{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","type":"deb","namespace":"debian","name":"xen","version":"4.14.6-1","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4380?format=json","vulnerability_id":"VCID-1tb8-t91c-63bp","summary":"x86: Native Branch History Injection","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2201.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2201.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-2201","reference_id":"","reference_type":"","scores":[{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08738","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08769","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.0878","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08735","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09139","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09114","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09191","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09057","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09077","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.0918","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09195","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09226","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09224","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09194","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-2201"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2201","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2201"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/04/09/15","reference_id":"15","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-31T18:51:54Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/04/09/15"},{"reference_url":"https://www.kb.cert.org/vuls/id/155143","reference_id":"155143","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-31T18:51:54Z/"}],"url":"https://www.kb.cert.org/vuls/id/155143"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2268118","reference_id":"2268118","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2268118"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6QKNCPX7CJUK4I6BRGABAUQK2DMQZUCA/","reference_id":"6QKNCPX7CJUK4I6BRGABAUQK2DMQZUCA","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-31T18:51:54Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6QKNCPX7CJUK4I6BRGABAUQK2DMQZUCA/"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/05/07/7","reference_id":"7","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-31T18:51:54Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/05/07/7"},{"reference_url":"http://xenbits.xen.org/xsa/advisory-456.html","reference_id":"advisory-456.html","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-31T18:51:54Z/"}],"url":"http://xenbits.xen.org/xsa/advisory-456.html"},{"reference_url":"https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/branch-history-injection.htm","reference_id":"branch-history-injection.htm","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-31T18:51:54Z/"}],"url":"https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/branch-history-injection.htm"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D5OK6MH75S7YWD34EWW7QIZTS627RIE3/","reference_id":"D5OK6MH75S7YWD34EWW7QIZTS627RIE3","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-31T18:51:54Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D5OK6MH75S7YWD34EWW7QIZTS627RIE3/"},{"reference_url":"https://github.com/vusec/inspectre-gadget?tab=readme-ov-file","reference_id":"inspectre-gadget?tab=readme-ov-file","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-31T18:51:54Z/"}],"url":"https://github.com/vusec/inspectre-gadget?tab=readme-ov-file"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5101","reference_id":"RHSA-2024:5101","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5101"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5102","reference_id":"RHSA-2024:5102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6994","reference_id":"RHSA-2024:6994","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6994"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6995","reference_id":"RHSA-2024:6995","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6995"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8613","reference_id":"RHSA-2024:8613","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8613"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8614","reference_id":"RHSA-2024:8614","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8614"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8617","reference_id":"RHSA-2024:8617","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8617"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RYAZ7P6YFJ2E3FHKAGIKHWS46KYMMTZH/","reference_id":"RYAZ7P6YFJ2E3FHKAGIKHWS46KYMMTZH","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-31T18:51:54Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RYAZ7P6YFJ2E3FHKAGIKHWS46KYMMTZH/"},{"reference_url":"https://usn.ubuntu.com/6766-1/","reference_id":"USN-6766-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6766-1/"},{"reference_url":"https://usn.ubuntu.com/6766-2/","reference_id":"USN-6766-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6766-2/"},{"reference_url":"https://usn.ubuntu.com/6766-3/","reference_id":"USN-6766-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6766-3/"},{"reference_url":"https://usn.ubuntu.com/6774-1/","reference_id":"USN-6774-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6774-1/"},{"reference_url":"https://usn.ubuntu.com/6795-1/","reference_id":"USN-6795-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6795-1/"},{"reference_url":"https://usn.ubuntu.com/6828-1/","reference_id":"USN-6828-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6828-1/"},{"reference_url":"https://usn.ubuntu.com/6865-1/","reference_id":"USN-6865-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6865-1/"},{"reference_url":"https://usn.ubuntu.com/6866-1/","reference_id":"USN-6866-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6866-1/"},{"reference_url":"https://usn.ubuntu.com/6866-2/","reference_id":"USN-6866-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6866-2/"},{"reference_url":"https://usn.ubuntu.com/6866-3/","reference_id":"USN-6866-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6866-3/"},{"reference_url":"https://usn.ubuntu.com/6868-1/","reference_id":"USN-6868-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6868-1/"},{"reference_url":"https://usn.ubuntu.com/6868-2/","reference_id":"USN-6868-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6868-2/"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-456.html","reference_id":"XSA-456","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-456.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994413?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1"}],"aliases":["CVE-2024-2201","XSA-456"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1tb8-t91c-63bp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4405?format=json","vulnerability_id":"VCID-26a9-9zz3-wfhh","summary":"x86: Incorrect input sanitisation in Viridian hypercalls","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-58147","reference_id":"","reference_type":"","scores":[{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06179","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06166","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.0626","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06221","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06197","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07718","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07807","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07764","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07742","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07782","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07769","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07753","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07667","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07654","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-58147"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58147","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58147"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120075","reference_id":"1120075","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120075"},{"reference_url":"https://xenbits.xenproject.org/xsa/advisory-475.html","reference_id":"advisory-475.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-31T17:45:24Z/"}],"url":"https://xenbits.xenproject.org/xsa/advisory-475.html"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-475.html","reference_id":"XSA-475","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-475.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994413?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1"}],"aliases":["CVE-2025-58147","XSA-475"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-26a9-9zz3-wfhh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4399?format=json","vulnerability_id":"VCID-2trm-w3ww-cfhk","summary":"Mutiple vulnerabilities in the Viridian interface","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-27466","reference_id":"","reference_type":"","scores":[{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0691","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0696","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07717","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07643","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07611","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07576","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07665","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08147","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08071","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08132","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08154","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08127","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.0811","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08017","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-27466"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27466","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27466"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120075","reference_id":"1120075","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120075"},{"reference_url":"https://xenbits.xenproject.org/xsa/advisory-472.html","reference_id":"advisory-472.html","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-11T14:25:53Z/"}],"url":"https://xenbits.xenproject.org/xsa/advisory-472.html"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-472.html","reference_id":"XSA-472","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-472.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994413?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1"}],"aliases":["CVE-2025-27466"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"4.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2trm-w3ww-cfhk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4359?format=json","vulnerability_id":"VCID-3bw4-631f-e7h6","summary":"arm32: The cache may not be properly cleaned/invalidated","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-34321","reference_id":"","reference_type":"","scores":[{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17092","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17151","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17404","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17451","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17232","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17324","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17383","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17395","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17345","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17287","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17226","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17266","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17171","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-34321"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34321","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34321"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051954","reference_id":"1051954","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051954"},{"reference_url":"https://xenbits.xenproject.org/xsa/advisory-437.html","reference_id":"advisory-437.html","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-09T15:52:01Z/"}],"url":"https://xenbits.xenproject.org/xsa/advisory-437.html"},{"reference_url":"https://security.gentoo.org/glsa/202409-10","reference_id":"GLSA-202409-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-10"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-437.html","reference_id":"XSA-437","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-437.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994413?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1"}],"aliases":["CVE-2023-34321","XSA-437"],"risk_score":0.8,"exploitability":"0.5","weighted_severity":"1.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3bw4-631f-e7h6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4382?format=json","vulnerability_id":"VCID-3se4-qv6j-xqfq","summary":"double unlock in x86 guest IRQ handling","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-31143","reference_id":"","reference_type":"","scores":[{"value":"0.00568","scoring_system":"epss","scoring_elements":"0.68631","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00568","scoring_system":"epss","scoring_elements":"0.68542","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00568","scoring_system":"epss","scoring_elements":"0.68582","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00568","scoring_system":"epss","scoring_elements":"0.68594","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00568","scoring_system":"epss","scoring_elements":"0.68621","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00568","scoring_system":"epss","scoring_elements":"0.68626","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00568","scoring_system":"epss","scoring_elements":"0.6849","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00568","scoring_system":"epss","scoring_elements":"0.68541","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00568","scoring_system":"epss","scoring_elements":"0.68558","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00568","scoring_system":"epss","scoring_elements":"0.68585","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00568","scoring_system":"epss","scoring_elements":"0.68572","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00676","scoring_system":"epss","scoring_elements":"0.71439","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00676","scoring_system":"epss","scoring_elements":"0.71456","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-31143"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31143","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31143"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://xenbits.xenproject.org/xsa/advisory-458.html","reference_id":"advisory-458.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-21T13:31:44Z/"}],"url":"https://xenbits.xenproject.org/xsa/advisory-458.html"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-458.html","reference_id":"XSA-458","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-458.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994413?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1"}],"aliases":["CVE-2024-31143","XSA-458"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3se4-qv6j-xqfq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4375?format=json","vulnerability_id":"VCID-3vdg-5g64-wkbt","summary":"x86: shadow stack vs exceptions from emulation stubs","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-46841","reference_id":"","reference_type":"","scores":[{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.19893","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20217","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20041","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20045","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20044","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.19928","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.19923","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20274","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.19999","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20079","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20137","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20162","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20117","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20059","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-46841"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46841","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46841"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://xenbits.xenproject.org/xsa/advisory-451.html","reference_id":"advisory-451.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-25T16:09:38Z/"}],"url":"https://xenbits.xenproject.org/xsa/advisory-451.html"},{"reference_url":"https://security.gentoo.org/glsa/202409-10","reference_id":"GLSA-202409-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-10"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-451.html","reference_id":"XSA-451","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-451.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A/","reference_id":"ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-25T16:09:38Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994413?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1"}],"aliases":["CVE-2023-46841","XSA-451"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3vdg-5g64-wkbt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4314?format=json","vulnerability_id":"VCID-46ad-1k9n-j3hm","summary":"Linux disk/nic frontends data leaks","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26365","reference_id":"","reference_type":"","scores":[{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05607","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05397","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.0543","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05438","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05474","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05495","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05468","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05454","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05447","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05398","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05406","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05575","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07717","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07741","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26365"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33655","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33655"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2318","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2318"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26365","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26365"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33740","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33740"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33741","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33741"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33742","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33742"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33743","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33743"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014414","reference_id":"1014414","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014414"},{"reference_url":"https://usn.ubuntu.com/5572-1/","reference_id":"USN-5572-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5572-1/"},{"reference_url":"https://usn.ubuntu.com/5572-2/","reference_id":"USN-5572-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5572-2/"},{"reference_url":"https://usn.ubuntu.com/5579-1/","reference_id":"USN-5579-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5579-1/"},{"reference_url":"https://usn.ubuntu.com/5623-1/","reference_id":"USN-5623-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5623-1/"},{"reference_url":"https://usn.ubuntu.com/5624-1/","reference_id":"USN-5624-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5624-1/"},{"reference_url":"https://usn.ubuntu.com/5633-1/","reference_id":"USN-5633-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5633-1/"},{"reference_url":"https://usn.ubuntu.com/5635-1/","reference_id":"USN-5635-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5635-1/"},{"reference_url":"https://usn.ubuntu.com/5640-1/","reference_id":"USN-5640-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5640-1/"},{"reference_url":"https://usn.ubuntu.com/5644-1/","reference_id":"USN-5644-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5644-1/"},{"reference_url":"https://usn.ubuntu.com/5648-1/","reference_id":"USN-5648-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5648-1/"},{"reference_url":"https://usn.ubuntu.com/5655-1/","reference_id":"USN-5655-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5655-1/"},{"reference_url":"https://usn.ubuntu.com/5668-1/","reference_id":"USN-5668-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5668-1/"},{"reference_url":"https://usn.ubuntu.com/5669-1/","reference_id":"USN-5669-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5669-1/"},{"reference_url":"https://usn.ubuntu.com/5669-2/","reference_id":"USN-5669-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5669-2/"},{"reference_url":"https://usn.ubuntu.com/5677-1/","reference_id":"USN-5677-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5677-1/"},{"reference_url":"https://usn.ubuntu.com/5678-1/","reference_id":"USN-5678-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5678-1/"},{"reference_url":"https://usn.ubuntu.com/5679-1/","reference_id":"USN-5679-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5679-1/"},{"reference_url":"https://usn.ubuntu.com/5682-1/","reference_id":"USN-5682-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5682-1/"},{"reference_url":"https://usn.ubuntu.com/5683-1/","reference_id":"USN-5683-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5683-1/"},{"reference_url":"https://usn.ubuntu.com/5684-1/","reference_id":"USN-5684-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5684-1/"},{"reference_url":"https://usn.ubuntu.com/5687-1/","reference_id":"USN-5687-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5687-1/"},{"reference_url":"https://usn.ubuntu.com/5695-1/","reference_id":"USN-5695-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5695-1/"},{"reference_url":"https://usn.ubuntu.com/5706-1/","reference_id":"USN-5706-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5706-1/"},{"reference_url":"https://usn.ubuntu.com/5773-1/","reference_id":"USN-5773-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5773-1/"},{"reference_url":"https://usn.ubuntu.com/5789-1/","reference_id":"USN-5789-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5789-1/"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-403.html","reference_id":"XSA-403","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-403.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994413?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1"}],"aliases":["CVE-2022-26365"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-46ad-1k9n-j3hm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4316?format=json","vulnerability_id":"VCID-4cdt-ycjx-6ub4","summary":"Linux disk/nic frontends data leaks","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-33741","reference_id":"","reference_type":"","scores":[{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05607","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05397","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.0543","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05438","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05474","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05495","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05468","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05454","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05447","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05398","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05406","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05575","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07717","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07741","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-33741"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33655","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33655"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2318","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2318"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26365","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26365"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33740","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33740"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33741","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33741"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33742","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33742"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33743","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33743"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://usn.ubuntu.com/5572-1/","reference_id":"USN-5572-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5572-1/"},{"reference_url":"https://usn.ubuntu.com/5572-2/","reference_id":"USN-5572-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5572-2/"},{"reference_url":"https://usn.ubuntu.com/5579-1/","reference_id":"USN-5579-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5579-1/"},{"reference_url":"https://usn.ubuntu.com/5623-1/","reference_id":"USN-5623-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5623-1/"},{"reference_url":"https://usn.ubuntu.com/5624-1/","reference_id":"USN-5624-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5624-1/"},{"reference_url":"https://usn.ubuntu.com/5633-1/","reference_id":"USN-5633-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5633-1/"},{"reference_url":"https://usn.ubuntu.com/5635-1/","reference_id":"USN-5635-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5635-1/"},{"reference_url":"https://usn.ubuntu.com/5640-1/","reference_id":"USN-5640-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5640-1/"},{"reference_url":"https://usn.ubuntu.com/5644-1/","reference_id":"USN-5644-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5644-1/"},{"reference_url":"https://usn.ubuntu.com/5648-1/","reference_id":"USN-5648-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5648-1/"},{"reference_url":"https://usn.ubuntu.com/5655-1/","reference_id":"USN-5655-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5655-1/"},{"reference_url":"https://usn.ubuntu.com/5668-1/","reference_id":"USN-5668-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5668-1/"},{"reference_url":"https://usn.ubuntu.com/5669-1/","reference_id":"USN-5669-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5669-1/"},{"reference_url":"https://usn.ubuntu.com/5669-2/","reference_id":"USN-5669-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5669-2/"},{"reference_url":"https://usn.ubuntu.com/5677-1/","reference_id":"USN-5677-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5677-1/"},{"reference_url":"https://usn.ubuntu.com/5678-1/","reference_id":"USN-5678-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5678-1/"},{"reference_url":"https://usn.ubuntu.com/5679-1/","reference_id":"USN-5679-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5679-1/"},{"reference_url":"https://usn.ubuntu.com/5682-1/","reference_id":"USN-5682-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5682-1/"},{"reference_url":"https://usn.ubuntu.com/5683-1/","reference_id":"USN-5683-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5683-1/"},{"reference_url":"https://usn.ubuntu.com/5684-1/","reference_id":"USN-5684-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5684-1/"},{"reference_url":"https://usn.ubuntu.com/5687-1/","reference_id":"USN-5687-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5687-1/"},{"reference_url":"https://usn.ubuntu.com/5695-1/","reference_id":"USN-5695-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5695-1/"},{"reference_url":"https://usn.ubuntu.com/5706-1/","reference_id":"USN-5706-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5706-1/"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-403.html","reference_id":"XSA-403","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-403.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994413?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1"}],"aliases":["CVE-2022-33741","XSA-403"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4cdt-ycjx-6ub4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4387?format=json","vulnerability_id":"VCID-4k7p-3g95-n7dm","summary":"Deadlock in x86 HVM standard VGA handling","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-45818","reference_id":"","reference_type":"","scores":[{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38139","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38162","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00202","scoring_system":"epss","scoring_elements":"0.42152","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00202","scoring_system":"epss","scoring_elements":"0.42306","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00202","scoring_system":"epss","scoring_elements":"0.42239","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00202","scoring_system":"epss","scoring_elements":"0.42234","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00202","scoring_system":"epss","scoring_elements":"0.4234","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00202","scoring_system":"epss","scoring_elements":"0.42388","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00202","scoring_system":"epss","scoring_elements":"0.42396","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00202","scoring_system":"epss","scoring_elements":"0.42418","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00202","scoring_system":"epss","scoring_elements":"0.42382","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00202","scoring_system":"epss","scoring_elements":"0.42354","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00202","scoring_system":"epss","scoring_elements":"0.42403","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00202","scoring_system":"epss","scoring_elements":"0.42378","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-45818"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45818","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45818"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://xenbits.xenproject.org/xsa/advisory-463.html","reference_id":"advisory-463.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-31T18:59:24Z/"}],"url":"https://xenbits.xenproject.org/xsa/advisory-463.html"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-463.html","reference_id":"XSA-463","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-463.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994413?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1"}],"aliases":["CVE-2024-45818","XSA-463"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4k7p-3g95-n7dm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4407?format=json","vulnerability_id":"VCID-4pra-prf3-1uff","summary":"Incorrect removal of permissions on PCI device unplug","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-58149","reference_id":"","reference_type":"","scores":[{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11486","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11656","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11634","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11572","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11701","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17679","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17836","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17743","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.1772","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.1794","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17895","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17847","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17789","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17798","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-58149"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58149","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58149"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120075","reference_id":"1120075","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120075"},{"reference_url":"https://xenbits.xenproject.org/xsa/advisory-476.html","reference_id":"advisory-476.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-03T14:24:29Z/"}],"url":"https://xenbits.xenproject.org/xsa/advisory-476.html"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-476.html","reference_id":"XSA-476","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-476.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994413?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1"}],"aliases":["CVE-2025-58149","XSA-476"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4pra-prf3-1uff"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4373?format=json","vulnerability_id":"VCID-4rmg-db7g-u3hs","summary":"pci: phantom functions assigned to incorrect contexts","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-46839.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-46839.