92131","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/92131"},{"reference_url":"http://www.securitytracker.com/id/1036446","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1036446"},{"reference_url":"http://xenbits.xen.org/xsa/advisory-182.html","reference_id":"","reference_type":"","scores":[],"url":"http://xenbits.xen.org/xsa/advisory-182.html"},{"reference_url":"http://xenbits.xen.org/xsa/xsa182-4.5.patch","reference_id":"","reference_type":"","scores":[],"url":"http://xenbits.xen.org/xsa/xsa182-4.5.patch"},{"reference_url":"http://xenbits.xen.org/xsa/xsa182-4.6.patch","reference_id":"","reference_type":"","scores":[],"url":"http://xenbits.xen.org/xsa/xsa182-4.6.patch"},{"reference_url":"http://xenbits.xen.org/xsa/xsa182-unstable.patch","reference_id":"","reference_type":"","scores":[],"url":"http://xenbits.xen.org/xsa/xsa182-unstable.patch"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1355987","reference_id":"1355987","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1355987"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:citrix:xenserver:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:6.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:citrix:xenserver:6.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:6.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:citrix:xenserver:6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:6.2.0:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:citrix:xenserver:6.2.0:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:6.2.0:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:6.5.0:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:citrix:xenserver:6.5.0:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:6.5.0:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:citrix:xenserver:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.6.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-6258","reference_id":"CVE-2016-6258","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:C/I:C/A:C"},{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-6258"},{"reference_url":"https://security.gentoo.org/glsa/201611-09","reference_id":"GLSA-201611-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201611-09"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-182.html","reference_id":"XSA-182","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-182.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943299?format=json","purl":"pkg:deb/debian/xen@4.8.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.8.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943265?format=json","purl":"pkg:deb/debian/xen@4.14.6-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943263?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943267?format=json","purl":"pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943266?format=json","purl":"pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-1%3Fdistro=trixie"}],"aliases":["CVE-2016-6258","XSA-182"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-q479-9fry-y7dh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4069?format=json","vulnerability_id":"VCID-qtbj-1dcj-ykhz","summary":"x86 HVM: Overflow of sh_ctxt->seg_reg[]","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7094.json","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7094.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7094","reference_id":"","reference_type":"","scores":[{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21392","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21559","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21618","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21374","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21451","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21511","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21523","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21485","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21429","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21423","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21396","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21249","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21247","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21227","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21128","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21194","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21282","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21259","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21281","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21358","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7094"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7092","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7092"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7094","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7094"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7154","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7154"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:S/C:N/I:N/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1370332","reference_id":"1370332","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1370332"},{"reference_url":"https://security.gentoo.org/glsa/201611-09","reference_id":"GLSA-201611-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201611-09"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-187.html","reference_id":"XSA-187","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-187.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943299?format=json","purl":"pkg:deb/debian/xen@4.8.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.8.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943265?format=json","purl":"pkg:deb/debian/xen@4.14.6-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943263?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943267?format=json","purl":"pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943266?format=json","purl":"pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-1%3Fdistro=trixie"}],"aliases":["CVE-2016-7094","XSA-187"],"risk_score":2.9,"exploitability":"0.5","weighted_severity":"5.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qtbj-1dcj-ykhz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4055?format=json","vulnerability_id":"VCID-srt6-6fge-8qbp","summary":"x86 shadow pagetables: address width overflow","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183275.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183275.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183350.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183350.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184209.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184209.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3960.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3960.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3960","reference_id":"","reference_type":"","scores":[{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22837","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22761","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22871","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.2304","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23085","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22874","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22946","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22998","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23016","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22979","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22924","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22939","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22933","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22895","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22728","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22723","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22718","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22618","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22701","