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-46839","reference_id":"","reference_type":"","scores":[{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.4893","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48913","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48959","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.49005","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.49001","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48955","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48909","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48963","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48961","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48977","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48951","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-46839"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46839","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46839"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270533","reference_id":"2270533","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270533"},{"reference_url":"https://xenbits.xenproject.org/xsa/advisory-449.html","reference_id":"advisory-449.html","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-06T14:00:00Z/"}],"url":"https://xenbits.xenproject.org/xsa/advisory-449.html"},{"reference_url":"https://security.gentoo.org/glsa/202409-10","reference_id":"GLSA-202409-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-10"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-449.html","reference_id":"XSA-449","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-449.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994413?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1"}],"aliases":["CVE-2023-46839","XSA-449"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4rmg-db7g-u3hs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4358?format=json","vulnerability_id":"VCID-5ktg-bhh1-ubbz","summary":"arm: Guests can trigger a deadlock on Cortex-A77","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-34320","reference_id":"","reference_type":"","scores":[{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28247","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28734","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28782","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28589","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28655","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28695","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28697","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28653","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28605","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28625","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.286","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28551","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28435","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28323","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-34320"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34320","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34320"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.gentoo.org/glsa/202409-10","reference_id":"GLSA-202409-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-10"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-436.html","reference_id":"XSA-436","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-436.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994413?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1"}],"aliases":["CVE-2023-34320","XSA-436"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5ktg-bhh1-ubbz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4391?format=json","vulnerability_id":"VCID-5u88-jt28-cfb6","summary":"deadlock potential with VT-d and legacy PCI device pass-through","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-1713","reference_id":"","reference_type":"","scores":[{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24787","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25699","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25689","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25643","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.30582","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.30994","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.30976","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.30943","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.30784","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.30665","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.31009","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.30964","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.44966","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.44946","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-1713"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1713","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1713"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://xenbits.xenproject.org/xsa/advisory-467.html","reference_id":"advisory-467.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-17T14:17:20Z/"}],"url":"https://xenbits.xenproject.org/xsa/advisory-467.html"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-467.html","reference_id":"XSA-467","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-467.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994413?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1"}],"aliases":["CVE-2025-1713","XSA-467"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5u88-jt28-cfb6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4368?format=json","vulnerability_id":"VCID-6dax-cddv-7bbs","summary":"x86/AMD: Debug Mask handling","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-34328","reference_id":"","reference_type":"","scores":[{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29567","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29998","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.30046","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.2986","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29921","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29958","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29963","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29916","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29867","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29885","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29865","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29819","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29742","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29629","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-34328"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34328","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34328"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.gentoo.org/glsa/202409-10","reference_id":"GLSA-202409-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-10"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-444.html","reference_id":"XSA-444","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-444.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994413?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1"}],"aliases":["CVE-2023-34328","XSA-444"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6dax-cddv-7bbs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4367?format=json","vulnerability_id":"VCID-6jqj-2qwn-8qd9","summary":"x86/AMD: Debug Mask handling","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-34327","reference_id":"","reference_type":"","scores":[{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29567","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29998","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29819","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29742","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29629","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.30046","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.2986","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29921","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29958","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29963","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29916","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29867","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29885","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29865","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-34327"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34327","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34327"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://xenbits.xenproject.org/xsa/advisory-444.html","reference_id":"advisory-444.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:36:52Z/"}],"url":"https://xenbits.xenproject.org/xsa/advisory-444.html"},{"reference_url":"https://security.gentoo.org/glsa/202409-10","reference_id":"GLSA-202409-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-10"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-444.html","reference_id":"XSA-444","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-444.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994413?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1"}],"aliases":["CVE-2023-34327"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6jqj-2qwn-8qd9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4365?format=json","vulnerability_id":"VCID-8k1q-b2kj-w7hh","summary":"Multiple vulnerabilities in libfsimage disk handling","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-34325","reference_id":"","reference_type":"","scores":[{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.2128","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21614","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21449","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21301","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.213","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21671","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21426","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21503","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21562","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21573","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21535","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21479","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21475","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.2148","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-34325"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34325","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34325"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://xenbits.xenproject.org/xsa/advisory-443.html","reference_id":"advisory-443.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-30T18:38:25Z/"}],"url":"https://xenbits.xenproject.org/xsa/advisory-443.html"},{"reference_url":"https://security.gentoo.org/glsa/202409-10","reference_id":"GLSA-202409-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-10"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-443.html","reference_id":"XSA-443","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-443.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994413?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1"}],"aliases":["CVE-2023-34325","XSA-443"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8k1q-b2kj-w7hh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4361?format=json","vulnerability_id":"VCID-8tv5-zxmm-r3fk","summary":"x86/AMD: Divide speculative information leak","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-20588.json","reference_id":"","reference_type":"","scores":[{"value":"6.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-20588.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-20588","reference_id":"","reference_type":"","scores":[{"value":"0.06701","scoring_system":"epss","scoring_elements":"0.91275","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06701","scoring_system":"epss","scoring_elements":"0.91286","published_at":"2026-04-26T12:55:00Z"},{"value":"0.06872","scoring_system":"epss","scoring_elements":"0.91406","published_at":"2026-04-29T12:55:00Z"},{"value":"0.07781","scoring_system":"epss","scoring_elements":"0.91965","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07781","scoring_system":"epss","scoring_elements":"0.91933","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07781","scoring_system":"epss","scoring_elements":"0.9194","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07781","scoring_system":"epss","scoring_elements":"0.91947","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07781","scoring_system":"epss","scoring_elements":"0.9196","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07781","scoring_system":"epss","scoring_elements":"0.9198","published_at":"2026-04-18T12:55:00Z"},{"value":"0.07781","scoring_system":"epss","scoring_elements":"0.91983","published_at":"2026-04-16T12:55:00Z"},{"value":"0.07781","scoring_system":"epss","scoring_elements":"0.91963","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07781","scoring_system":"epss","scoring_elements":"0.91967","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07781","scoring_system":"epss","scoring_elements":"0.91968","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-20588"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/09/27/1","reference_id":"1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/09/27/1"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/10/04/1","reference_id":"1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/10/04/1"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/10/03/12","reference_id":"12","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/10/03/12"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/10/03/13","reference_id":"13","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/10/03/13"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/10/03/14","reference_id":"14","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/10/03/14"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/10/03/15","reference_id":"15","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/10/03/15"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/10/03/16","reference_id":"16","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/10/03/16"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/10/04/2","reference_id":"2","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/10/04/2"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2230125","reference_id":"2230125","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2230125"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/09/25/3","reference_id":"3","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/09/25/3"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/10/04/3","reference_id":"3","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/10/04/3"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/09/25/4","reference_id":"4","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/09/25/4"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/10/04/4","reference_id":"4","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/10/04/4"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/09/25/5","reference_id":"5","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/09/25/5"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/09/26/5","reference_id":"5","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/09/26/5"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/09/25/7","reference_id":"7","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/09/25/7"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/09/25/8","reference_id":"8","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/09/25/8"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/09/26/8","reference_id":"8","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/09/26/8"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/09/26/9","reference_id":"9","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/09/26/9"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/10/03/9","reference_id":"9","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/10/03/9"},{"reference_url":"http://xenbits.xen.org/xsa/advisory-439.html","reference_id":"advisory-439.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/"}],"url":"http://xenbits.xen.org/xsa/advisory-439.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AGZCACEHT6ZZZGG36QQMGROBM4FLWYJX/","reference_id":"AGZCACEHT6ZZZGG36QQMGROBM4FLWYJX","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AGZCACEHT6ZZZGG36QQMGROBM4FLWYJX/"},{"reference_url":"https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7007","reference_id":"AMD-SB-7007","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/"}],"url":"https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7007"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DIOYP4ZOBML4RCUM3MHRFZUQL445MZM3/","reference_id":"DIOYP4ZOBML4RCUM3MHRFZUQL445MZM3","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DIOYP4ZOBML4RCUM3MHRFZUQL445MZM3/"},{"reference_url":"https://www.debian.org/security/2023/dsa-5480","reference_id":"dsa-5480","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/"}],"url":"https://www.debian.org/security/2023/dsa-5480"},{"reference_url":"https://www.debian.org/security/2023/dsa-5492","reference_id":"dsa-5492","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/"}],"url":"https://www.debian.org/security/2023/dsa-5492"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJTUVYZMP6BNF342DS3W7XGOGXC6JPN5/","reference_id":"KJTUVYZMP6BNF342DS3W7XGOGXC6JPN5","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJTUVYZMP6BNF342DS3W7XGOGXC6JPN5/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html","reference_id":"msg00027.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240531-0005/","reference_id":"ntap-20240531-0005","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240531-0005/"},{"reference_url":"https://usn.ubuntu.com/6383-1/","reference_id":"USN-6383-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6383-1/"},{"reference_url":"https://usn.ubuntu.com/6384-1/","reference_id":"USN-6384-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6384-1/"},{"reference_url":"https://usn.ubuntu.com/6386-1/","reference_id":"USN-6386-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6386-1/"},{"reference_url":"https://usn.ubuntu.com/6386-2/","reference_id":"USN-6386-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6386-2/"},{"reference_url":"https://usn.ubuntu.com/6386-3/","reference_id":"USN-6386-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6386-3/"},{"reference_url":"https://usn.ubuntu.com/6387-1/","reference_id":"USN-6387-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6387-1/"},{"reference_url":"https://usn.ubuntu.com/6387-2/","reference_id":"USN-6387-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6387-2/"},{"reference_url":"https://usn.ubuntu.com/6466-1/","reference_id":"USN-6466-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6466-1/"},{"reference_url":"https://usn.ubuntu.com/6577-1/","reference_id":"USN-6577-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6577-1/"},{"reference_url":"https://usn.ubuntu.com/6602-1/","reference_id":"USN-6602-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6602-1/"},{"reference_url":"https://usn.ubuntu.com/6604-1/","reference_id":"USN-6604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6604-1/"},{"reference_url":"https://usn.ubuntu.com/6604-2/","reference_id":"USN-6604-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6604-2/"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-439.html","reference_id":"XSA-439","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-439.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994413?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1"}],"aliases":["CVE-2023-20588","XSA-439"],"risk_score":2.7,"exploitability":"0.5","weighted_severity":"5.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8tv5-zxmm-r3fk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4362?format=json","vulnerability_id":"VCID-97zm-r9b6-uqdu","summary":"xenstored: A transaction conflict can crash C Xenstored","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-34323","reference_id":"","reference_type":"","scores":[{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24872","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.25175","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24991","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24929","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24917","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.25216","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24987","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.25055","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.251","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.25114","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.25074","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.2502","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.25029","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.25021","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-34323"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34323","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34323"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://xenbits.xenproject.org/xsa/advisory-440.html","reference_id":"advisory-440.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-09T16:40:56Z/"}],"url":"https://xenbits.xenproject.org/xsa/advisory-440.html"},{"reference_url":"https://security.gentoo.org/glsa/202409-10","reference_id":"GLSA-202409-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-10"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-440.html","reference_id":"XSA-440","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-440.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994413?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1"}],"aliases":["CVE-2023-34323","XSA-440"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-97zm-r9b6-uqdu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4360?format=json","vulnerability_id":"VCID-b57c-x3pw-7fb7","summary":"top-level shadow reference dropped too early for 64-bit PV guests","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-34322","reference_id":"","reference_type":"","scores":[{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18143","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18518","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18295","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18196","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.1818","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18573","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18279","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18362","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18414","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18366","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18315","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18259","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18271","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-34322"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34322","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34322"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://xenbits.xenproject.org/xsa/advisory-438.html","reference_id":"advisory-438.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-27T15:50:09Z/"}],"url":"https://xenbits.xenproject.org/xsa/advisory-438.html"},{"reference_url":"https://security.gentoo.org/glsa/202409-10","reference_id":"GLSA-202409-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-10"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-438.html","reference_id":"XSA-438","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-438.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994413?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1"}],"aliases":["CVE-2023-34322","XSA-438"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b57c-x3pw-7fb7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4370?format=json","vulnerability_id":"VCID-bhdk-jmss-4qc8","summary":"x86: BTC/SRSO fixes not fully effective","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-46836","reference_id":"","reference_type":"","scores":[{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05862","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05604","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05783","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05815","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05852","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05645","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05638","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05676","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05703","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05682","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05674","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05668","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05623","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05635","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-46836"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46836","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46836"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056928","reference_id":"1056928","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056928"},{"reference_url":"https://xenbits.xenproject.org/xsa/advisory-446.html","reference_id":"advisory-446.html","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T20:16:12Z/"}],"url":"https://xenbits.xenproject.org/xsa/advisory-446.html"},{"reference_url":"https://security.gentoo.org/glsa/202409-10","reference_id":"GLSA-202409-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-10"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-446.html","reference_id":"XSA-446","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-446.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994413?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1"}],"aliases":["CVE-2023-46836","XSA-446"],"risk_score":1.2,"exploitability":"0.5","weighted_severity":"2.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bhdk-jmss-4qc8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4377?format=json","vulnerability_id":"VCID-byu1-7n9c-5fes","summary":"GhostRace: Speculative Race Conditions","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2193.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2193.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-2193","reference_id":"","reference_type":"","scores":[{"value":"0.00889","scoring_system":"epss","scoring_elements":"0.75447","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00897","scoring_system":"epss","scoring_elements":"0.75714","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00897","scoring_system":"epss","scoring_elements":"0.75606","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00897","scoring_system":"epss","scoring_elements":"0.75587","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00897","scoring_system":"epss","scoring_elements":"0.75621","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00897","scoring_system":"epss","scoring_elements":"0.75632","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00897","scoring_system":"epss","scoring_elements":"0.75656","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00897","scoring_system":"epss","scoring_elements":"0.75638","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00897","scoring_system":"epss","scoring_elements":"0.75631","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00897","scoring_system":"epss","scoring_elements":"0.75669","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00897","scoring_system":"epss","scoring_elements":"0.75673","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00897","scoring_system":"epss","scoring_elements":"0.75658","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00897","scoring_system":"epss","scoring_elements":"0.75697","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00897","scoring_system":"epss","scoring_elements":"0.75702","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-2193"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2193","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2193"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/03/12/14","reference_id":"14","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T15:31:03Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/03/12/14"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2262051","reference_id":"2262051","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2262051"},{"reference_url":"https://kb.cert.org/vuls/id/488902","reference_id":"488902","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T15:31:03Z/"}],"url":"https://kb.cert.org/vuls/id/488902"},{"reference_url":"https://www.kb.cert.org/vuls/id/488902","reference_id":"488902","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T15:31:03Z/"}],"url":"https://www.kb.cert.org/vuls/id/488902"},{"reference_url":"https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7016.html","reference_id":"amd-sb-7016.html","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T15:31:03Z/"}],"url":"https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7016.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EIUICU6CVJUIB6BPJ7P5QTPQR5VOBHFK/","reference_id":"EIUICU6CVJUIB6BPJ7P5QTPQR5VOBHFK","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T15:31:03Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EIUICU6CVJUIB6BPJ7P5QTPQR5VOBHFK/"},{"reference_url":"https://ibm.github.io/system-security-research-updates/2024/03/12/ghostrace","reference_id":"ghostrace","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T15:31:03Z/"}],"url":"https://ibm.github.io/system-security-research-updates/2024/03/12/ghostrace"},{"reference_url":"https://www.vusec.net/projects/ghostrace/","reference_id":"ghostrace","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T15:31:03Z/"}],"url":"https://www.vusec.net/projects/ghostrace/"},{"reference_url":"https://download.vusec.net/papers/ghostrace_sec24.pdf","reference_id":"ghostrace_sec24.pdf","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T15:31:03Z/"}],"url":"https://download.vusec.net/papers/ghostrace_sec24.pdf"},{"reference_url":"https://security.gentoo.org/glsa/202409-10","reference_id":"GLSA-202409-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-10"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H63LGAQXPEVJOES73U4XK65I6DASOAAG/","reference_id":"H63LGAQXPEVJOES73U4XK65I6DASOAAG","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T15:31:03Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H63LGAQXPEVJOES73U4XK65I6DASOAAG/"},{"reference_url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=944d5fe50f3f03daacfea16300e656a1691c4a23","reference_id":"?id=944d5fe50f3f03daacfea16300e656a1691c4a23","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T15:31:03Z/"}],"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=944d5fe50f3f03daacfea16300e656a1691c4a23"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-453.html","reference_id":"XSA-453","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T15:31:03Z/"}],"url":"https://xenbits.xen.org/xsa/advisory-453.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A/","reference_id":"ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T15:31:03Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994413?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1"}],"aliases":["CVE-2024-2193","XSA-453"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-byu1-7n9c-5fes"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4403?format=json","vulnerability_id":"VCID-c4xu-szkm-1kh6","summary":"Arm issues with page refcounting","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-58145","reference_id":"","reference_type":"","scores":[{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13678","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13617","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13724","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13739","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13813","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13836","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13805","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14717","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14679","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14624","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14515","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14697","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14757","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14609","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-58145"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58145","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58145"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120075","reference_id":"1120075","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120075"},{"reference_url":"https://xenbits.xenproject.org/xsa/advisory-473.html","reference_id":"advisory-473.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-09-11T14:39:37Z/"}],"url":"https://xenbits.xenproject.org/xsa/advisory-473.html"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-473.html","reference_id":"XSA-473","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-473.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994413?