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22779","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22745","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3960"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3158","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3158"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3159","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3159"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3960","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3960"},{"reference_url":"http://support.citrix.com/article/CTX209443","reference_id":"","reference_type":"","scores":[],"url":"http://support.citrix.com/article/CTX209443"},{"reference_url":"http://www.debian.org/security/2016/dsa-3554","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3554"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"},{"reference_url":"http://www.securityfocus.com/bid/86318","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/86318"},{"reference_url":"http://www.securitytracker.com/id/1035587","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1035587"},{"reference_url":"http://xenbits.xen.org/xsa/advisory-173.html","reference_id":"","reference_type":"","scores":[],"url":"http://xenbits.xen.org/xsa/advisory-173.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1323955","reference_id":"1323955","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1323955"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823620","reference_id":"823620","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823620"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:vm_server:3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:vm_server:3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:vm_server:3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:vm_server:3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:vm_server:3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:vm_server:3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:vm_server:3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:vm_server:3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:vm_server:3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3960","reference_id":"CVE-2016-3960","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:C/I:C/A:C"},{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3960"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-173.html","reference_id":"XSA-173","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-173.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943299?format=json","purl":"pkg:deb/debian/xen@4.8.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.8.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943265?format=json","purl":"pkg:deb/debian/xen@4.14.6-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943263?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943267?format=json","purl":"pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943266?format=json","purl":"pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-1%3Fdistro=trixie"}],"aliases":["CVE-2016-3960"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-srt6-6fge-8qbp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4054?format=json","vulnerability_id":"VCID-t14z-dxet-fyet","summary":"broken AMD FPU FIP/FDP/FOP leak workaround","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181699.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181699.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181729.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181729.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3159.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3159.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3159","reference_id":"","reference_type":"","scores":[{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.1103","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10933","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10978","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10841","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10981","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11043","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10867","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10943","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10997","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10998","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10966","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10808","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10821","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10941","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10895","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10854","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10796","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10741","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10874","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10949","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3159"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3158","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3158"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3159","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3159"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3960","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3960"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:S/C:P/I:P/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://support.citrix.com/article/CTX209443","reference_id":"","reference_type":"","scores":[],"url":"http://support.citrix.com/article/CTX209443"},{"reference_url":"http://www.debian.org/security/2016/dsa-3554","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3554"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"},{"reference_url":"http://www.securityfocus.com/bid/85716","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/85716"},{"reference_url":"http://www.securitytracker.com/id/1035435","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1035435"},{"reference_url":"http://xenbits.xen.org/xsa/advisory-172.html","reference_id":"","reference_type":"","scores":[],"url":"http://xenbits.xen.org/xsa/advisory-172.html"},{"reference_url":"http://xenbits.xen.org/xsa/xsa172.patch","reference_id":"","reference_type":"","scores":[],"url":"http://xenbits.xen.org/xsa/xsa172.patch"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1317969","reference_id":"1317969","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1317969"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823620","reference_id":"823620","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823620"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:vm_server:3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:vm_server:3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:vm_server:3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:vm_server:3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:vm_server:3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:vm_server:3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3159","reference_id":"CVE-2016-3159","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:P/I:N/A:N"},{"value":"3.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3159"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-172.html","reference_id":"XSA-172","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-172.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943299?format=json","purl":"pkg:deb/debian/xen@4.8.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.8.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943265?format=json","purl":"pkg:deb/debian/xen@4.14.6-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943263?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943267?format=json","purl":"pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943266?format=json","purl":"pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-1%3Fdistro=trixie"}],"aliases":["CVE-2016-3159"],"risk_score":1.7,"exploitability":"0.5","weighted_severity":"3.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t14z-dxet-fyet"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4067?format=json","vulnerability_id":"VCID-uq8r-gwnd-2fh1","summary":"x86: Disallow L3 recursive pagetable for 32-bit PV guests","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7092.json","reference_id":"","reference_type":"","scores":[{"value":"8.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7092.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7092","reference_id":"","reference_type":"","scores":[{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22604","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22391","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22472","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22393","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22561","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23021","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22983","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22818","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22814","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22809","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.2271","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22793","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.2287","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22835","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.2285","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22926","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23091","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23111","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23074","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23017","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.2303","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7092"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7092","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7092"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7094","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7094"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7154","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7154"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1370319","reference_id":"1370319","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1370319"},{"reference_url":"https://security.gentoo.org/glsa/201611-09","reference_id":"GLSA-201611-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201611-09"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-185.html","reference_id":"XSA-185","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-185.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943299?format=json","purl":"pkg:deb/debian/xen@4.8.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.8.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943265?format=json","purl":"pkg:deb/debian/xen@4.14.6-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943263?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943267?format=json","purl":"pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943266?format=json","purl":"pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-1%3Fdistro=trixie"}],"aliases":["CVE-2016-7092","XSA-185"],"risk_score":3.9,"exploitability":"0.5","weighted_severity":"7.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uq8r-gwnd-2fh1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4036?format=json","vulnerability_id":"VCID-us1d-sdm8-sbh6","summary":"paravirtualized drivers incautious about shared memory contents","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8550.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8550.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8550","reference_id":"","reference_type":"","scores":[{"value":"0.15964","scoring_system":"epss","scoring_elements":"0.94831","published_at":"2026-05-14T12:55:00Z"},{"value":"0.15964","scoring_system":"epss","scoring_elements":"0.94819","published_at":"2026-05-12T12:55:00Z"},{"value":"0.15964","scoring_system":"epss","scoring_elements":"0.9473","published_at":"2026-04-01T12:55:00Z"},{"value":"0.15964","scoring_system":"epss","scoring_elements":"0.9474","published_at":"2026-04-02T12:55:00Z"},{"value":"0.15964","scoring_system":"epss","scoring_elements":"0.94743","published_at":"2026-04-04T12:55:00Z"},{"value":"0.15964","scoring_system":"epss","scoring_elements":"0.94745","published_at":"2026-04-07T12:55:00Z"},{"value":"0.15964","scoring_system":"epss","scoring_elements":"0.94754","published_at":"2026-04-08T12:55:00Z"},{"value":"0.15964","scoring_system":"epss","scoring_elements":"0.94758","published_at":"2026-04-09T12:55:00Z"},{"value":"0.15964","scoring_system":"epss","scoring_elements":"0.94762","published_at":"2026-04-11T12:55:00Z"},{"value":"0.15964","scoring_system":"epss","scoring_elements":"0.94765","published_at":"2026-04-12T12:55:00Z"},{"value":"0.15964","scoring_system":"epss","scoring_elements":"0.94766","published_at":"2026-04-13T12:55:00Z"},{"value":"0.15964","scoring_system":"epss","scoring_elements":"0.94774","published_at":"2026-04-16T12:55:00Z"},{"value":"0.15964","scoring_system":"epss","scoring_elements":"0.94777","published_at":"2026-04-18T12:55:00Z"},{"value":"0.15964","scoring_system":"epss","scoring_elements":"0.9478","published_at":"2026-04-21T12:55:00Z"},{"value":"0.15964","scoring_system":"epss","scoring_elements":"0.94781","published_at":"2026-04-24T12:55:00Z"},{"value":"0.15964","scoring_system":"epss","scoring_elements":"0.94782","published_at":"2026-04-26T12:55:00Z"},{"value":"0.15964","scoring_system":"epss","scoring_elements":"0.94783","published_at":"2026-04-29T12:55:00Z"},{"value":"0.15964","scoring_system":"epss","scoring_elements":"0.94792","published_at":"2026-05-05T12:55:00Z"},{"value":"0.15964","scoring_system":"epss","scoring_elements":"0.94799","published_at":"2026-05-07T12:55:00Z"},{"value":"0.15964","scoring_system":"epss","scoring_elements":"0.94809","published_at":"2026-05-09T12:55:00Z"},{"value":"0.15964","scoring_system":"epss","scoring_elements":"0.94814","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7513","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7513"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8339","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8339"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8340","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8340"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8341","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8341"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8551","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8551"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8552","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8552"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8555","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8555"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8569","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8569"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8575","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8575"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1570","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1570"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1571","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1571"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2270","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2270"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2271","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2271"},{"reference_url":"http://www.debian.org/security/2016/dsa-3434","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3434"},{"reference_url":"http://www.debian.org/security/2016/dsa-3471","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3471"},{"reference_url":"http://www.debian.org/security/2016/dsa-3519","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3519"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"},{"reference_url":"http://www.securityfocus.com/bid/79592","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/79592"},{"reference_url":"http://www.securitytracker.com/id/1034479","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034479"},{"reference_url":"http://xenbits.xen.org/xsa/advisory-155.html","reference_id":"","reference_type":"","scores":[],"url":"http://xenbits.xen.org/xsa/advisory-155.