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1"}],"aliases":["CVE-2025-58145"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c4xu-szkm-1kh6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4384?format=json","vulnerability_id":"VCID-ee3z-24pr-kqcm","summary":"error handling in x86 IOMMU identity mapping","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-31145","reference_id":"","reference_type":"","scores":[{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20795","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20853","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.2194","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22106","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21966","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21953","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22101","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22184","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22238","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22257","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22216","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22155","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22156","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.2215","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-31145"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31145","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31145"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://xenbits.xenproject.org/xsa/advisory-460.html","reference_id":"advisory-460.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-25T13:27:44Z/"}],"url":"https://xenbits.xenproject.org/xsa/advisory-460.html"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-460.html","reference_id":"XSA-460","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-460.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994413?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1"}],"aliases":["CVE-2024-31145","XSA-460"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ee3z-24pr-kqcm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4395?format=json","vulnerability_id":"VCID-ejhc-6yqt-gkgv","summary":"x86: Indirect Target Selection","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28956.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28956.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-28956","reference_id":"","reference_type":"","scores":[{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25696","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25764","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25806","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25577","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.2565","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25706","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45504","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45428","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.4551","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45557","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45554","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45419","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45368","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45505","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-28956"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28956","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28956"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172","reference_id":"1105172","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105193","reference_id":"1105193","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105193"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366125","reference_id":"2366125","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366125"},{"reference_url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01153.html","reference_id":"intel-sa-01153.html","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"5.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-14T14:42:03Z/"}],"url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01153.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10101","reference_id":"RHSA-2025:10101","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10101"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10102","reference_id":"RHSA-2025:10102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10103","reference_id":"RHSA-2025:10103","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10103"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10107","reference_id":"RHSA-2025:10107","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10107"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10108","reference_id":"RHSA-2025:10108","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10108"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10109","reference_id":"RHSA-2025:10109","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10109"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10111","reference_id":"RHSA-2025:10111","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10111"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10126","reference_id":"RHSA-2025:10126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10126"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10162","reference_id":"RHSA-2025:10162","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10162"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10991","reference_id":"RHSA-2025:10991","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10991"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13962","reference_id":"RHSA-2025:13962","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13962"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19962","reference_id":"RHSA-2025:19962","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19962"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:20095","reference_id":"RHSA-2025:20095","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:20095"},{"reference_url":"https://usn.ubuntu.com/7535-1/","reference_id":"USN-7535-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7535-1/"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-469.html","reference_id":"XSA-469","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-469.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994413?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1"}],"aliases":["CVE-2024-28956","XSA-469"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ejhc-6yqt-gkgv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4385?format=json","vulnerability_id":"VCID-evcg-2z3p-gbch","summary":"PCI device pass-through with shared resources","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-31146","reference_id":"","reference_type":"","scores":[{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20795","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20853","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.2194","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22106","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21966","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21953","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22101","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22184","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22238","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22257","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22216","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22155","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22156","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.2215","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-31146"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31146","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31146"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"0","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://xenbits.xenproject.org/xsa/advisory-461.html","reference_id":"advisory-461.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-25T13:14:46Z/"}],"url":"https://xenbits.xenproject.org/xsa/advisory-461.html"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-461.html","reference_id":"XSA-461","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-461.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994413?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1"}],"aliases":["CVE-2024-31146"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-evcg-2z3p-gbch"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4406?format=json","vulnerability_id":"VCID-h9hz-vur7-kyhg","summary":"x86: Incorrect input sanitisation in Viridian hypercalls","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-58148","reference_id":"","reference_type":"","scores":[{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06179","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06166","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.0626","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06221","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06197","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07718","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07807","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07764","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07742","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07782","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07769","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07753","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07667","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07654","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-58148"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58148","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58148"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120075","reference_id":"1120075","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120075"},{"reference_url":"https://xenbits.xenproject.org/xsa/advisory-475.html","reference_id":"advisory-475.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-03T14:25:18Z/"}],"url":"https://xenbits.xenproject.org/xsa/advisory-475.html"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-475.html","reference_id":"XSA-475","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-475.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994413?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1"}],"aliases":["CVE-2025-58148"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-h9hz-vur7-kyhg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4397?format=json","vulnerability_id":"VCID-j22f-mbqe-a7dk","summary":"x86: Transitive Scheduler Attacks","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-36350.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-36350.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-36350","reference_id":"","reference_type":"","scores":[{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01827","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01788","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01783","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02204","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08277","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09297","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09372","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.0942","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09434","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09405","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.0928","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09282","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.0939","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09385","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-36350"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36350","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36350"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109035","reference_id":"1109035","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109035"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2350725","reference_id":"2350725","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2350725"},{"reference_url":"https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7029.html","reference_id":"amd-sb-7029.html","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-08T20:23:14Z/"}],"url":"https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7029.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19930","reference_id":"RHSA-2025:19930","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19930"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:20095","reference_id":"RHSA-2025:20095","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:20095"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:20518","reference_id":"RHSA-2025:20518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:20518"},{"reference_url":"https://usn.ubuntu.com/7833-1/","reference_id":"USN-7833-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7833-1/"},{"reference_url":"https://usn.ubuntu.com/7833-2/","reference_id":"USN-7833-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7833-2/"},{"reference_url":"https://usn.ubuntu.com/7833-3/","reference_id":"USN-7833-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7833-3/"},{"reference_url":"https://usn.ubuntu.com/7833-4/","reference_id":"USN-7833-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7833-4/"},{"reference_url":"https://usn.ubuntu.com/7834-1/","reference_id":"USN-7834-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7834-1/"},{"reference_url":"https://usn.ubuntu.com/7848-1/","reference_id":"USN-7848-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7848-1/"},{"reference_url":"https://usn.ubuntu.com/7856-1/","reference_id":"USN-7856-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7856-1/"},{"reference_url":"https://usn.ubuntu.com/8028-1/","reference_id":"USN-8028-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-1/"},{"reference_url":"https://usn.ubuntu.com/8028-2/","reference_id":"USN-8028-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-2/"},{"reference_url":"https://usn.ubuntu.com/8028-3/","reference_id":"USN-8028-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-3/"},{"reference_url":"https://usn.ubuntu.com/8028-4/","reference_id":"USN-8028-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-4/"},{"reference_url":"https://usn.ubuntu.com/8028-5/","reference_id":"USN-8028-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-5/"},{"reference_url":"https://usn.ubuntu.com/8028-6/","reference_id":"USN-8028-6","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-6/"},{"reference_url":"https://usn.ubuntu.com/8028-7/","reference_id":"USN-8028-7","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-7/"},{"reference_url":"https://usn.ubuntu.com/8028-8/","reference_id":"USN-8028-8","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-8/"},{"reference_url":"https://usn.ubuntu.com/8031-1/","reference_id":"USN-8031-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8031-1/"},{"reference_url":"https://usn.ubuntu.com/8031-2/","reference_id":"USN-8031-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8031-2/"},{"reference_url":"https://usn.ubuntu.com/8031-3/","reference_id":"USN-8031-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8031-3/"},{"reference_url":"https://usn.ubuntu.com/8052-1/","reference_id":"USN-8052-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8052-1/"},{"reference_url":"https://usn.ubuntu.com/8052-2/","reference_id":"USN-8052-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8052-2/"},{"reference_url":"https://usn.ubuntu.com/8074-1/","reference_id":"USN-8074-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8074-1/"},{"reference_url":"https://usn.ubuntu.com/8074-2/","reference_id":"USN-8074-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8074-2/"},{"reference_url":"https://usn.ubuntu.com/8126-1/","reference_id":"USN-8126-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8126-1/"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-471.html","reference_id":"XSA-471","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-471.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994413?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1"}],"aliases":["CVE-2024-36350"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j22f-mbqe-a7dk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4376?format=json","vulnerability_id":"VCID-p2fk-8snj-x7dy","summary":"x86: Register File Data Sampling","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28746.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28746.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-28746","reference_id":"","reference_type":"","scores":[{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14976","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15014","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15012","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15419","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15947","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15885","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15693","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15683","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15761","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.1583","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15868","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15893","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15831","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15746","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-28746"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28746","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28746"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47233","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47233"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52429","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52429"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52434","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52434"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52435","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52435"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52447","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52447"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52458","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52458"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52482","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52482"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52486","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52486"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52488","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52488"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52489","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52489"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52491","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52491"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52492","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52492"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52493","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52493"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52497","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52497"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52498","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52498"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52583","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52583"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52587","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52587"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52595","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52595"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52598","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52598"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52602","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52602"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52603","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52603"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52604","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52604"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52606","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52606"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52607","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52607"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52614","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52614"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52615","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52615"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52616","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52616"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52617","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52617"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52618","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52618"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52619","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52619"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52620","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52620"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52622","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52622"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52623","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52627","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52627"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52635","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52635"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52637","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52637"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52642","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52642"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52644","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52644"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52650","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52650"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6270","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6270"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7042","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7042"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0340","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0340"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0565","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0565"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0607","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0607"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0841","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0841"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1151","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1151"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22099","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22099"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23849","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23849"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23850","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23850"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23851","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23851"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24857","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24857"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24858","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26581","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26581"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26593","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26593"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26602","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26602"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26606","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26606"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26610","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26610"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26614","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26614"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26615","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26615"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26622","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26622"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26625","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26625"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26627","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26627"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26635","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26635"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26636","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26636"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26640"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26641","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26641"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26642","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26642"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26643","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26643"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26644","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26644"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26645","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26645"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26651","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26651"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26654","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26654"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26659","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26659"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26664","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26664"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26665","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26665"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26671","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26671"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26673","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26673"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26675","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26675"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26679","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26679"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26684","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26684"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26685","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26685"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26687","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26687"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26688","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26688"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26689","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26689"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26695","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26695"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26696","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26696"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26697","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26697"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26698","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26698"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26702","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26702"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26704","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26704"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26707","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26707"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26712","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26712"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26722","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26722"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26727","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26727"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26733","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26733"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26735","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26735"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26736","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26736"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26743","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26743"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26747","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26747"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26748","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26748"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26751","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26751"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26752","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26752"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26753","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26753"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26754","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26754"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26763","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26763"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26764","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26764"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26766","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26766"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26771","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26771"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26772","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26772"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26773","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26773"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26777","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26777"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26778","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26778"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26782","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26782"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26787","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26787"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26788","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26788"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26790","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26790"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26791","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26791"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26793","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26793"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26795","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26795"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26801","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26801"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26804","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26804"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26805","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26805"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26808","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26808"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26809","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26809"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26810","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26810"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26812","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26812"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26813","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26813"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26814","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26814"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26816","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26816"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26817","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26817"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26820","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26820"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26825","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26825"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26833","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26833"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26835","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26835"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26839","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26839"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26840","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26840"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26843","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26843"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26845","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26845"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26846","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26846"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26851","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26851"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26852","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26852"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26855","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26855"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26857","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26857"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26859","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26859"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26862","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26862"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26863","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26870","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26870"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26872","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26872"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26874","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26874"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26875","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26875"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26877","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26877"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26878","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26878"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26880","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26880"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26882","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26882"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26883","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26883"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26884","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26884"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26885","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26885"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26889","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26889"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26891","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26891"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26894","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26894"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26895","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26895"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26897","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26897"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26898","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26898"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26901","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26901"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26903","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26903"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26906","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26906"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26907","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26907"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26910","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26910"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26917","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26917"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26922","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26922"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26923","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26923"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26924","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26924"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26925","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26925"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26926","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26926"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26931","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26931"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26934","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26934"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26935","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26935"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26937","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26937"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26950","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26950"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26951","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26951"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26955","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26955"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26956","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26956"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26957","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26957"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26958","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26958"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26960","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26960"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26961","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26961"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26965","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26965"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26966","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26966"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26969","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26969"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26970","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26970"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26973","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26973"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26974","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26974"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26976","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26976"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26978","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26978"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26981","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26981"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26984","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26984"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26988","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26988"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26993","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26993"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26994","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26994"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26997","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26997"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26999","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26999"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27000"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27001","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27001"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27004","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27004"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27008","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27008"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27013","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27013"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27020","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27020"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27024","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27024"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27025","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27025"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27028","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27028"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27030","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27030"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27038","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27038"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27043","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27043"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27044","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27044"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27045","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27045"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27046","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27046"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27047","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27047"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27051","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27051"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27052","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27052"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27053","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27053"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27059","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27059"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27065","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27065"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27073","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27073"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27074","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27074"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27075","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27075"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27076","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27076"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27077","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27077"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27078","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27078"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27388","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27388"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27437","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27437"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1066108","reference_id":"1066108","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1066108"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/03/12/13","reference_id":"13","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-14T18:58:08Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/03/12/13"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270700","reference_id":"2270700","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270700"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EIUICU6CVJUIB6BPJ7P5QTPQR5VOBHFK/","reference_id":"EIUICU6CVJUIB6BPJ7P5QTPQR5VOBHFK","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-14T18:58:08Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EIUICU6CVJUIB6BPJ7P5QTPQR5VOBHFK/"},{"reference_url":"https://security.gentoo.org/glsa/202409-10","reference_id":"GLSA-202409-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-10"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H63LGAQXPEVJOES73U4XK65I6DASOAAG/","reference_id":"H63LGAQXPEVJOES73U4XK65I6DASOAAG","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-14T18:58:08Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H63LGAQXPEVJOES73U4XK65I6DASOAAG/"},{"reference_url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00898.html","reference_id":"intel-sa-00898.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-14T18:58:08Z/"}],"url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00898.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/05/msg00003.html","reference_id":"msg00003.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-14T18:58:08Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/05/msg00003.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html","reference_id":"msg00017.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-14T18:58:08Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5101","reference_id":"RHSA-2024:5101","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5101"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8157","reference_id":"RHSA-2024:8157","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8157"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8158","reference_id":"RHSA-2024:8158","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8158"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8162","reference_id":"RHSA-2024:8162","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8162"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9401","reference_id":"RHSA-2024:9401","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9401"},{"reference_url":"https://usn.ubuntu.com/6797-1/","reference_id":"USN-6797-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6797-1/"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-452.html","reference_id":"XSA-452","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-452.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A/","reference_id":"ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-14T18:58:08Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994413?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1"}],"aliases":["CVE-2023-28746","XSA-452"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p2fk-8snj-x7dy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4388?format=json","vulnerability_id":"VCID-psaa-jdr7-e3fm","summary":"libxl leaks data to PVH guests via ACPI tables","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-45819","reference_id":"","reference_type":"","scores":[{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19749","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19801","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.2249","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22656","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22499","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22491","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22638","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22713","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22764","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22786","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22747","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.2269","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22706","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22703","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-45819"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45819","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45819"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://xenbits.xenproject.org/xsa/advisory-464.html","reference_id":"advisory-464.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-31T18:56:31Z/"}],"url":"https://xenbits.xenproject.org/xsa/advisory-464.html"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-464.html","reference_id":"XSA-464","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-464.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994413?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1"}],"aliases":["CVE-2024-45819","XSA-464"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-psaa-jdr7-e3fm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4315?format=json","vulnerability_id":"VCID-q3p3-tgay-6kcs","summary":"Linux disk/nic frontends data leaks","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-33740","reference_id":"","reference_type":"","scores":[{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06503","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06314","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06347","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06327","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06375","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06417","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06409","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06403","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06393","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06332","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06343","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06491","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09205","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09232","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-33740"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33655","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33655"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2318","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2318"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26365","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26365"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33740","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33740"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33741","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33741"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33742","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33742"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33743","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33743"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://usn.ubuntu.com/5572-1/","reference_id":"USN-5572-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5572-1/"},{"reference_url":"https://usn.ubuntu.com/5572-2/","reference_id":"USN-5572-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5572-2/"},{"reference_url":"https://usn.ubuntu.com/5579-1/","reference_id":"USN-5579-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5579-1/"},{"reference_url":"https://usn.ubuntu.com/5623-1/","reference_id":"USN-5623-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5623-1/"},{"reference_url":"https://usn.ubuntu.com/5624-1/","reference_id":"USN-5624-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5624-1/"},{"reference_url":"https://usn.ubuntu.com/5633-1/","reference_id":"USN-5633-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5633-1/"},{"reference_url":"https://usn.ubuntu.com/5635-1/","reference_id":"USN-5635-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5635-1/"},{"reference_url":"https://usn.ubuntu.com/5640-1/","reference_id":"USN-5640-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5640-1/"},{"reference_url":"https://usn.ubuntu.com/5644-1/","reference_id":"USN-5644-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5644-1/"},{"reference_url":"https://usn.ubuntu.com/5648-1/","reference_id":"USN-5648-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5648-1/"},{"reference_url":"https://usn.ubuntu.com/5655-1/","reference_id":"USN-5655-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5655-1/"},{"reference_url":"https://usn.ubuntu.com/5668-1/","reference_id":"USN-5668-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5668-1/"},{"reference_url":"https://usn.ubuntu.com/5669-1/","reference_id":"USN-5669-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5669-1/"},{"reference_url":"https://usn.ubuntu.com/5669-2/","reference_id":"USN-5669-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5669-2/"},{"reference_url":"https://usn.ubuntu.com/5677-1/","reference_id":"USN-5677-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5677-1/"},{"reference_url":"https://usn.ubuntu.com/5678-1/","reference_id":"USN-5678-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5678-1/"},{"reference_url":"https://usn.ubuntu.com/5679-1/","reference_id":"USN-5679-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5679-1/"},{"reference_url":"https://usn.ubuntu.com/5682-1/","reference_id":"USN-5682-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5682-1/"},{"reference_url":"https://usn.ubuntu.com/5683-1/","reference_id":"USN-5683-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5683-1/"},{"reference_url":"https://usn.ubuntu.com/5684-1/","reference_id":"USN-5684-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5684-1/"},{"reference_url":"https://usn.ubuntu.com/5687-1/","reference_id":"USN-5687-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5687-1/"},{"reference_url":"https://usn.ubuntu.com/5695-1/","reference_id":"USN-5695-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5695-1/"},{"reference_url":"https://usn.ubuntu.com/5706-1/","reference_id":"USN-5706-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5706-1/"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-403.html","reference_id":"XSA-403","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-403.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994413?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1"}],"aliases":["CVE-2022-33740"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-q3p3-tgay-6kcs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4410?format=json","vulnerability_id":"VCID-qpfc-3296-9ub3","summary":"x86: incomplete IBPB for vCPU isolation","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-23553","reference_id":"","reference_type":"","scores":[{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07141","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07092","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07522","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07629","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07576","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07553","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07526","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07584","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07604","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07603","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.0759","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07577","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.075","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07488","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-23553"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23553","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23553"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://xenbits.xenproject.org/xsa/advisory-479.html","reference_id":"advisory-479.html","reference_type":"","scores":[{"value":"2.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-28T16:40:38Z/"}],"url":"https://xenbits.xenproject.org/xsa/advisory-479.html"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-479.html","reference_id":"XSA-479","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-479.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1054735?format=json","purl":"pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1"}],"aliases":["CVE-2026-23553","XSA-479"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qpfc-3296-9ub3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4412?format=json","vulnerability_id":"VCID-qsma-2ufh-jybe","summary":"Xenstored DoS by unprivileged domain","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-23555","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03282","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03345","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03408","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03292","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03357","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03372","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03377","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03397","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03355","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03327","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03306","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04132","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0408","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04099","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-23555"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23555","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23555"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://xenbits.xenproject.org/xsa/advisory-481.html","reference_id":"advisory-481.html","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-23T14:11:41Z/"}],"url":"https://xenbits.xenproject.org/xsa/advisory-481.html"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-481.html","reference_id":"XSA-481","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-481.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994413?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1"}],"aliases":["CVE-2026-23555","XSA-481"],"risk_score":1.8,"exploitability":"0.5","weighted_severity":"3.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qsma-2ufh-jybe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4386?format=json","vulnerability_id":"VCID-rdub-9bhg-nbc6","summary":"x86: Deadlock in vlapic_error()","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-45817","reference_id":"","reference_type":"","scores":[{"value":"0.00501","scoring_system":"epss","scoring_elements":"0.66056","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00501","scoring_system":"epss","scoring_elements":"0.66026","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00501","scoring_system":"epss","scoring_elements":"0.66046","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00501","scoring_system":"epss","scoring_elements":"0.66057","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00501","scoring_system":"epss","scoring_elements":"0.65955","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00501","scoring_system":"epss","scoring_elements":"0.65985","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00501","scoring_system":"epss","scoring_elements":"0.6595","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00501","scoring_system":"epss","scoring_elements":"0.66002","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00501","scoring_system":"epss","scoring_elements":"0.66014","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00501","scoring_system":"epss","scoring_elements":"0.66033","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00501","scoring_system":"epss","scoring_elements":"0.66019","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00501","scoring_system":"epss","scoring_elements":"0.65989","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00501","scoring_system":"epss","scoring_elements":"0.66025","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00501","scoring_system":"epss","scoring_elements":"0.66039","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-45817"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45817","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45817"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://xenbits.xenproject.org/xsa/advisory-462.html","reference_id":"advisory-462.html","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T13:35:45Z/"}],"url":"https://xenbits.xenproject.org/xsa/advisory-462.html"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-462.html","reference_id":"XSA-462","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-462.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994413?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1"}],"aliases":["CVE-2024-45817","XSA-462"],"risk_score":1.8,"exploitability":"0.5","weighted_severity":"3.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rdub-9bhg-nbc6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4371?format=json","vulnerability_id":"VCID-rk2f-yqbb-nyd2","summary":"arm32: The cache may not be properly cleaned/invalidated (take two)","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-46837","reference_id":"","reference_type":"","scores":[{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23587","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23782","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.2377","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23749","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23633","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23622","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.2391","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23951","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.2374","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.2381","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23857","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23872","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23827","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23771","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-46837"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46837","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46837"},{"reference_url":"https://xenbits.xenproject.org/xsa/advisory-447.html","reference_id":"advisory-447.html","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-01T20:11:12Z/"}],"url":"https://xenbits.xenproject.org/xsa/advisory-447.html"},{"reference_url":"https://security.gentoo.org/glsa/202409-10","reference_id":"GLSA-202409-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-10"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JFVKWYQFRUU3CAS53THTUKXEOUDWI42G/","reference_id":"JFVKWYQFRUU3CAS53THTUKXEOUDWI42G","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-01T20:11:12Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JFVKWYQFRUU3CAS53THTUKXEOUDWI42G/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XLL6SQ6IKFYXLYWITYZCRV5IBRK5G35R/","reference_id":"XLL6SQ6IKFYXLYWITYZCRV5IBRK5G35R","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-01T20:11:12Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XLL6SQ6IKFYXLYWITYZCRV5IBRK5G35R/"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-447.html","reference_id":"XSA-447","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-447.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994413?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1"}],"aliases":["CVE-2023-46837","XSA-447"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rk2f-yqbb-nyd2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4378?format=json","vulnerability_id":"VCID-rt5n-e4wq-p3gh","summary":"x86 HVM hypercalls may trigger Xen bug check","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-46842","reference_id":"","reference_type":"","scores":[{"value":"0.02093","scoring_system":"epss","scoring_elements":"0.84099","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02093","scoring_system":"epss","scoring_elements":"0.83982","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02093","scoring_system":"epss","scoring_elements":"0.84062","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02093","scoring_system":"epss","scoring_elements":"0.84088","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02093","scoring_system":"epss","scoring_elements":"0.84094","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02093","scoring_system":"epss","scoring_elements":"0.83997","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02093","scoring_system":"epss","scoring_elements":"0.84","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02093","scoring_system":"epss","scoring_elements":"0.84023","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02093","scoring_system":"epss","scoring_elements":"0.8403","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02093","scoring_system":"epss","scoring_elements":"0.84047","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02093","scoring_system":"epss","scoring_elements":"0.8404","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02093","scoring_system":"epss","scoring_elements":"0.84035","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02093","scoring_system":"epss","scoring_elements":"0.84058","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02093","scoring_system":"epss","scoring_elements":"0.84061","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-46842"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46842","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46842"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://xenbits.xenproject.org/xsa/advisory-454.html","reference_id":"advisory-454.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-24T18:23:20Z/"}],"url":"https://xenbits.xenproject.org/xsa/advisory-454.html"},{"reference_url":"https://security.gentoo.org/glsa/202409-10","reference_id":"GLSA-202409-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-10"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-454.html","reference_id":"XSA-454","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-454.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994413?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1"}],"aliases":["CVE-2023-46842","XSA-454"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rt5n-e4wq-p3gh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4402?format=json","vulnerability_id":"VCID-tjgh-waa3-wqgk","summary":"Arm issues with page refcounting","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-58144","reference_id":"","reference_type":"","scores":[{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.18107","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.18052","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18162","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18288","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18313","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18215","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.182","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19249","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19202","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19147","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19106","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.1919","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19243","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19111","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-58144"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58144","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58144"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120075","reference_id":"1120075","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120075"},{"reference_url":"https://xenbits.xenproject.org/xsa/advisory-473.html","reference_id":"advisory-473.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-09-11T14:18:50Z/"}],"url":"https://xenbits.xenproject.org/xsa/advisory-473.html"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-473.html","reference_id":"XSA-473","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-473.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994413?