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1289125","reference_id":"1289125","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1289125"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=809229","reference_id":"809229","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=809229"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823620","reference_id":"823620","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823620"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_real_time_extension:12:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:novell:suse_linux_enterprise_real_time_extension:12:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_real_time_extension:12:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8550","reference_id":"CVE-2015-8550","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:P/I:P/A:C"},{"value":"8.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8550"},{"reference_url":"https://security.gentoo.org/glsa/201604-03","reference_id":"GLSA-201604-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201604-03"},{"reference_url":"https://usn.ubuntu.com/2846-1/","reference_id":"USN-2846-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2846-1/"},{"reference_url":"https://usn.ubuntu.com/2847-1/","reference_id":"USN-2847-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2847-1/"},{"reference_url":"https://usn.ubuntu.com/2848-1/","reference_id":"USN-2848-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2848-1/"},{"reference_url":"https://usn.ubuntu.com/2849-1/","reference_id":"USN-2849-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2849-1/"},{"reference_url":"https://usn.ubuntu.com/2850-1/","reference_id":"USN-2850-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2850-1/"},{"reference_url":"https://usn.ubuntu.com/2851-1/","reference_id":"USN-2851-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2851-1/"},{"reference_url":"https://usn.ubuntu.com/2853-1/","reference_id":"USN-2853-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2853-1/"},{"reference_url":"https://usn.ubuntu.com/2854-1/","reference_id":"USN-2854-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2854-1/"},{"reference_url":"https://usn.ubuntu.com/2886-2/","reference_id":"USN-2886-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2886-2/"},{"reference_url":"https://usn.ubuntu.com/2891-1/","reference_id":"USN-2891-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2891-1/"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-155.html","reference_id":"XSA-155","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-155.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943299?format=json","purl":"pkg:deb/debian/xen@4.8.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.8.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943265?format=json","purl":"pkg:deb/debian/xen@4.14.6-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943263?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943267?format=json","purl":"pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943266?format=json","purl":"pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-1%3Fdistro=trixie"}],"aliases":["CVE-2015-8550"],"risk_score":3.7,"exploitability":"0.5","weighted_severity":"7.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-us1d-sdm8-sbh6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4053?format=json","vulnerability_id":"VCID-v25t-h3tp-nffb","summary":"broken AMD FPU FIP/FDP/FOP leak workaround","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181699.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181699.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181729.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181729.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3158.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3158.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3158","reference_id":"","reference_type":"","scores":[{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10792","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10741","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10504","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10647","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10709","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10567","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.1064","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10698","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10711","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.1068","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10656","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10519","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10536","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10662","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10615","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10612","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10558","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10516","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10651","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10719","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.107","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3158"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3158","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3158"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3159","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3159"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3960","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3960"},{"reference_url":"http://support.citrix.com/article/CTX209443","reference_id":"","reference_type":"","scores":[],"url":"http://support.citrix.com/article/CTX209443"},{"reference_url":"http://www.debian.org/security/2016/dsa-3554","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3554"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"},{"reference_url":"http://www.securityfocus.com/bid/85714","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/85714"},{"reference_url":"http://www.securitytracker.com/id/1035435","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1035435"},{"reference_url":"http://xenbits.xen.org/xsa/advisory-172.html","reference_id":"","reference_type":"","scores":[],"url":"http://xenbits.xen.org/xsa/advisory-172.html"},{"reference_url":"http://xenbits.xen.org/xsa/xsa172-4.3.patch","reference_id":"","reference_type":"","scores":[],"url":"http://xenbits.xen.org/xsa/xsa172-4.3.patch"},{"reference_url":"http://xenbits.xen.org/xsa/xsa172.patch","reference_id":"","reference_type":"","scores":[],"url":"http://xenbits.xen.org/xsa/xsa172.patch"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1317969","reference_id":"1317969","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1317969"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823620","reference_id":"823620","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823620"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:vm_server:3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:vm_server:3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:vm_server:3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:vm_server:3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:vm_server:3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:vm_server:3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3158","reference_id":"CVE-2016-3158","reference_type":"","scores":[{"value":"1.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:P/I:N/A:N"},{"value":"3.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3158"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-172.html","reference_id":"XSA-172","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-172.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943299?format=json","purl":"pkg:deb/debian/xen@4.8.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.8.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943265?format=json","purl":"pkg:deb/debian/xen@4.14.6-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943263?