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1"}],"aliases":["CVE-2025-58144","XSA-473"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tjgh-waa3-wqgk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4408?format=json","vulnerability_id":"VCID-upju-tcz7-efg1","summary":"x86: buffer overrun with shadow paging + tracing","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-58150","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02996","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02981","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04374","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04303","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0432","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0434","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04206","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04238","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04253","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04237","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04222","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04198","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04168","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04177","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-58150"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58150","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58150"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://xenbits.xenproject.org/xsa/advisory-477.html","reference_id":"advisory-477.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-28T16:44:38Z/"}],"url":"https://xenbits.xenproject.org/xsa/advisory-477.html"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-477.html","reference_id":"XSA-477","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-477.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1054735?format=json","purl":"pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1"}],"aliases":["CVE-2025-58150","XSA-477"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-upju-tcz7-efg1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4398?format=json","vulnerability_id":"VCID-uv8m-bj4c-8fes","summary":"x86: Transitive Scheduler Attacks","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-36357.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-36357.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-36357","reference_id":"","reference_type":"","scores":[{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08597","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09825","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09765","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09815","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09793","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09776","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09661","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09633","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09798","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09694","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10825","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10849","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10808","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10748","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-36357"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36357","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36357"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109035","reference_id":"1109035","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109035"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2350726","reference_id":"2350726","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2350726"},{"reference_url":"https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7029.html","reference_id":"amd-sb-7029.html","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-09T13:36:59Z/"}],"url":"https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7029.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19930","reference_id":"RHSA-2025:19930","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19930"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:20095","reference_id":"RHSA-2025:20095","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:20095"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:20518","reference_id":"RHSA-2025:20518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:20518"},{"reference_url":"https://usn.ubuntu.com/7833-1/","reference_id":"USN-7833-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7833-1/"},{"reference_url":"https://usn.ubuntu.com/7833-2/","reference_id":"USN-7833-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7833-2/"},{"reference_url":"https://usn.ubuntu.com/7833-3/","reference_id":"USN-7833-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7833-3/"},{"reference_url":"https://usn.ubuntu.com/7833-4/","reference_id":"USN-7833-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7833-4/"},{"reference_url":"https://usn.ubuntu.com/7834-1/","reference_id":"USN-7834-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7834-1/"},{"reference_url":"https://usn.ubuntu.com/7848-1/","reference_id":"USN-7848-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7848-1/"},{"reference_url":"https://usn.ubuntu.com/7856-1/","reference_id":"USN-7856-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7856-1/"},{"reference_url":"https://usn.ubuntu.com/8028-1/","reference_id":"USN-8028-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-1/"},{"reference_url":"https://usn.ubuntu.com/8028-2/","reference_id":"USN-8028-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-2/"},{"reference_url":"https://usn.ubuntu.com/8028-3/","reference_id":"USN-8028-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-3/"},{"reference_url":"https://usn.ubuntu.com/8028-4/","reference_id":"USN-8028-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-4/"},{"reference_url":"https://usn.ubuntu.com/8028-5/","reference_id":"USN-8028-5","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-5/"},{"reference_url":"https://usn.ubuntu.com/8028-6/","reference_id":"USN-8028-6","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-6/"},{"reference_url":"https://usn.ubuntu.com/8028-7/","reference_id":"USN-8028-7","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-7/"},{"reference_url":"https://usn.ubuntu.com/8028-8/","reference_id":"USN-8028-8","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8028-8/"},{"reference_url":"https://usn.ubuntu.com/8031-1/","reference_id":"USN-8031-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8031-1/"},{"reference_url":"https://usn.ubuntu.com/8031-2/","reference_id":"USN-8031-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8031-2/"},{"reference_url":"https://usn.ubuntu.com/8031-3/","reference_id":"USN-8031-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8031-3/"},{"reference_url":"https://usn.ubuntu.com/8052-1/","reference_id":"USN-8052-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8052-1/"},{"reference_url":"https://usn.ubuntu.com/8052-2/","reference_id":"USN-8052-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8052-2/"},{"reference_url":"https://usn.ubuntu.com/8074-1/","reference_id":"USN-8074-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8074-1/"},{"reference_url":"https://usn.ubuntu.com/8074-2/","reference_id":"USN-8074-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8074-2/"},{"reference_url":"https://usn.ubuntu.com/8126-1/","reference_id":"USN-8126-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8126-1/"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-471.html","reference_id":"XSA-471","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-471.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994413?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1"}],"aliases":["CVE-2024-36357","XSA-471"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uv8m-bj4c-8fes"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4401?format=json","vulnerability_id":"VCID-vv23-mvyn-87hg","summary":"Mutiple vulnerabilities in the Viridian interface","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-58143","reference_id":"","reference_type":"","scores":[{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14661","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14732","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15748","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15762","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.1572","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15702","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15764","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16805","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16688","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16773","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16827","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16761","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16703","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16641","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-58143"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58143","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58143"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120075","reference_id":"1120075","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120075"},{"reference_url":"https://xenbits.xenproject.org/xsa/advisory-472.html","reference_id":"advisory-472.html","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-11T14:21:09Z/"}],"url":"https://xenbits.xenproject.org/xsa/advisory-472.html"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-472.html","reference_id":"XSA-472","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-472.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994413?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1"}],"aliases":["CVE-2025-58143"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"4.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vv23-mvyn-87hg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4369?format=json","vulnerability_id":"VCID-wd4s-jxuf-skbp","summary":"x86/AMD: mismatch in IOMMU quarantine page table levels","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-46835","reference_id":"","reference_type":"","scores":[{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24807","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.25096","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.2492","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24863","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24851","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.25134","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24909","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24977","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.25022","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.25036","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24996","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24941","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24955","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24947","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-46835"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46835","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46835"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056928","reference_id":"1056928","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056928"},{"reference_url":"https://xenbits.xenproject.org/xsa/advisory-445.html","reference_id":"advisory-445.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-12T04:00:28Z/"}],"url":"https://xenbits.xenproject.org/xsa/advisory-445.html"},{"reference_url":"https://security.gentoo.org/glsa/202409-10","reference_id":"GLSA-202409-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-10"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-445.html","reference_id":"XSA-445","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-445.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994413?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1"}],"aliases":["CVE-2023-46835","XSA-445"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wd4s-jxuf-skbp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4400?format=json","vulnerability_id":"VCID-wz1m-aeaf-nkg7","summary":"Mutiple vulnerabilities in the Viridian interface","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-58142","reference_id":"","reference_type":"","scores":[{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0691","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0696","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07717","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07643","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07611","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07576","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07665","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08147","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08071","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08132","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08154","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08127","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.0811","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08017","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-58142"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58142","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58142"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120075","reference_id":"1120075","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120075"},{"reference_url":"https://xenbits.xenproject.org/xsa/advisory-472.html","reference_id":"advisory-472.html","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-11T14:24:28Z/"}],"url":"https://xenbits.xenproject.org/xsa/advisory-472.html"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-472.html","reference_id":"XSA-472","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-472.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994413?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1"}],"aliases":["CVE-2025-58142","XSA-472"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"4.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wz1m-aeaf-nkg7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4396?format=json","vulnerability_id":"VCID-xqpz-y83m-4uc4","summary":"x86: Incorrect stubs exception handling for flags recovery","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-27465","reference_id":"","reference_type":"","scores":[{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23924","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24105","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24037","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.2399","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24143","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25463","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25569","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25519","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25511","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25711","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.2567","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25612","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25613","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25598","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-27465"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27465","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27465"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120075","reference_id":"1120075","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120075"},{"reference_url":"https://xenbits.xenproject.org/xsa/advisory-470.html","reference_id":"advisory-470.html","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-16T20:46:06Z/"}],"url":"https://xenbits.xenproject.org/xsa/advisory-470.html"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-470.html","reference_id":"XSA-470","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-470.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994413?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1"}],"aliases":["CVE-2025-27465","XSA-470"],"risk_score":1.8,"exploitability":"0.5","weighted_severity":"3.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xqpz-y83m-4uc4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4364?format=json","vulnerability_id":"VCID-ye1t-qhtx-sucm","summary":"x86/AMD: missing IOMMU TLB flushing","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-34326","reference_id":"","reference_type":"","scores":[{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.27848","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28325","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.2812","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28037","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.27924","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28368","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28158","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28224","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28266","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28271","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28228","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28169","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28183","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28165","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-34326"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34326","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34326"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://xenbits.xenproject.org/xsa/advisory-442.html","reference_id":"advisory-442.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-14T20:27:29Z/"}],"url":"https://xenbits.xenproject.org/xsa/advisory-442.html"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-442.html","reference_id":"XSA-442","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-442.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994413?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1"}],"aliases":["CVE-2023-34326","XSA-442"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ye1t-qhtx-sucm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4379?format=json","vulnerability_id":"VCID-z9rm-9p2q-wfag","summary":"x86: Incorrect logic for BTC/SRSO mitigations","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-31142","reference_id":"","reference_type":"","scores":[{"value":"0.03118","scoring_system":"epss","scoring_elements":"0.8688","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03118","scoring_system":"epss","scoring_elements":"0.86856","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03118","scoring_system":"epss","scoring_elements":"0.86872","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03118","scoring_system":"epss","scoring_elements":"0.86879","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03118","scoring_system":"epss","scoring_elements":"0.86789","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03118","scoring_system":"epss","scoring_elements":"0.86808","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03118","scoring_system":"epss","scoring_elements":"0.86802","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03118","scoring_system":"epss","scoring_elements":"0.86821","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03118","scoring_system":"epss","scoring_elements":"0.8683","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03118","scoring_system":"epss","scoring_elements":"0.86843","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03118","scoring_system":"epss","scoring_elements":"0.86839","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03118","scoring_system":"epss","scoring_elements":"0.86835","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03118","scoring_system":"epss","scoring_elements":"0.86852","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-31142"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31142","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31142"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://xenbits.xenproject.org/xsa/advisory-455.html","reference_id":"advisory-455.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-20T13:51:28Z/"}],"url":"https://xenbits.xenproject.org/xsa/advisory-455.html"},{"reference_url":"https://security.gentoo.org/glsa/202409-10","reference_id":"GLSA-202409-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-10"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-455.html","reference_id":"XSA-455","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-455.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994413?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1"}],"aliases":["CVE-2024-31142","XSA-455"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-z9rm-9p2q-wfag"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4317?format=json","vulnerability_id":"VCID-zkeg-d5d5-vbda","summary":"Linux disk/nic frontends data leaks","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-33742","reference_id":"","reference_type":"","scores":[{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06317","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06103","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06133","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06117","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.0616","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06197","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06188","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06183","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06175","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06134","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06146","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06299","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08915","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08931","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-33742"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33655","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33655"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2318","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2318"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26365","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26365"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33740","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33740"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33741","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33741"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33742","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33742"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33743","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33743"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://usn.ubuntu.com/5623-1/","reference_id":"USN-5623-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5623-1/"},{"reference_url":"https://usn.ubuntu.com/5624-1/","reference_id":"USN-5624-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5624-1/"},{"reference_url":"https://usn.ubuntu.com/5633-1/","reference_id":"USN-5633-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5633-1/"},{"reference_url":"https://usn.ubuntu.com/5635-1/","reference_id":"USN-5635-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5635-1/"},{"reference_url":"https://usn.ubuntu.com/5640-1/","reference_id":"USN-5640-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5640-1/"},{"reference_url":"https://usn.ubuntu.com/5644-1/","reference_id":"USN-5644-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5644-1/"},{"reference_url":"https://usn.ubuntu.com/5648-1/","reference_id":"USN-5648-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5648-1/"},{"reference_url":"https://usn.ubuntu.com/5655-1/","reference_id":"USN-5655-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5655-1/"},{"reference_url":"https://usn.ubuntu.com/5668-1/","reference_id":"USN-5668-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5668-1/"},{"reference_url":"https://usn.ubuntu.com/5669-1/","reference_id":"USN-5669-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5669-1/"},{"reference_url":"https://usn.ubuntu.com/5669-2/","reference_id":"USN-5669-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5669-2/"},{"reference_url":"https://usn.ubuntu.com/5677-1/","reference_id":"USN-5677-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5677-1/"},{"reference_url":"https://usn.ubuntu.com/5678-1/","reference_id":"USN-5678-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5678-1/"},{"reference_url":"https://usn.ubuntu.com/5679-1/","reference_id":"USN-5679-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5679-1/"},{"reference_url":"https://usn.ubuntu.com/5682-1/","reference_id":"USN-5682-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5682-1/"},{"reference_url":"https://usn.ubuntu.com/5683-1/","reference_id":"USN-5683-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5683-1/"},{"reference_url":"https://usn.ubuntu.com/5684-1/","reference_id":"USN-5684-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5684-1/"},{"reference_url":"https://usn.ubuntu.com/5687-1/","reference_id":"USN-5687-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5687-1/"},{"reference_url":"https://usn.ubuntu.com/5695-1/","reference_id":"USN-5695-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5695-1/"},{"reference_url":"https://usn.ubuntu.com/5706-1/","reference_id":"USN-5706-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5706-1/"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-403.html","reference_id":"XSA-403","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-403.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994413?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1"}],"aliases":["CVE-2022-33742"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zkeg-d5d5-vbda"}],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4255?format=json","vulnerability_id":"VCID-1wgc-r96w-7kg9","summary":"IRQ vector leak on x86","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3308","reference_id":"","reference_type":"","scores":[{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18027","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.1823","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18381","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18435","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18139","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18223","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18277","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18279","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18233","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18181","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18126","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18138","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18172","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18083","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.1806","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3308"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3308","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3308"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=981052","reference_id":"981052","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=981052"},{"reference_url":"https://security.gentoo.org/glsa/202107-30","reference_id":"GLSA-202107-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-30"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-360.html","reference_id":"XSA-360","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-360.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2021-3308","XSA-360"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1wgc-r96w-7kg9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4274?format=json","vulnerability_id":"VCID-1wtd-67ef-1qej","summary":"IOMMU page mapping issues on x86","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-28695","reference_id":"","reference_type":"","scores":[{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33164","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.3341","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.3355","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33583","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33422","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33466","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.335","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33504","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33462","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33439","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33475","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.3345","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33417","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33263","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33243","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-28695"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28694","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28694"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28695","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28695"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28696","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28696"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28697","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28697"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28698","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28698"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28699","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28699"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28700","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28700"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28701","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28701"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.gentoo.org/glsa/202208-23","reference_id":"GLSA-202208-23","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-23"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-378.html","reference_id":"XSA-378","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-378.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2021-28695"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1wtd-67ef-1qej"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4227?format=json","vulnerability_id":"VCID-1x3w-n7ms-eqeh","summary":"oxenstored memory leak in reset_watches","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-29485","reference_id":"","reference_type":"","scores":[{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19303","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19538","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19679","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19726","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19449","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19529","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19581","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19584","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19536","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19477","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19439","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19447","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19459","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19351","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19343","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-29485"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29479","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29479"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29481","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29481"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29482","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29482"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29483","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29483"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29484","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29484"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29485","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29485"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29486","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29486"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29566","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29566"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29570","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29570"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29571","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29571"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-330.html","reference_id":"XSA-330","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-330.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037808?format=json","purl":"pkg:deb/debian/xen@4.11.4%2B107-gef32c7afa2-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1wgc-r96w-7kg9"},{"vulnerability":"VCID-1wtd-67ef-1qej"},{"vulnerability":"VCID-1x3w-n7ms-eqeh"},{"vulnerability":"VCID-28t2-hng7-tfe5"},{"vulnerability":"VCID-2n9p-6t7s-kqc5"},{"vulnerability":"VCID-2uap-2vm1-efcr"},{"vulnerability":"VCID-32w3-vmcb-wfd9"},{"vulnerability":"VCID-34gr-dtsz-1fab"},{"vulnerability":"VCID-34ng-ftbx-e3cm"},{"vulnerability":"VCID-39t8-p1q7-eyag"},{"vulnerability":"VCID-3d53-4qtr-myhm"},{"vulnerability":"VCID-3pxf-xndw-5fft"},{"vulnerability":"VCID-3whm-8fyv-zyhd"},{"vulnerability":"VCID-416b-93m6-jyby"},{"vulnerability":"VCID-42ma-8ash-j7c8"},{"vulnerability":"VCID-4429-qf2w-jqg3"},{"vulnerability":"VCID-4spa-usqt-93b2"},{"vulnerability":"VCID-5cw7-rv5f-jfaq"},{"vulnerability":"VCID-5dbd-kz24-6fc1"},{"vulnerability":"VCID-6kh6-edk7-xkcc"},{"vulnerability":"VCID-6xbp-t4qh-tbhv"},{"vulnerability":"VCID-77st-3475-5kdr"},{"vulnerability":"VCID-7d5b-66n7-zbe1"},{"vulnerability":"VCID-7ek3-weqx-9fhs"},{"vulnerability":"VCID-7etc-u5ya-zued"},{"vulnerability":"VCID-7t5h-jy8h-t3d4"},{"vulnerability":"VCID-7wyt-uh2c-a3ha"},{"vulnerability":"VCID-7ysh-usku-c3dz"},{"vulnerability":"VCID-7zpj-3par-s3b5"},{"vulnerability":"VCID-87tq-2me2-d3bb"},{"vulnerability":"VCID-8cb8-vq2c-q3e9"},{"vulnerability":"VCID-8r8y-8bq2-jufj"},{"vulnerability":"VCID-91hk-73kq-83g6"},{"vulnerability":"VCID-9hr5-p18q-7qb8"},{"vulnerability":"VCID-9s43-gewn-bycc"},{"vulnerability":"VCID-9zqd-3x84-43gc"},{"vulnerability":"VCID-az8d-xrb4-3ug4"},{"vulnerability":"VCID-b7tb-ns1t-fyaw"},{"vulnerability":"VCID-bc6f-wu8g-5yb4"},{"vulnerability":"VCID-bs56-1z79-uqbt"},{"vulnerability":"VCID-bxae-85uh-uyek"},{"vulnerability":"VCID-bxb7-7gpw-qybb"},{"vulnerability":"VCID-bzve-5gwu-8ydb"},{"vulnerability":"VCID-csy7-esn4-u3gq"},{"vulnerability":"VCID-d3ad-6tme-bfem"},{"vulnerability":"VCID-dfjm-gwzm-jqbt"},{"vulnerability":"VCID-dgm4-ye4m-1fcq"},{"vulnerability":"VCID-dj1v-h79p-9ydz"},{"vulnerability":"VCID-dqy9-zkvw-e3gk"},{"vulnerability":"VCID-drhd-ytb7-u3em"},{"vulnerability":"VCID-e96u-uwba-kfg5"},{"vulnerability":"VCID-eb8v-p31a-yuhu"},{"vulnerability":"VCID-eka3-u8e5-3uad"},{"vulnerability":"VCID-ep7n-um5m-ekgk"},{"vulnerability":"VCID-fekb-fbhz-y7g7"},{"vulnerability":"VCID-fhbs-3nvf-tbha"},{"vulnerability":"VCID-fqt9-2esb-ffan"},{"vulnerability":"VCID-g72t-7kx1-abcs"},{"vulnerability":"VCID-gdsj-4cbx-ufep"},{"vulnerability":"VCID-gj1u-mbaj-kyc5"},{"vulnerability":"VCID-h9c6-yw5r-v3ex"},{"vulnerability":"VCID-hg4z-ad3f-fbc2"},{"vulnerability":"VCID-hsau-swt9-kyf7"},{"vulnerability":"VCID-hx7j-eymk-4ygk"},{"vulnerability":"VCID-hyup-47wa-pfac"},{"vulnerability":"VCID-jwdv-qe4x-yfgw"},{"vulnerability":"VCID-k5j4-3xmv-a7bk"},{"vulnerability":"VCID-kcj6-ua4t-ybgj"},{"vulnerability":"VCID-knqd-zktw-cydm"},{"vulnerability":"VCID-mcs2-ndqd-tydv"},{"vulnerability":"VCID-mf8g-nbkw-f7gr"},{"vulnerability":"VCID-n3t2-m6br-ufb3"},{"vulnerability":"VCID-n7pg-b7kc-wkew"},{"vulnerability":"VCID-ndz3-372h-8fhk"},{"vulnerability":"VCID-p3uc-18e9-skb4"},{"vulnerability":"VCID-p7ug-wwk5-63gb"},{"vulnerability":"VCID-pb8n-hmsc-syfw"},{"vulnerability":"VCID-pphm-ygb7-q7g2"},{"vulnerability":"VCID-pzt3-abab-4kdd"},{"vulnerability":"VCID-qnew-xqte-kbej"},{"vulnerability":"VCID-qprv-989b-k3d3"},{"vulnerability":"VCID-s4nf-p69f-pue8"},{"vulnerability":"VCID-td6e-x2qb-syg3"},{"vulnerability":"VCID-uunr-69dt-q7fn"},{"vulnerability":"VCID-uvcp-ad38-2kcs"},{"vulnerability":"VCID-vb2u-yc2z-ayh5"},{"vulnerability":"VCID-vs9k-akwv-h3ak"},{"vulnerability":"VCID-w2ch-guy5-6ye9"},{"vulnerability":"VCID-wh75-sc4f-qqc1"},{"vulnerability":"VCID-xcvw-eex8-j3bf"},{"vulnerability":"VCID-xe4j-gg7f-wyfa"},{"vulnerability":"VCID-z3g4-1vhq-97dj"},{"vulnerability":"VCID-z3qj-cnxq-pkgq"},{"vulnerability":"VCID-z8zf-cqkb-guge"},{"vulnerability":"VCID-zkyv-h5at-xkgq"},{"vulnerability":"VCID-zrxf-3w1d-t3ba"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.4%252B107-gef32c7afa2-1"},{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2020-29485","XSA-330"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1x3w-n7ms-eqeh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4261?format=json","vulnerability_id":"VCID-28t2-hng7-tfe5","summary":"missed flush in XSA-321 backport","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-27379","reference_id":"","reference_type":"","scores":[{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21338","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.215","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.2167","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21728","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21481","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21558","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21617","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21629","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21592","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21535","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21533","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.2154","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21509","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21363","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.2136","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-27379"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26933","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26933"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27379","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27379"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-366.html","reference_id":"XSA-366","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-366.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037808?format=json","purl":"pkg:deb/debian/xen@4.11.4%2B107-gef32c7afa2-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1wgc-r96w-7kg9"},{"vulnerability":"VCID-1wtd-67ef-1qej"},{"vulnerability":"VCID-1x3w-n7ms-eqeh"},{"vulnerability":"VCID-28t2-hng7-tfe5"},{"vulnerability":"VCID-2n9p-6t7s-kqc5"},{"vulnerability":"VCID-2uap-2vm1-efcr"},{"vulnerability":"VCID-32w3-vmcb-wfd9"},{"vulnerability":"VCID-34gr-dtsz-1fab"},{"vulnerability":"VCID-34ng-ftbx-e3cm"},{"vulnerability":"VCID-39t8-p1q7-eyag"},{"vulnerability":"VCID-3d53-4qtr-myhm"},{"vulnerability":"VCID-3pxf-xndw-5fft"},{"vulnerability":"VCID-3whm-8fyv-zyhd"},{"vulnerability":"VCID-416b-93m6-jyby"},{"vulnerability":"VCID-42ma-8ash-j7c8"},{"vulnerability":"VCID-4429-qf2w-jqg3"},{"vulnerability":"VCID-4spa-usqt-93b2"},{"vulnerability":"VCID-5cw7-rv5f-jfaq"},{"vulnerability":"VCID-5dbd-kz24-6fc1"},{"vulnerability":"VCID-6kh6-edk7-xkcc"},{"vulnerability":"VCID-6xbp-t4qh-tbhv"},{"vulnerability":"VCID-77st-3475-5kdr"},{"vulnerability":"VCID-7d5b-66n7-zbe1"},{"vulnerability":"VCID-7ek3-weqx-9fhs"},{"vulnerability":"VCID-7etc-u5ya-zued"},{"vulnerability":"VCID-7t5h-jy8h-t3d4"},{"vulnerability":"VCID-7wyt-uh2c-a3ha"},{"vulnerability":"VCID-7ysh-usku-c3dz"},{"vulnerability":"VCID-7zpj-3par-s3b5"},{"vulnerability":"VCID-87tq-2me2-d3bb"},{"vulnerability":"VCID-8cb8-vq2c-q3e9"},{"vulnerability":"VCID-8r8y-8bq2-jufj"},{"vulnerability":"VCID-91hk-73kq-83g6"},{"vulnerability":"VCID-9hr5-p18q-7qb8"},{"vulnerability":"VCID-9s43-gewn-bycc"},{"vulnerability":"VCID-9zqd-3x84-43gc"},{"vulnerability":"VCID-az8d-xrb4-3ug4"},{"vulnerability":"VCID-b7tb-ns1t-fyaw"},{"vulnerability":"VCID-bc6f-wu8g-5yb4"},{"vulnerability":"VCID-bs56-1z79-uqbt"},{"vulnerability":"VCID-bxae-85uh-uyek"},{"vulnerability":"VCID-bxb7-7gpw-qybb"},{"vulnerability":"VCID-bzve-5gwu-8ydb"},{"vulnerability":"VCID-csy7-esn4-u3gq"},{"vulnerability":"VCID-d3ad-6tme-bfem"},{"vulnerability":"VCID-dfjm-gwzm-jqbt"},{"vulnerability":"VCID-dgm4-ye4m-1fcq"},{"vulnerability":"VCID-dj1v-h79p-9ydz"},{"vulnerability":"VCID-dqy9-zkvw-e3gk"},{"vulnerability":"VCID-drhd-ytb7-u3em"},{"vulnerability":"VCID-e96u-uwba-kfg5"},{"vulnerability":"VCID-eb8v-p31a-yuhu"},{"vulnerability":"VCID-eka3-u8e5-3uad"},{"vulnerability":"VCID-ep7n-um5m-ekgk"},{"vulnerability":"VCID-fekb-fbhz-y7g7"},{"vulnerability":"VCID-fhbs-3nvf-tbha"},{"vulnerability":"VCID-fqt9-2esb-ffan"},{"vulnerability":"VCID-g72t-7kx1-abcs"},{"vulnerability":"VCID-gdsj-4cbx-ufep"},{"vulnerability":"VCID-gj1u-mbaj-kyc5"},{"vulnerability":"VCID-h9c6-yw5r-v3ex"},{"vulnerability":"VCID-hg4z-ad3f-fbc2"},{"vulnerability":"VCID-hsau-swt9-kyf7"},{"vulnerability":"VCID-hx7j-eymk-4ygk"},{"vulnerability":"VCID-hyup-47wa-pfac"},{"vulnerability":"VCID-jwdv-qe4x-yfgw"},{"vulnerability":"VCID-k5j4-3xmv-a7bk"},{"vulnerability":"VCID-kcj6-ua4t-ybgj"},{"vulnerability":"VCID-knqd-zktw-cydm"},{"vulnerability":"VCID-mcs2-ndqd-tydv"},{"vulnerability":"VCID-mf8g-nbkw-f7gr"},{"vulnerability":"VCID-n3t2-m6br-ufb3"},{"vulnerability":"VCID-n7pg-b7kc-wkew"},{"vulnerability":"VCID-ndz3-372h-8fhk"},{"vulnerability":"VCID-p3uc-18e9-skb4"},{"vulnerability":"VCID-p7ug-wwk5-63gb"},{"vulnerability":"VCID-pb8n-hmsc-syfw"},{"vulnerability":"VCID-pphm-ygb7-q7g2"},{"vulnerability":"VCID-pzt3-abab-4kdd"},{"vulnerability":"VCID-qnew-xqte-kbej"},{"vulnerability":"VCID-qprv-989b-k3d3"},{"vulnerability":"VCID-s4nf-p69f-pue8"},{"vulnerability":"VCID-td6e-x2qb-syg3"},{"vulnerability":"VCID-uunr-69dt-q7fn"},{"vulnerability":"VCID-uvcp-ad38-2kcs"},{"vulnerability":"VCID-vb2u-yc2z-ayh5"},{"vulnerability":"VCID-vs9k-akwv-h3ak"},{"vulnerability":"VCID-w2ch-guy5-6ye9"},{"vulnerability":"VCID-wh75-sc4f-qqc1"},{"vulnerability":"VCID-xcvw-eex8-j3bf"},{"vulnerability":"VCID-xe4j-gg7f-wyfa"},{"vulnerability":"VCID-z3g4-1vhq-97dj"},{"vulnerability":"VCID-z3qj-cnxq-pkgq"},{"vulnerability":"VCID-z8zf-cqkb-guge"},{"vulnerability":"VCID-zkyv-h5at-xkgq"},{"vulnerability":"VCID-zrxf-3w1d-t3ba"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.4%252B107-gef32c7afa2-1"},{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2021-27379"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-28t2-hng7-tfe5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4259?format=json","vulnerability_id":"VCID-2n9p-6t7s-kqc5","summary":"arm: The cache may not be cleaned for newly allocated scrubbed pages","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-26933","reference_id":"","reference_type":"","scores":[{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23563","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23764","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23881","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23922","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23711","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23782","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23829","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23843","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23799","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23742","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23752","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.2374","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23718","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23607","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23598","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-26933"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26933","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26933"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27379","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27379"},{"reference_url":"https://security.archlinux.org/AVG-1587","reference_id":"AVG-1587","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1587"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-364.html","reference_id":"XSA-364","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-364.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037808?format=json","purl":"pkg:deb/debian/xen@4.11.4%2B107-gef32c7afa2-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1wgc-r96w-7kg9"},{"vulnerability":"VCID-1wtd-67ef-1qej"},{"vulnerability":"VCID-1x3w-n7ms-eqeh"},{"vulnerability":"VCID-28t2-hng7-tfe5"},{"vulnerability":"VCID-2n9p-6t7s-kqc5"},{"vulnerability":"VCID-2uap-2vm1-efcr"},{"vulnerability":"VCID-32w3-vmcb-wfd9"},{"vulnerability":"VCID-34gr-dtsz-1fab"},{"vulnerability":"VCID-34ng-ftbx-e3cm"},{"vulnerability":"VCID-39t8-p1q7-eyag"},{"vulnerability":"VCID-3d53-4qtr-myhm"},{"vulnerability":"VCID-3pxf-xndw-5fft"},{"vulnerability":"VCID-3whm-8fyv-zyhd"},{"vulnerability":"VCID-416b-93m6-jyby"},{"vulnerability":"VCID-42ma-8ash-j7c8"},{"vulnerability":"VCID-4429-qf2w-jqg3"},{"vulnerability":"VCID-4spa-usqt-93b2"},{"vulnerability":"VCID-5cw7-rv5f-jfaq"},{"vulnerability":"VCID-5dbd-kz24-6fc1"},{"vulnerability":"VCID-6kh6-edk7-xkcc"},{"vulnerability":"VCID-6xbp-t4qh-tbhv"},{"vulnerability":"VCID-77st-3475-5kdr"},{"vulnerability":"VCID-7d5b-66n7-zbe1"},{"vulnerability":"VCID-7ek3-weqx-9fhs"},{"vulnerability":"VCID-7etc-u5ya-zued"},{"vulnerability":"VCID-7t5h-jy8h-t3d4"},{"vulnerability":"VCID-7wyt-uh2c-a3ha"},{"vulnerability":"VCID-7ysh-usku-c3dz"},{"vulnerability":"VCID-7zpj-3par-s3b5"},{"vulnerability":"VCID-87tq-2me2-d3bb"},{"vulnerability":"VCID-8cb8-vq2c-q3e9"},{"vulnerability":"VCID-8r8y-8bq2-jufj"},{"vulnerability":"VCID-91hk-73kq-83g6"},{"vulnerability":"VCID-9hr5-p18q-7qb8"},{"vulnerability":"VCID-9s43-gewn-bycc"},{"vulnerability":"VCID-9zqd-3x84-43gc"},{"vulnerability":"VCID-az8d-xrb4-3ug4"},{"vulnerability":"VCID-b7tb-ns1t-fyaw"},{"vulnerability":"VCID-bc6f-wu8g-5yb4"},{"vulnerability":"VCID-bs56-1z79-uqbt"},{"vulnerability":"VCID-bxae-85uh-uyek"},{"vulnerability":"VCID-bxb7-7gpw-qybb"},{"vulnerability":"VCID-bzve-5gwu-8ydb"},{"vulnerability":"VCID-csy7-esn4-u3gq"},{"vulnerability":"VCID-d3ad-6tme-bfem"},{"vulnerability":"VCID-dfjm-gwzm-jqbt"},{"vulnerability":"VCID-dgm4-ye4m-1fcq"},{"vulnerability":"VCID-dj1v-h79p-9ydz"},{"vulnerability":"VCID-dqy9-zkvw-e3gk"},{"vulnerability":"VCID-drhd-ytb7-u3em"},{"vulnerability":"VCID-e96u-uwba-kfg5"},{"vulnerability":"VCID-eb8v-p31a-yuhu"},{"vulnerability":"VCID-eka3-u8e5-3uad"},{"vulnerability":"VCID-ep7n-um5m-ekgk"},{"vulnerability":"VCID-fekb-fbhz-y7g7"},{"vulnerability":"VCID-fhbs-3nvf-tbha"},{"vulnerability":"VCID-fqt9-2esb-ffan"},{"vulnerability":"VCID-g72t-7kx1-abcs"},{"vulnerability":"VCID-gdsj-4cbx-ufep"},{"vulnerability":"VCID-gj1u-mbaj-kyc5"},{"vulnerability":"VCID-h9c6-yw5r-v3ex"},{"vulnerability":"VCID-hg4z-ad3f-fbc2"},{"vulnerability":"VCID-hsau-swt9-kyf7"},{"vulnerability":"VCID-hx7j-eymk-4ygk"},{"vulnerability":"VCID-hyup-47wa-pfac"},{"vulnerability":"VCID-jwdv-qe4x-yfgw"},{"vulnerability":"VCID-k5j4-3xmv-a7bk"},{"vulnerability":"VCID-kcj6-ua4t-ybgj"},{"vulnerability":"VCID-knqd-zktw-cydm"},{"vulnerability":"VCID-mcs2-ndqd-tydv"},{"vulnerability":"VCID-mf8g-nbkw-f7gr"},{"vulnerability":"VCID-n3t2-m6br-ufb3"},{"vulnerability":"VCID-n7pg-b7kc-wkew"},{"vulnerability":"VCID-ndz3-372h-8fhk"},{"vulnerability":"VCID-p3uc-18e9-skb4"},{"vulnerability":"VCID-p7ug-wwk5-63gb"},{"vulnerability":"VCID-pb8n-hmsc-syfw"},{"vulnerability":"VCID-pphm-ygb7-q7g2"},{"vulnerability":"VCID-pzt3-abab-4kdd"},{"vulnerability":"VCID-qnew-xqte-kbej"},{"vulnerability":"VCID-qprv-989b-k3d3"},{"vulnerability":"VCID-s4nf-p69f-pue8"},{"vulnerability":"VCID-td6e-x2qb-syg3"},{"vulnerability":"VCID-uunr-69dt-q7fn"},{"vulnerability":"VCID-uvcp-ad38-2kcs"},{"vulnerability":"VCID-vb2u-yc2z-ayh5"},{"vulnerability":"VCID-vs9k-akwv-h3ak"},{"vulnerability":"VCID-w2ch-guy5-6ye9"},{"vulnerability":"VCID-wh75-sc4f-qqc1"},{"vulnerability":"VCID-xcvw-eex8-j3bf"},{"vulnerability":"VCID-xe4j-gg7f-wyfa"},{"vulnerability":"VCID-z3g4-1vhq-97dj"},{"vulnerability":"VCID-z3qj-cnxq-pkgq"},{"vulnerability":"VCID-z8zf-cqkb-guge"},{"vulnerability":"VCID-zkyv-h5at-xkgq"},{"vulnerability":"VCID-zrxf-3w1d-t3ba"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.4%252B107-gef32c7afa2-1"},{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2021-26933","XSA-364"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2n9p-6t7s-kqc5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4325?format=json","vulnerability_id":"VCID-2uap-2vm1-efcr","summary":"Retbleed - arbitrary speculative code execution with return instructions","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29900.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29900.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-29900","reference_id":"","reference_type":"","scores":[{"value":"0.01411","scoring_system":"epss","scoring_elements":"0.80477","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01411","scoring_system":"epss","scoring_elements":"0.80604","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01411","scoring_system":"epss","scoring_elements":"0.80531","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01411","scoring_system":"epss","scoring_elements":"0.80523","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01411","scoring_system":"epss","scoring_elements":"0.80553","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01411","scoring_system":"epss","scoring_elements":"0.80554","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01411","scoring_system":"epss","scoring_elements":"0.80558","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01411","scoring_system":"epss","scoring_elements":"0.80584","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01411","scoring_system":"epss","scoring_elements":"0.80587","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01411","scoring_system":"epss","scoring_elements":"0.80498","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01411","scoring_system":"epss","scoring_elements":"0.80488","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01411","scoring_system":"epss","scoring_elements":"0.80517","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01411","scoring_system":"epss","scoring_elements":"0.80527","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01411","scoring_system":"epss","scoring_elements":"0.80545","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-29900"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2090226","reference_id":"2090226","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2090226"},{"reference_url":"https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037","reference_id":"amd-sb-1037","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T16:09:18Z/"}],"url":"https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037"},{"reference_url":"https://www.debian.org/security/2022/dsa-5207","reference_id":"dsa-5207","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T16:09:18Z/"}],"url":"https://www.debian.org/security/2022/dsa-5207"},{"reference_url":"https://security.gentoo.org/glsa/202402-07","reference_id":"GLSA-202402-07","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T16:09:18Z/"}],"url":"https://security.gentoo.org/glsa/202402-07"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html","reference_id":"msg00011.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T16:09:18Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYI3OMJ7RIZNL3C6GUWNANNPEUUID6FM/","reference_id":"MYI3OMJ7RIZNL3C6GUWNANNPEUUID6FM","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T16:09:18Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYI3OMJ7RIZNL3C6GUWNANNPEUUID6FM/"},{"reference_url":"https://www.secpod.com/blog/retbleed-intel-and-amd-processor-information-disclosure-vulnerability/","reference_id":"retbleed-intel-and-amd-processor-information-disclosure-vulnerability","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T16:09:18Z/"}],"url":"https://www.secpod.com/blog/retbleed-intel-and-amd-processor-information-disclosure-vulnerability/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7110","reference_id":"RHSA-2022:7110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7134","reference_id":"RHSA-2022:7134","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7134"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7337","reference_id":"RHSA-2022:7337","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7337"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7338","reference_id":"RHSA-2022:7338","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7338"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7933","reference_id":"RHSA-2022:7933","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7933"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8267","reference_id":"RHSA-2022:8267","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8267"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8973","reference_id":"RHSA-2022:8973","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8973"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8974","reference_id":"RHSA-2022:8974","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8974"},{"reference_url":"https://usn.ubuntu.com/5564-1/","reference_id":"USN-5564-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5564-1/"},{"reference_url":"https://usn.ubuntu.com/5565-1/","reference_id":"USN-5565-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5565-1/"},{"reference_url":"https://usn.ubuntu.com/5566-1/","reference_id":"USN-5566-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5566-1/"},{"reference_url":"https://usn.ubuntu.com/5854-1/","reference_id":"USN-5854-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5854-1/"},{"reference_url":"https://usn.ubuntu.com/5861-1/","reference_id":"USN-5861-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5861-1/"},{"reference_url":"https://usn.ubuntu.com/5862-1/","reference_id":"USN-5862-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5862-1/"},{"reference_url":"https://usn.ubuntu.com/5865-1/","reference_id":"USN-5865-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5865-1/"},{"reference_url":"https://usn.ubuntu.com/5883-1/","reference_id":"USN-5883-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5883-1/"},{"reference_url":"https://usn.ubuntu.com/5924-1/","reference_id":"USN-5924-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5924-1/"},{"reference_url":"https://usn.ubuntu.com/5975-1/","reference_id":"USN-5975-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5975-1/"},{"reference_url":"https://usn.ubuntu.com/6007-1/","reference_id":"USN-6007-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6007-1/"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-407.html","reference_id":"XSA-407","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-407.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2022-29900"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2uap-2vm1-efcr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4267?format=json","vulnerability_id":"VCID-32w3-vmcb-wfd9","summary":"xen/arm: Boot modules are not scrubbed","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-28693","reference_id":"","reference_type":"","scores":[{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18543","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18781","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18919","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18972","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18698","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18778","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18832","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18837","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18791","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18738","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18688","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.187","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18719","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18606","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18584","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-28693"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28693","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28693"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.gentoo.org/glsa/202107-30","reference_id":"GLSA-202107-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-30"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-372.html","reference_id":"XSA-372","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-372.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2021-28693","XSA-372"],"risk_score":1.2,"exploitability":"0.5","weighted_severity":"2.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-32w3-vmcb-wfd9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4241?format=json","vulnerability_id":"VCID-34gr-dtsz-1fab","summary":"x86: Race condition in Xen mapping code","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27672.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27672.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-27672","reference_id":"","reference_type":"","scores":[{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11676","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11799","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11842","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11631","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11716","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11771","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11782","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11743","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11719","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11581","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11582","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11705","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11664","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11624","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.1155","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-27672"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27670","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27670"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27671","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27671"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27672","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27672"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27674","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27674"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28368","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28368"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1891096","reference_id":"1891096","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1891096"},{"reference_url":"https://security.gentoo.org/glsa/202011-06","reference_id":"GLSA-202011-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202011-06"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-345.html","reference_id":"XSA-345","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-345.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037808?format=json","purl":"pkg:deb/debian/xen@4.11.4%2B107-gef32c7afa2-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1wgc-r96w-7kg9"},{"vulnerability":"VCID-1wtd-67ef-1qej"},{"vulnerability":"VCID-1x3w-n7ms-eqeh"},{"vulnerability":"VCID-28t2-hng7-tfe5"},{"vulnerability":"VCID-2n9p-6t7s-kqc5"},{"vulnerability":"VCID-2uap-2vm1-efcr"},{"vulnerability":"VCID-32w3-vmcb-wfd9"},{"vulnerability":"VCID-34gr-dtsz-1fab"},{"vulnerability":"VCID-34ng-ftbx-e3cm"},{"vulnerability":"VCID-39t8-p1q7-eyag"},{"vulnerability":"VCID-3d53-4qtr-myhm"},{"vulnerability":"VCID-3pxf-xndw-5fft"},{"vulnerability":"VCID-3whm-8fyv-zyhd"},{"vulnerability":"VCID-416b-93m6-jyby"},{"vulnerability":"VCID-42ma-8ash-j7c8"},{"vulnerability":"VCID-4429-qf2w-jqg3"},{"vulnerability":"VCID-4spa-usqt-93b2"},{"vulnerability":"VCID-5cw7-rv5f-jfaq"},{"vulnerability":"VCID-5dbd-kz24-6fc1"},{"vulnerability":"VCID-6kh6-edk7-xkcc"},{"vulnerability":"VCID-6xbp-t4qh-tbhv"},{"vulnerability":"VCID-77st-3475-5kdr"},{"vulnerability":"VCID-7d5b-66n7-zbe1"},{"vulnerability":"VCID-7ek3-weqx-9fhs"},{"vulnerability":"VCID-7etc-u5ya-zued"},{"vulnerability":"VCID-7t5h-jy8h-t3d4"},{"vulnerability":"VCID-7wyt-uh2c-a3ha"},{"vulnerability":"VCID-7ysh-usku-c3dz"},{"vulnerability":"VCID-7zpj-3par-s3b5"},{"vulnerability":"VCID-87tq-2me2-d3bb"},{"vulnerability":"VCID-8cb8-vq2c-q3e9"},{"vulnerability":"VCID-8r8y-8bq2-jufj"},{"vulnerability":"VCID-91hk-73kq-83g6"},{"vulnerability":"VCID-9hr5-p18q-7qb8"},{"vulnerability":"VCID-9s43-gewn-bycc"},{"vulnerability":"VCID-9zqd-3x84-43gc"},{"vulnerability":"VCID-az8d-xrb4-3ug4"},{"vulnerability":"VCID-b7tb-ns1t-fyaw"},{"vulnerability":"VCID-bc6f-wu8g-5yb4"},{"vulnerability":"VCID-bs56-1z79-uqbt"},{"vulnerability":"VCID-bxae-85uh-uyek"},{"vulnerability":"VCID-bxb7-7gpw-qybb"},{"vulnerability":"VCID-bzve-5gwu-8ydb"},{"vulnerability":"VCID-csy7-esn4-u3gq"},{"vulnerability":"VCID-d3ad-6tme-bfem"},{"vulnerability":"VCID-dfjm-gwzm-jqbt"},{"vulnerability":"VCID-dgm4-ye4m-1fcq"},{"vulnerability":"VCID-dj1v-h79p-9ydz"},{"vulnerability":"VCID-dqy9-zkvw-e3gk"},{"vulnerability":"VCID-drhd-ytb7-u3em"},{"vulnerability":"VCID-e96u-uwba-kfg5"},{"vulnerability":"VCID-eb8v-p31a-yuhu"},{"vulnerability":"VCID-eka3-u8e5-3uad"},{"vulnerability":"VCID-ep7n-um5m-ekgk"},{"vulnerability":"VCID-fekb-fbhz-y7g7"},{"vulnerability":"VCID-fhbs-3nvf-tbha"},{"vulnerability":"VCID-fqt9-2esb-ffan"},{"vulnerability":"VCID-g72t-7kx1-abcs"},{"vulnerability":"VCID-gdsj-4cbx-ufep"},{"vulnerability":"VCID-gj1u-mbaj-kyc5"},{"vulnerability":"VCID-h9c6-yw5r-v3ex"},{"vulnerability":"VCID-hg4z-ad3f-fbc2"},{"vulnerability":"VCID-hsau-swt9-kyf7"},{"vulnerability":"VCID-hx7j-eymk-4ygk"},{"vulnerability":"VCID-hyup-47wa-pfac"},{"vulnerability":"VCID-jwdv-qe4x-yfgw"},{"vulnerability":"VCID-k5j4-3xmv-a7bk"},{"vulnerability":"VCID-kcj6-ua4t-ybgj"},{"vulnerability":"VCID-knqd-zktw-cydm"},{"vulnerability":"VCID-mcs2-ndqd-tydv"},{"vulnerability":"VCID-mf8g-nbkw-f7gr"},{"vulnerability":"VCID-n3t2-m6br-ufb3"},{"vulnerability":"VCID-n7pg-b7kc-wkew"},{"vulnerability":"VCID-ndz3-372h-8fhk"},{"vulnerability":"VCID-p3uc-18e9-skb4"},{"vulnerability":"VCID-p7ug-wwk5-63gb"},{"vulnerability":"VCID-pb8n-hmsc-syfw"},{"vulnerability":"VCID-pphm-ygb7-q7g2"},{"vulnerability":"VCID-pzt3-abab-4kdd"},{"vulnerability":"VCID-qnew-xqte-kbej"},{"vulnerability":"VCID-qprv-989b-k3d3"},{"vulnerability":"VCID-s4nf-p69f-pue8"},{"vulnerability":"VCID-td6e-x2qb-syg3"},{"vulnerability":"VCID-uunr-69dt-q7fn"},{"vulnerability":"VCID-uvcp-ad38-2kcs"},{"vulnerability":"VCID-vb2u-yc2z-ayh5"},{"vulnerability":"VCID-vs9k-akwv-h3ak"},{"vulnerability":"VCID-w2ch-guy5-6ye9"},{"vulnerability":"VCID-wh75-sc4f-qqc1"},{"vulnerability":"VCID-xcvw-eex8-j3bf"},{"vulnerability":"VCID-xe4j-gg7f-wyfa"},{"vulnerability":"VCID-z3g4-1vhq-97dj"},{"vulnerability":"VCID-z3qj-cnxq-pkgq"},{"vulnerability":"VCID-z8zf-cqkb-guge"},{"vulnerability":"VCID-zkyv-h5at-xkgq"},{"vulnerability":"VCID-zrxf-3w1d-t3ba"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.4%252B107-gef32c7afa2-1"},{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2020-27672","XSA-345"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-34gr-dtsz-1fab"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4222?format=json","vulnerability_id":"VCID-34ng-ftbx-e3cm","summary":"Xenstore: guests can let run xenstored out of memory","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42317","reference_id":"","reference_type":"","scores":[{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24218","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24257","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24271","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24397","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36253","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36277","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36314","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36308","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36286","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36402","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36236","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36369","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36281","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36297","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42317"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://xenbits.xen.org/xsa/advisory-326.html","reference_id":"advisory-326.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-05T19:52:27Z/"}],"url":"http://xenbits.xen.org/xsa/advisory-326.html"},{"reference_url":"https://xenbits.xenproject.org/xsa/advisory-326.txt","reference_id":"advisory-326.txt","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-05T19:52:27Z/"}],"url":"https://xenbits.xenproject.org/xsa/advisory-326.txt"},{"reference_url":"https://www.debian.org/security/2022/dsa-5272","reference_id":"dsa-5272","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-05T19:52:27Z/"}],"url":"https://www.debian.org/security/2022/dsa-5272"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-326.html","reference_id":"XSA-326","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-326.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/","reference_id":"YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-05T19:52:27Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/","reference_id":"YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-05T19:52:27Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/","reference_id":"ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-05T19:52:27Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2022-42317"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-34ng-ftbx-e3cm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4223?format=json","vulnerability_id":"VCID-39t8-p1q7-eyag","summary":"Xenstore: guests can let run xenstored out of memory","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42318","reference_id":"","reference_type":"","scores":[{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24218","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24257","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24271","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24397","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36253","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36277","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36314","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36308","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36286","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36402","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36236","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36369","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36281","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36297","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42318"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://xenbits.xen.org/xsa/advisory-326.html","reference_id":"advisory-326.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-05T16:37:57Z/"}],"url":"http://xenbits.xen.org/xsa/advisory-326.html"},{"reference_url":"https://xenbits.xenproject.org/xsa/advisory-326.txt","reference_id":"advisory-326.txt","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-05T16:37:57Z/"}],"url":"https://xenbits.xenproject.org/xsa/advisory-326.txt"},{"reference_url":"https://www.debian.org/security/2022/dsa-5272","reference_id":"dsa-5272","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-05T16:37:57Z/"}],"url":"https://www.debian.org/security/2022/dsa-5272"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-326.html","reference_id":"XSA-326","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-326.