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943267?format=json","purl":"pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943266?format=json","purl":"pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-1%3Fdistro=trixie"}],"aliases":["CVE-2016-3158"],"risk_score":1.7,"exploitability":"0.5","weighted_severity":"3.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v25t-h3tp-nffb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4071?format=json","vulnerability_id":"VCID-xa1k-c5dm-97am","summary":"CR0.TS and CR0.EM not always honored for x86 HVM guests","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7777.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7777.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7777","reference_id":"","reference_type":"","scores":[{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.31259","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.314","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.31441","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.31261","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.31314","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.31344","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.31349","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.31305","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.31262","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.31296","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.31275","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.31248","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.31075","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.30952","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.30869","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.30718","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.30787","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.30795","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.30711","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.30734","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.30801","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7777"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7777","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7777"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9379","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9379"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9380","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9380"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9382","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9382"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9383","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9383"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9385","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9385"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9386","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9386"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:S/C:P/I:P/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1377789","reference_id":"1377789","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1377789"},{"reference_url":"https://security.gentoo.org/glsa/201611-09","reference_id":"GLSA-201611-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201611-09"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-190.html","reference_id":"XSA-190","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-190.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943299?format=json","purl":"pkg:deb/debian/xen@4.8.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.8.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943265?format=json","purl":"pkg:deb/debian/xen@4.14.6-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943263?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943267?format=json","purl":"pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943266?format=json","purl":"pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-1%3Fdistro=trixie"}],"aliases":["CVE-2016-7777","XSA-190"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xa1k-c5dm-97am"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4083?format=json","vulnerability_id":"VCID-y22w-wqt3-sues","summary":"x86 CMPXCHG8B emulation fails to ignore operand size override","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9932.json","reference_id":"","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9932.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-9932","reference_id":"","reference_type":"","scores":[{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21263","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21419","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21474","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21225","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21305","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21367","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21376","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21335","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21282","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21277","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21285","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21262","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21128","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21131","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21106","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21005","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21071","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21158","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21136","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21156","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21233","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-9932"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10013","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10013"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10024","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10024"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9932","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9932"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7228","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7228"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8903","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8903"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8904","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8904"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8905","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8905"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:H/Au:S/C:P/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1399745","reference_id":"1399745","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1399745"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=848081","reference_id":"848081","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=848081"},{"reference_url":"https://security.gentoo.org/glsa/201612-56","reference_id":"GLSA-201612-56","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201612-56"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-200.html","reference_id":"XSA-200","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-200.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943299?format=json","purl":"pkg:deb/debian/xen@4.8.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.8.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943265?format=json","purl":"pkg:deb/debian/xen@4.14.6-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943263?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943267?format=json","purl":"pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943266?format=json","purl":"pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-1%3Fdistro=trixie"}],"aliases":["CVE-2016-9932","XSA-200"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y22w-wqt3-sues"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.8.0~rc3-1%3Fdistro=trixie"}