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/","reference_id":"YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-05T16:37:57Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/","reference_id":"YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-05T16:37:57Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/","reference_id":"ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-05T16:37:57Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2022-42318"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-39t8-p1q7-eyag"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4348?format=json","vulnerability_id":"VCID-3d53-4qtr-myhm","summary":"x86 shadow plus log-dirty mode use-after-free","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42332","reference_id":"","reference_type":"","scores":[{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.16081","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.16018","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15878","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.17918","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18177","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.1813","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18081","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18024","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18037","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18071","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.1798","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.17956","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18115","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18171","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42332"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23824","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23824"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42331","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42331"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42332","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42332"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42333","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42333"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42334","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42334"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/03/21/1","reference_id":"1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-03T15:13:24Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/03/21/1"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033297","reference_id":"1033297","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033297"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5L6PM4RE7MUE6OWA32ZVOXCP235RM2TM/","reference_id":"5L6PM4RE7MUE6OWA32ZVOXCP235RM2TM","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-03T15:13:24Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5L6PM4RE7MUE6OWA32ZVOXCP235RM2TM/"},{"reference_url":"http://xenbits.xen.org/xsa/advisory-427.html","reference_id":"advisory-427.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-03T15:13:24Z/"}],"url":"http://xenbits.xen.org/xsa/advisory-427.html"},{"reference_url":"https://xenbits.xenproject.org/xsa/advisory-427.txt","reference_id":"advisory-427.txt","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-03T15:13:24Z/"}],"url":"https://xenbits.xenproject.org/xsa/advisory-427.txt"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APBMS2Q6746AXAFAITNJMGBNFGNMVLWR/","reference_id":"APBMS2Q6746AXAFAITNJMGBNFGNMVLWR","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-03T15:13:24Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APBMS2Q6746AXAFAITNJMGBNFGNMVLWR/"},{"reference_url":"https://www.debian.org/security/2023/dsa-5378","reference_id":"dsa-5378","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-03T15:13:24Z/"}],"url":"https://www.debian.org/security/2023/dsa-5378"},{"reference_url":"https://security.gentoo.org/glsa/202402-07","reference_id":"GLSA-202402-07","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-03T15:13:24Z/"}],"url":"https://security.gentoo.org/glsa/202402-07"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-427.html","reference_id":"XSA-427","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-427.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2022-42332","XSA-427"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3d53-4qtr-myhm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4214?format=json","vulnerability_id":"VCID-3pxf-xndw-5fft","summary":"Xenstore: guests can crash xenstored via watchs","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-29484","reference_id":"","reference_type":"","scores":[{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19612","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19798","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19943","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20001","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19728","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19808","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.1986","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.1987","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19825","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19768","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19742","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19744","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19756","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19652","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19645","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-29484"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29479","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29479"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29481","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29481"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29482","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29482"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29483","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29483"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29484","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29484"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29485","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29485"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29486","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29486"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29566","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29566"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29570","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29570"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29571","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29571"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-324.html","reference_id":"XSA-324","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-324.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037808?format=json","purl":"pkg:deb/debian/xen@4.11.4%2B107-gef32c7afa2-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1wgc-r96w-7kg9"},{"vulnerability":"VCID-1wtd-67ef-1qej"},{"vulnerability":"VCID-1x3w-n7ms-eqeh"},{"vulnerability":"VCID-28t2-hng7-tfe5"},{"vulnerability":"VCID-2n9p-6t7s-kqc5"},{"vulnerability":"VCID-2uap-2vm1-efcr"},{"vulnerability":"VCID-32w3-vmcb-wfd9"},{"vulnerability":"VCID-34gr-dtsz-1fab"},{"vulnerability":"VCID-34ng-ftbx-e3cm"},{"vulnerability":"VCID-39t8-p1q7-eyag"},{"vulnerability":"VCID-3d53-4qtr-myhm"},{"vulnerability":"VCID-3pxf-xndw-5fft"},{"vulnerability":"VCID-3whm-8fyv-zyhd"},{"vulnerability":"VCID-416b-93m6-jyby"},{"vulnerability":"VCID-42ma-8ash-j7c8"},{"vulnerability":"VCID-4429-qf2w-jqg3"},{"vulnerability":"VCID-4spa-usqt-93b2"},{"vulnerability":"VCID-5cw7-rv5f-jfaq"},{"vulnerability":"VCID-5dbd-kz24-6fc1"},{"vulnerability":"VCID-6kh6-edk7-xkcc"},{"vulnerability":"VCID-6xbp-t4qh-tbhv"},{"vulnerability":"VCID-77st-3475-5kdr"},{"vulnerability":"VCID-7d5b-66n7-zbe1"},{"vulnerability":"VCID-7ek3-weqx-9fhs"},{"vulnerability":"VCID-7etc-u5ya-zued"},{"vulnerability":"VCID-7t5h-jy8h-t3d4"},{"vulnerability":"VCID-7wyt-uh2c-a3ha"},{"vulnerability":"VCID-7ysh-usku-c3dz"},{"vulnerability":"VCID-7zpj-3par-s3b5"},{"vulnerability":"VCID-87tq-2me2-d3bb"},{"vulnerability":"VCID-8cb8-vq2c-q3e9"},{"vulnerability":"VCID-8r8y-8bq2-jufj"},{"vulnerability":"VCID-91hk-73kq-83g6"},{"vulnerability":"VCID-9hr5-p18q-7qb8"},{"vulnerability":"VCID-9s43-gewn-bycc"},{"vulnerability":"VCID-9zqd-3x84-43gc"},{"vulnerability":"VCID-az8d-xrb4-3ug4"},{"vulnerability":"VCID-b7tb-ns1t-fyaw"},{"vulnerability":"VCID-bc6f-wu8g-5yb4"},{"vulnerability":"VCID-bs56-1z79-uqbt"},{"vulnerability":"VCID-bxae-85uh-uyek"},{"vulnerability":"VCID-bxb7-7gpw-qybb"},{"vulnerability":"VCID-bzve-5gwu-8ydb"},{"vulnerability":"VCID-csy7-esn4-u3gq"},{"vulnerability":"VCID-d3ad-6tme-bfem"},{"vulnerability":"VCID-dfjm-gwzm-jqbt"},{"vulnerability":"VCID-dgm4-ye4m-1fcq"},{"vulnerability":"VCID-dj1v-h79p-9ydz"},{"vulnerability":"VCID-dqy9-zkvw-e3gk"},{"vulnerability":"VCID-drhd-ytb7-u3em"},{"vulnerability":"VCID-e96u-uwba-kfg5"},{"vulnerability":"VCID-eb8v-p31a-yuhu"},{"vulnerability":"VCID-eka3-u8e5-3uad"},{"vulnerability":"VCID-ep7n-um5m-ekgk"},{"vulnerability":"VCID-fekb-fbhz-y7g7"},{"vulnerability":"VCID-fhbs-3nvf-tbha"},{"vulnerability":"VCID-fqt9-2esb-ffan"},{"vulnerability":"VCID-g72t-7kx1-abcs"},{"vulnerability":"VCID-gdsj-4cbx-ufep"},{"vulnerability":"VCID-gj1u-mbaj-kyc5"},{"vulnerability":"VCID-h9c6-yw5r-v3ex"},{"vulnerability":"VCID-hg4z-ad3f-fbc2"},{"vulnerability":"VCID-hsau-swt9-kyf7"},{"vulnerability":"VCID-hx7j-eymk-4ygk"},{"vulnerability":"VCID-hyup-47wa-pfac"},{"vulnerability":"VCID-jwdv-qe4x-yfgw"},{"vulnerability":"VCID-k5j4-3xmv-a7bk"},{"vulnerability":"VCID-kcj6-ua4t-ybgj"},{"vulnerability":"VCID-knqd-zktw-cydm"},{"vulnerability":"VCID-mcs2-ndqd-tydv"},{"vulnerability":"VCID-mf8g-nbkw-f7gr"},{"vulnerability":"VCID-n3t2-m6br-ufb3"},{"vulnerability":"VCID-n7pg-b7kc-wkew"},{"vulnerability":"VCID-ndz3-372h-8fhk"},{"vulnerability":"VCID-p3uc-18e9-skb4"},{"vulnerability":"VCID-p7ug-wwk5-63gb"},{"vulnerability":"VCID-pb8n-hmsc-syfw"},{"vulnerability":"VCID-pphm-ygb7-q7g2"},{"vulnerability":"VCID-pzt3-abab-4kdd"},{"vulnerability":"VCID-qnew-xqte-kbej"},{"vulnerability":"VCID-qprv-989b-k3d3"},{"vulnerability":"VCID-s4nf-p69f-pue8"},{"vulnerability":"VCID-td6e-x2qb-syg3"},{"vulnerability":"VCID-uunr-69dt-q7fn"},{"vulnerability":"VCID-uvcp-ad38-2kcs"},{"vulnerability":"VCID-vb2u-yc2z-ayh5"},{"vulnerability":"VCID-vs9k-akwv-h3ak"},{"vulnerability":"VCID-w2ch-guy5-6ye9"},{"vulnerability":"VCID-wh75-sc4f-qqc1"},{"vulnerability":"VCID-xcvw-eex8-j3bf"},{"vulnerability":"VCID-xe4j-gg7f-wyfa"},{"vulnerability":"VCID-z3g4-1vhq-97dj"},{"vulnerability":"VCID-z3qj-cnxq-pkgq"},{"vulnerability":"VCID-z8zf-cqkb-guge"},{"vulnerability":"VCID-zkyv-h5at-xkgq"},{"vulnerability":"VCID-zrxf-3w1d-t3ba"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.4%252B107-gef32c7afa2-1"},{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2020-29484","XSA-324"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3pxf-xndw-5fft"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4233?format=json","vulnerability_id":"VCID-3whm-8fyv-zyhd","summary":"race when migrating timers between x86 HVM vCPU-s","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25604.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25604.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-25604","reference_id":"","reference_type":"","scores":[{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21783","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21948","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.22002","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21767","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21844","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.219","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21911","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21871","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21814","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21817","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21823","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21787","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21639","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21633","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21623","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-25604"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25595","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25595"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25596","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25596"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25602","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25602"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25603","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25603"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25604","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25604"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1877382","reference_id":"1877382","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1877382"},{"reference_url":"https://security.gentoo.org/glsa/202011-06","reference_id":"GLSA-202011-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202011-06"},{"reference_url":"https://usn.ubuntu.com/5617-1/","reference_id":"USN-5617-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5617-1/"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-336.html","reference_id":"XSA-336","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-336.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037808?format=json","purl":"pkg:deb/debian/xen@4.11.4%2B107-gef32c7afa2-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1wgc-r96w-7kg9"},{"vulnerability":"VCID-1wtd-67ef-1qej"},{"vulnerability":"VCID-1x3w-n7ms-eqeh"},{"vulnerability":"VCID-28t2-hng7-tfe5"},{"vulnerability":"VCID-2n9p-6t7s-kqc5"},{"vulnerability":"VCID-2uap-2vm1-efcr"},{"vulnerability":"VCID-32w3-vmcb-wfd9"},{"vulnerability":"VCID-34gr-dtsz-1fab"},{"vulnerability":"VCID-34ng-ftbx-e3cm"},{"vulnerability":"VCID-39t8-p1q7-eyag"},{"vulnerability":"VCID-3d53-4qtr-myhm"},{"vulnerability":"VCID-3pxf-xndw-5fft"},{"vulnerability":"VCID-3whm-8fyv-zyhd"},{"vulnerability":"VCID-416b-93m6-jyby"},{"vulnerability":"VCID-42ma-8ash-j7c8"},{"vulnerability":"VCID-4429-qf2w-jqg3"},{"vulnerability":"VCID-4spa-usqt-93b2"},{"vulnerability":"VCID-5cw7-rv5f-jfaq"},{"vulnerability":"VCID-5dbd-kz24-6fc1"},{"vulnerability":"VCID-6kh6-edk7-xkcc"},{"vulnerability":"VCID-6xbp-t4qh-tbhv"},{"vulnerability":"VCID-77st-3475-5kdr"},{"vulnerability":"VCID-7d5b-66n7-zbe1"},{"vulnerability":"VCID-7ek3-weqx-9fhs"},{"vulnerability":"VCID-7etc-u5ya-zued"},{"vulnerability":"VCID-7t5h-jy8h-t3d4"},{"vulnerability":"VCID-7wyt-uh2c-a3ha"},{"vulnerability":"VCID-7ysh-usku-c3dz"},{"vulnerability":"VCID-7zpj-3par-s3b5"},{"vulnerability":"VCID-87tq-2me2-d3bb"},{"vulnerability":"VCID-8cb8-vq2c-q3e9"},{"vulnerability":"VCID-8r8y-8bq2-jufj"},{"vulnerability":"VCID-91hk-73kq-83g6"},{"vulnerability":"VCID-9hr5-p18q-7qb8"},{"vulnerability":"VCID-9s43-gewn-bycc"},{"vulnerability":"VCID-9zqd-3x84-43gc"},{"vulnerability":"VCID-az8d-xrb4-3ug4"},{"vulnerability":"VCID-b7tb-ns1t-fyaw"},{"vulnerability":"VCID-bc6f-wu8g-5yb4"},{"vulnerability":"VCID-bs56-1z79-uqbt"},{"vulnerability":"VCID-bxae-85uh-uyek"},{"vulnerability":"VCID-bxb7-7gpw-qybb"},{"vulnerability":"VCID-bzve-5gwu-8ydb"},{"vulnerability":"VCID-csy7-esn4-u3gq"},{"vulnerability":"VCID-d3ad-6tme-bfem"},{"vulnerability":"VCID-dfjm-gwzm-jqbt"},{"vulnerability":"VCID-dgm4-ye4m-1fcq"},{"vulnerability":"VCID-dj1v-h79p-9ydz"},{"vulnerability":"VCID-dqy9-zkvw-e3gk"},{"vulnerability":"VCID-drhd-ytb7-u3em"},{"vulnerability":"VCID-e96u-uwba-kfg5"},{"vulnerability":"VCID-eb8v-p31a-yuhu"},{"vulnerability":"VCID-eka3-u8e5-3uad"},{"vulnerability":"VCID-ep7n-um5m-ekgk"},{"vulnerability":"VCID-fekb-fbhz-y7g7"},{"vulnerability":"VCID-fhbs-3nvf-tbha"},{"vulnerability":"VCID-fqt9-2esb-ffan"},{"vulnerability":"VCID-g72t-7kx1-abcs"},{"vulnerability":"VCID-gdsj-4cbx-ufep"},{"vulnerability":"VCID-gj1u-mbaj-kyc5"},{"vulnerability":"VCID-h9c6-yw5r-v3ex"},{"vulnerability":"VCID-hg4z-ad3f-fbc2"},{"vulnerability":"VCID-hsau-swt9-kyf7"},{"vulnerability":"VCID-hx7j-eymk-4ygk"},{"vulnerability":"VCID-hyup-47wa-pfac"},{"vulnerability":"VCID-jwdv-qe4x-yfgw"},{"vulnerability":"VCID-k5j4-3xmv-a7bk"},{"vulnerability":"VCID-kcj6-ua4t-ybgj"},{"vulnerability":"VCID-knqd-zktw-cydm"},{"vulnerability":"VCID-mcs2-ndqd-tydv"},{"vulnerability":"VCID-mf8g-nbkw-f7gr"},{"vulnerability":"VCID-n3t2-m6br-ufb3"},{"vulnerability":"VCID-n7pg-b7kc-wkew"},{"vulnerability":"VCID-ndz3-372h-8fhk"},{"vulnerability":"VCID-p3uc-18e9-skb4"},{"vulnerability":"VCID-p7ug-wwk5-63gb"},{"vulnerability":"VCID-pb8n-hmsc-syfw"},{"vulnerability":"VCID-pphm-ygb7-q7g2"},{"vulnerability":"VCID-pzt3-abab-4kdd"},{"vulnerability":"VCID-qnew-xqte-kbej"},{"vulnerability":"VCID-qprv-989b-k3d3"},{"vulnerability":"VCID-s4nf-p69f-pue8"},{"vulnerability":"VCID-td6e-x2qb-syg3"},{"vulnerability":"VCID-uunr-69dt-q7fn"},{"vulnerability":"VCID-uvcp-ad38-2kcs"},{"vulnerability":"VCID-vb2u-yc2z-ayh5"},{"vulnerability":"VCID-vs9k-akwv-h3ak"},{"vulnerability":"VCID-w2ch-guy5-6ye9"},{"vulnerability":"VCID-wh75-sc4f-qqc1"},{"vulnerability":"VCID-xcvw-eex8-j3bf"},{"vulnerability":"VCID-xe4j-gg7f-wyfa"},{"vulnerability":"VCID-z3g4-1vhq-97dj"},{"vulnerability":"VCID-z3qj-cnxq-pkgq"},{"vulnerability":"VCID-z8zf-cqkb-guge"},{"vulnerability":"VCID-zkyv-h5at-xkgq"},{"vulnerability":"VCID-zrxf-3w1d-t3ba"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.4%252B107-gef32c7afa2-1"},{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2020-25604","XSA-336"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3whm-8fyv-zyhd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4218?format=json","vulnerability_id":"VCID-416b-93m6-jyby","summary":"Xenstore: guests can let run xenstored out of memory","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42313","reference_id":"","reference_type":"","scores":[{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24514","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24557","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.2457","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24626","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36545","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36569","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36603","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36596","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36577","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36688","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36525","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36656","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36572","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.3659","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42313"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://xenbits.xen.org/xsa/advisory-326.html","reference_id":"advisory-326.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T14:57:08Z/"}],"url":"http://xenbits.xen.org/xsa/advisory-326.html"},{"reference_url":"https://xenbits.xenproject.org/xsa/advisory-326.txt","reference_id":"advisory-326.txt","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T14:57:08Z/"}],"url":"https://xenbits.xenproject.org/xsa/advisory-326.txt"},{"reference_url":"https://www.debian.org/security/2022/dsa-5272","reference_id":"dsa-5272","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T14:57:08Z/"}],"url":"https://www.debian.org/security/2022/dsa-5272"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-326.html","reference_id":"XSA-326","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-326.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/","reference_id":"YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T14:57:08Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/","reference_id":"YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T14:57:08Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/","reference_id":"ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T14:57:08Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2022-42313"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-416b-93m6-jyby"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4216?format=json","vulnerability_id":"VCID-42ma-8ash-j7c8","summary":"Xenstore: guests can let run xenstored out of memory","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42311","reference_id":"","reference_type":"","scores":[{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24218","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24257","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24271","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24397","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36253","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36277","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36314","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36308","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36286","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36402","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36236","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36369","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36281","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36297","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42311"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://xenbits.xen.org/xsa/advisory-326.html","reference_id":"advisory-326.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T15:05:15Z/"}],"url":"http://xenbits.xen.org/xsa/advisory-326.html"},{"reference_url":"https://xenbits.xenproject.org/xsa/advisory-326.txt","reference_id":"advisory-326.txt","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T15:05:15Z/"}],"url":"https://xenbits.xenproject.org/xsa/advisory-326.txt"},{"reference_url":"https://www.debian.org/security/2022/dsa-5272","reference_id":"dsa-5272","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T15:05:15Z/"}],"url":"https://www.debian.org/security/2022/dsa-5272"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-326.html","reference_id":"XSA-326","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-326.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/","reference_id":"YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T15:05:15Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/","reference_id":"YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T15:05:15Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/","reference_id":"ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T15:05:15Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2022-42311"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-42ma-8ash-j7c8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4320?format=json","vulnerability_id":"VCID-4429-qf2w-jqg3","summary":"x86: MMIO Stale Data vulnerabilities","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21166.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21166.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21166","reference_id":"","reference_type":"","scores":[{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.40284","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.3992","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.40309","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.40231","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.40296","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.40308","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.4027","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.40251","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.40298","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.40266","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.4019","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.40015","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.40001","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21166"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21127","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21127"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21151","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21151"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2022/06/16/1","reference_id":"1","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/"}],"url":"http://www.openwall.com/lists/oss-security/2022/06/16/1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2090241","reference_id":"2090241","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2090241"},{"reference_url":"https://www.debian.org/security/2022/dsa-5173","reference_id":"dsa-5173","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/"}],"url":"https://www.debian.org/security/2022/dsa-5173"},{"reference_url":"https://www.debian.org/security/2022/dsa-5178","reference_id":"dsa-5178","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/"}],"url":"https://www.debian.org/security/2022/dsa-5178"},{"reference_url":"https://www.debian.org/security/2022/dsa-5184","reference_id":"dsa-5184","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/"}],"url":"https://www.debian.org/security/2022/dsa-5184"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV/","reference_id":"FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV/"},{"reference_url":"https://security.gentoo.org/glsa/202208-23","reference_id":"GLSA-202208-23","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/"}],"url":"https://security.gentoo.org/glsa/202208-23"},{"reference_url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html","reference_id":"intel-sa-00615.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/"}],"url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS/","reference_id":"MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220624-0008/","reference_id":"ntap-20220624-0008","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220624-0008/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5937","reference_id":"RHSA-2022:5937","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5937"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5939","reference_id":"RHSA-2022:5939","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5939"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6437","reference_id":"RHSA-2022:6437","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6437"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6460","reference_id":"RHSA-2022:6460","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6460"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6872","reference_id":"RHSA-2022:6872","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6872"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6983","reference_id":"RHSA-2022:6983","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6983"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6991","reference_id":"RHSA-2022:6991","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6991"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7279","reference_id":"RHSA-2022:7279","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7279"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7280","reference_id":"RHSA-2022:7280","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7280"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7933","reference_id":"RHSA-2022:7933","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7933"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8267","reference_id":"RHSA-2022:8267","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8267"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8973","reference_id":"RHSA-2022:8973","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8973"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8974","reference_id":"RHSA-2022:8974","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8974"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q/","reference_id":"RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA/","reference_id":"T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA/"},{"reference_url":"https://usn.ubuntu.com/5484-1/","reference_id":"USN-5484-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5484-1/"},{"reference_url":"https://usn.ubuntu.com/5485-1/","reference_id":"USN-5485-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5485-1/"},{"reference_url":"https://usn.ubuntu.com/5485-2/","reference_id":"USN-5485-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5485-2/"},{"reference_url":"https://usn.ubuntu.com/5486-1/","reference_id":"USN-5486-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5486-1/"},{"reference_url":"https://usn.ubuntu.com/5505-1/","reference_id":"USN-5505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5505-1/"},{"reference_url":"https://usn.ubuntu.com/5513-1/","reference_id":"USN-5513-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5513-1/"},{"reference_url":"https://usn.ubuntu.com/5529-1/","reference_id":"USN-5529-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5529-1/"},{"reference_url":"https://usn.ubuntu.com/5535-1/","reference_id":"USN-5535-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5535-1/"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-404.html","reference_id":"XSA-404","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-404.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2022-21166","XSA-404"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4429-qf2w-jqg3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4311?format=json","vulnerability_id":"VCID-4spa-usqt-93b2","summary":"x86 pv: Race condition in typeref acquisition","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26362","reference_id":"","reference_type":"","scores":[{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14577","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14751","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14827","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.1463","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.1472","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14779","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14739","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14702","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14648","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.1454","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14546","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.1461","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14641","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14638","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26362"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014414","reference_id":"1014414","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014414"},{"reference_url":"https://security.gentoo.org/glsa/202208-23","reference_id":"GLSA-202208-23","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-23"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-401.html","reference_id":"XSA-401","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-401.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2022-26362","XSA-401"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4spa-usqt-93b2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4326?format=json","vulnerability_id":"VCID-5cw7-rv5f-jfaq","summary":"insufficient TLB flush for x86 PV guests in shadow mode","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-33745","reference_id":"","reference_type":"","scores":[{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20414","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20742","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20801","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20519","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20596","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20655","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20675","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20633","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20581","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20568","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20566","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20561","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20448","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20445","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-33745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-408.html","reference_id":"XSA-408","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-408.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2022-33745","XSA-408"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5cw7-rv5f-jfaq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4288?format=json","vulnerability_id":"VCID-5dbd-kz24-6fc1","summary":"issues with partially successful P2M updates on x86","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-28709","reference_id":"","reference_type":"","scores":[{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24599","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24807","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24885","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24925","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.247","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24767","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24813","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24827","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24787","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.2473","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24745","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24737","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24714","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24654","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24643","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-28709"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28702","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28702"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28704","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28704"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28705","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28705"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28706","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28706"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28707","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28707"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28708","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28708"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28709","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28709"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.gentoo.org/glsa/202402-07","reference_id":"GLSA-202402-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-07"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-389.html","reference_id":"XSA-389","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-389.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2021-28709","XSA-389"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5dbd-kz24-6fc1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4243?format=json","vulnerability_id":"VCID-6kh6-edk7-xkcc","summary":"unsafe AMD IOMMU page table updates","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27670.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27670.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-27670","reference_id":"","reference_type":"","scores":[{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13515","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13614","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13675","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13474","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13555","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13605","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13577","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13539","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13491","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13403","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.134","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13472","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13478","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13449","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13342","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-27670"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27670","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27670"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27671","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27671"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27672","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27672"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27674","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27674"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28368","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28368"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1891087","reference_id":"1891087","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1891087"},{"reference_url":"https://security.gentoo.org/glsa/202011-06","reference_id":"GLSA-202011-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202011-06"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-347.html","reference_id":"XSA-347","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-347.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037808?format=json","purl":"pkg:deb/debian/xen@4.11.4%2B107-gef32c7afa2-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1wgc-r96w-7kg9"},{"vulnerability":"VCID-1wtd-67ef-1qej"},{"vulnerability":"VCID-1x3w-n7ms-eqeh"},{"vulnerability":"VCID-28t2-hng7-tfe5"},{"vulnerability":"VCID-2n9p-6t7s-kqc5"},{"vulnerability":"VCID-2uap-2vm1-efcr"},{"vulnerability":"VCID-32w3-vmcb-wfd9"},{"vulnerability":"VCID-34gr-dtsz-1fab"},{"vulnerability":"VCID-34ng-ftbx-e3cm"},{"vulnerability":"VCID-39t8-p1q7-eyag"},{"vulnerability":"VCID-3d53-4qtr-myhm"},{"vulnerability":"VCID-3pxf-xndw-5fft"},{"vulnerability":"VCID-3whm-8fyv-zyhd"},{"vulnerability":"VCID-416b-93m6-jyby"},{"vulnerability":"VCID-42ma-8ash-j7c8"},{"vulnerability":"VCID-4429-qf2w-jqg3"},{"vulnerability":"VCID-4spa-usqt-93b2"},{"vulnerability":"VCID-5cw7-rv5f-jfaq"},{"vulnerability":"VCID-5dbd-kz24-6fc1"},{"vulnerability":"VCID-6kh6-edk7-xkcc"},{"vulnerability":"VCID-6xbp-t4qh-tbhv"},{"vulnerability":"VCID-77st-3475-5kdr"},{"vulnerability":"VCID-7d5b-66n7-zbe1"},{"vulnerability":"VCID-7ek3-weqx-9fhs"},{"vulnerability":"VCID-7etc-u5ya-zued"},{"vulnerability":"VCID-7t5h-jy8h-t3d4"},{"vulnerability":"VCID-7wyt-uh2c-a3ha"},{"vulnerability":"VCID-7ysh-usku-c3dz"},{"vulnerability":"VCID-7zpj-3par-s3b5"},{"vulnerability":"VCID-87tq-2me2-d3bb"},{"vulnerability":"VCID-8cb8-vq2c-q3e9"},{"vulnerability":"VCID-8r8y-8bq2-jufj"},{"vulnerability":"VCID-91hk-73kq-83g6"},{"vulnerability":"VCID-9hr5-p18q-7qb8"},{"vulnerability":"VCID-9s43-gewn-bycc"},{"vulnerability":"VCID-9zqd-3x84-43gc"},{"vulnerability":"VCID-az8d-xrb4-3ug4"},{"vulnerability":"VCID-b7tb-ns1t-fyaw"},{"vulnerability":"VCID-bc6f-wu8g-5yb4"},{"vulnerability":"VCID-bs56-1z79-uqbt"},{"vulnerability":"VCID-bxae-85uh-uyek"},{"vulnerability":"VCID-bxb7-7gpw-qybb"},{"vulnerability":"VCID-bzve-5gwu-8ydb"},{"vulnerability":"VCID-csy7-esn4-u3gq"},{"vulnerability":"VCID-d3ad-6tme-bfem"},{"vulnerability":"VCID-dfjm-gwzm-jqbt"},{"vulnerability":"VCID-dgm4-ye4m-1fcq"},{"vulnerability":"VCID-dj1v-h79p-9ydz"},{"vulnerability":"VCID-dqy9-zkvw-e3gk"},{"vulnerability":"VCID-drhd-ytb7-u3em"},{"vulnerability":"VCID-e96u-uwba-kfg5"},{"vulnerability":"VCID-eb8v-p31a-yuhu"},{"vulnerability":"VCID-eka3-u8e5-3uad"},{"vulnerability":"VCID-ep7n-um5m-ekgk"},{"vulnerability":"VCID-fekb-fbhz-y7g7"},{"vulnerability":"VCID-fhbs-3nvf-tbha"},{"vulnerability":"VCID-fqt9-2esb-ffan"},{"vulnerability":"VCID-g72t-7kx1-abcs"},{"vulnerability":"VCID-gdsj-4cbx-ufep"},{"vulnerability":"VCID-gj1u-mbaj-kyc5"},{"vulnerability":"VCID-h9c6-yw5r-v3ex"},{"vulnerability":"VCID-hg4z-ad3f-fbc2"},{"vulnerability":"VCID-hsau-swt9-kyf7"},{"vulnerability":"VCID-hx7j-eymk-4ygk"},{"vulnerability":"VCID-hyup-47wa-pfac"},{"vulnerability":"VCID-jwdv-qe4x-yfgw"},{"vulnerability":"VCID-k5j4-3xmv-a7bk"},{"vulnerability":"VCID-kcj6-ua4t-ybgj"},{"vulnerability":"VCID-knqd-zktw-cydm"},{"vulnerability":"VCID-mcs2-ndqd-tydv"},{"vulnerability":"VCID-mf8g-nbkw-f7gr"},{"vulnerability":"VCID-n3t2-m6br-ufb3"},{"vulnerability":"VCID-n7pg-b7kc-wkew"},{"vulnerability":"VCID-ndz3-372h-8fhk"},{"vulnerability":"VCID-p3uc-18e9-skb4"},{"vulnerability":"VCID-p7ug-wwk5-63gb"},{"vulnerability":"VCID-pb8n-hmsc-syfw"},{"vulnerability":"VCID-pphm-ygb7-q7g2"},{"vulnerability":"VCID-pzt3-abab-4kdd"},{"vulnerability":"VCID-qnew-xqte-kbej"},{"vulnerability":"VCID-qprv-989b-k3d3"},{"vulnerability":"VCID-s4nf-p69f-pue8"},{"vulnerability":"VCID-td6e-x2qb-syg3"},{"vulnerability":"VCID-uunr-69dt-q7fn"},{"vulnerability":"VCID-uvcp-ad38-2kcs"},{"vulnerability":"VCID-vb2u-yc2z-ayh5"},{"vulnerability":"VCID-vs9k-akwv-h3ak"},{"vulnerability":"VCID-w2ch-guy5-6ye9"},{"vulnerability":"VCID-wh75-sc4f-qqc1"},{"vulnerability":"VCID-xcvw-eex8-j3bf"},{"vulnerability":"VCID-xe4j-gg7f-wyfa"},{"vulnerability":"VCID-z3g4-1vhq-97dj"},{"vulnerability":"VCID-z3qj-cnxq-pkgq"},{"vulnerability":"VCID-z8zf-cqkb-guge"},{"vulnerability":"VCID-zkyv-h5at-xkgq"},{"vulnerability":"VCID-zrxf-3w1d-t3ba"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.4%252B107-gef32c7afa2-1"},{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2020-27670","XSA-347"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6kh6-edk7-xkcc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4217?format=json","vulnerability_id":"VCID-6xbp-t4qh-tbhv","summary":"Xenstore: guests can let run xenstored out of memory","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42312","reference_id":"","reference_type":"","scores":[{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24514","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24557","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.2457","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24626","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36545","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36569","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36603","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36596","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36577","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36688","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36525","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36656","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36572","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.3659","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42312"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://xenbits.xen.org/xsa/advisory-326.html","reference_id":"advisory-326.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T14:59:33Z/"}],"url":"http://xenbits.xen.org/xsa/advisory-326.html"},{"reference_url":"https://xenbits.xenproject.org/xsa/advisory-326.txt","reference_id":"advisory-326.txt","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T14:59:33Z/"}],"url":"https://xenbits.xenproject.org/xsa/advisory-326.txt"},{"reference_url":"https://www.debian.org/security/2022/dsa-5272","reference_id":"dsa-5272","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T14:59:33Z/"}],"url":"https://www.debian.org/security/2022/dsa-5272"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-326.html","reference_id":"XSA-326","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-326.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/","reference_id":"YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T14:59:33Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/","reference_id":"YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T14:59:33Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/","reference_id":"ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T14:59:33Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2022-42312","XSA-326"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6xbp-t4qh-tbhv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4263?format=json","vulnerability_id":"VCID-77st-3475-5kdr","summary":"HVM soft-reset crashes toolstack","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-28687","reference_id":"","reference_type":"","scores":[{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13827","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13979","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.14057","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.14111","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13914","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13999","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.14052","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.14006","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13969","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.1392","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13825","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13818","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13889","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13922","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13894","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-28687"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28687","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28687"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.gentoo.org/glsa/202107-30","reference_id":"GLSA-202107-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-30"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-368.html","reference_id":"XSA-368","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-368.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2021-28687","XSA-368"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-77st-3475-5kdr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4349?format=json","vulnerability_id":"VCID-7d5b-66n7-zbe1","summary":"x86/HVM pinned cache attributes mis-handling","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42333","reference_id":"","reference_type":"","scores":[{"value":"0.00421","scoring_system":"epss","scoring_elements":"0.61978","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00421","scoring_system":"epss","scoring_elements":"0.61947","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00421","scoring_system":"epss","scoring_elements":"0.61946","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0051","scoring_system":"epss","scoring_elements":"0.66431","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0051","scoring_system":"epss","scoring_elements":"0.66418","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0051","scoring_system":"epss","scoring_elements":"0.66388","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0051","scoring_system":"epss","scoring_elements":"0.66424","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0051","scoring_system":"epss","scoring_elements":"0.6644","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0051","scoring_system":"epss","scoring_elements":"0.66426","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0051","scoring_system":"epss","scoring_elements":"0.66449","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0051","scoring_system":"epss","scoring_elements":"0.66464","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0051","scoring_system":"epss","scoring_elements":"0.66465","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0051","scoring_system":"epss","scoring_elements":"0.66396","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0051","scoring_system":"epss","scoring_elements":"0.6641","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42333"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23824","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23824"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42331","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42331"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42332","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42332"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42333","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42333"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42334","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42334"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033297","reference_id":"1033297","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033297"},{"reference_url":"https://security.gentoo.org/glsa/202402-07","reference_id":"GLSA-202402-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-07"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-428.html","reference_id":"XSA-428","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-428.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2022-42333","CVE-2022-43334","XSA-428"],"risk_score":1.7,"exploitability":"0.5","weighted_severity":"3.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7d5b-66n7-zbe1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4342?format=json","vulnerability_id":"VCID-7ek3-weqx-9fhs","summary":"x86: Multiple speculative security issues","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23824.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23824.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-23824","reference_id":"","reference_type":"","scores":[{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10821","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.1248","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12507","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12621","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.1263","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12597","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14874","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14838","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14779","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14892","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14913","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14967","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14768","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14859","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-23824"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23824","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23824"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42331","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42331"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42332","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42332"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42333","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42333"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42334","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42334"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2119127","reference_id":"2119127","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2119127"},{"reference_url":"https://security.gentoo.org/glsa/202402-07","reference_id":"GLSA-202402-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-07"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-422.html","reference_id":"XSA-422","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-422.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2022-23824","XSA-422"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7ek3-weqx-9fhs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4307?format=json","vulnerability_id":"VCID-7etc-u5ya-zued","summary":"IOMMU: RMRR (VT-d) and unity map (AMD-Vi) handling issues","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26358","reference_id":"","reference_type":"","scores":[{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31052","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31574","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31618","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31437","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.3149","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31519","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31523","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31481","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31444","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31479","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31457","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31426","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31257","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31132","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26358"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23033","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23033"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23034","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23034"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23035","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23035"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26356","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26356"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26357","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26357"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26358","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26358"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26359","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26359"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26360","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26360"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26361","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26361"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.gentoo.org/glsa/202402-07","reference_id":"GLSA-202402-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-07"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-400.html","reference_id":"XSA-400","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-400.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2022-26358"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7etc-u5ya-zued"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4338?format=json","vulnerability_id":"VCID-7t5h-jy8h-t3d4","summary":"Xenstore: Cooperating guests can create arbitrary numbers of nodes","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42323","reference_id":"","reference_type":"","scores":[{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09802","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09727","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09776","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09681","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09752","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11254","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11455","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11422","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11393","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11255","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.11947","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12097","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12075","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12043","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42323"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.gentoo.org/glsa/202402-07","reference_id":"GLSA-202402-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-07"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-419.html","reference_id":"XSA-419","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-419.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2022-42323"],"risk_score":1.3,"exploitability":"0.5","weighted_severity":"2.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7t5h-jy8h-t3d4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4312?format=json","vulnerability_id":"VCID-7wyt-uh2c-a3ha","summary":"x86 pv: Insufficient care with non-coherent mappings","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26363","reference_id":"","reference_type":"","scores":[{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23915","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24264","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24298","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24084","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.2415","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24194","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24213","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24171","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24115","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.2413","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24117","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24093","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23968","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23955","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26363"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014414","reference_id":"1014414","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014414"},{"reference_url":"https://security.gentoo.org/glsa/202208-23","reference_id":"GLSA-202208-23","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-23"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-402.html","reference_id":"XSA-402","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-402.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2022-26363"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7wyt-uh2c-a3ha"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4350?format=json","vulnerability_id":"VCID-7ysh-usku-c3dz","summary":"x86/HVM pinned cache attributes mis-handling","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42334","reference_id":"","reference_type":"","scores":[{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15246","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.1505","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15179","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18616","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18569","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18517","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18458","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18468","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.1849","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.1839","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18373","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18333","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18561","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18613","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42334"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23824","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23824"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42331","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42331"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42332","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42332"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42333","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42333"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42334","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42334"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033297","reference_id":"1033297","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033297"},{"reference_url":"https://security.gentoo.org/glsa/202402-07","reference_id":"GLSA-202402-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-07"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-428.html","reference_id":"XSA-428","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-428.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2022-42334"],"risk_score":1.7,"exploitability":"0.5","weighted_severity":"3.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7ysh-usku-c3dz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4221?format=json","vulnerability_id":"VCID-7zpj-3par-s3b5","summary":"Xenstore: guests can let run xenstored out of memory","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42316","reference_id":"","reference_type":"","scores":[{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24514","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24626","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.2457","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24557","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36577","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36596","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36603","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36545","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.3659","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36572","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36569","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36656","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36688","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36525","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42316"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-326.html","reference_id":"XSA-326","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-326.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2022-42316"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7zpj-3par-s3b5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4219?format=json","vulnerability_id":"VCID-87tq-2me2-d3bb","summary":"Xenstore: guests can let run xenstored out of memory","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42314","reference_id":"","reference_type":"","scores":[{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24514","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24557","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.2457","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24626","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36545","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36569","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36603","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36596","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36577","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36688","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36525","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36656","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36572","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.3659","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42314"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://xenbits.xen.org/xsa/advisory-326.html","reference_id":"advisory-326.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T14:50:10Z/"}],"url":"http://xenbits.xen.org/xsa/advisory-326.html"},{"reference_url":"https://xenbits.xenproject.org/xsa/advisory-326.txt","reference_id":"advisory-326.txt","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T14:50:10Z/"}],"url":"https://xenbits.xenproject.org/xsa/advisory-326.txt"},{"reference_url":"https://www.debian.org/security/2022/dsa-5272","reference_id":"dsa-5272","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T14:50:10Z/"}],"url":"https://www.debian.org/security/2022/dsa-5272"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-326.html","reference_id":"XSA-326","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-326.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/","reference_id":"YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T14:50:10Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/","reference_id":"YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T14:50:10Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/","reference_id":"ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T14:50:10Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2022-42314"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-87tq-2me2-d3bb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4332?format=json","vulnerability_id":"VCID-8cb8-vq2c-q3e9","summary":"Xenstore: Guests can crash xenstored","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42309","reference_id":"","reference_type":"","scores":[{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16825","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16846","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16902","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16686","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16771","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18818","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18965","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18918","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18867","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18831","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19543","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19701","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19594","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.1958","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.gentoo.org/glsa/202402-07","reference_id":"GLSA-202402-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-07"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-414.html","reference_id":"XSA-414","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-414.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2022-42309","XSA-414"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8cb8-vq2c-q3e9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4249?format=json","vulnerability_id":"VCID-8r8y-8bq2-jufj","summary":"oxenstored: permissions not checked on root node","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-29479","reference_id":"","reference_type":"","scores":[{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14314","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14399","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14464","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.1427","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14353","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14408","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14358","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14317","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14262","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14153","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14151","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14224","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14252","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14228","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14161","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-29479"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29479","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29479"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29481","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29481"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29482","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29482"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29483","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29483"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29484","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29484"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29485","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29485"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29486","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29486"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29566","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29566"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29570","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29570"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29571","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29571"},{"reference_url":"https://security.gentoo.org/glsa/202107-30","reference_id":"GLSA-202107-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-30"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-353.html","reference_id":"XSA-353","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-353.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037808?format=json","purl":"pkg:deb/debian/xen@4.11.4%2B107-gef32c7afa2-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1wgc-r96w-7kg9"},{"vulnerability":"VCID-1wtd-67ef-1qej"},{"vulnerability":"VCID-1x3w-n7ms-eqeh"},{"vulnerability":"VCID-28t2-hng7-tfe5"},{"vulnerability":"VCID-2n9p-6t7s-kqc5"},{"vulnerability":"VCID-2uap-2vm1-efcr"},{"vulnerability":"VCID-32w3-vmcb-wfd9"},{"vulnerability":"VCID-34gr-dtsz-1fab"},{"vulnerability":"VCID-34ng-ftbx-e3cm"},{"vulnerability":"VCID-39t8-p1q7-eyag"},{"vulnerability":"VCID-3d53-4qtr-myhm"},{"vulnerability":"VCID-3pxf-xndw-5fft"},{"vulnerability":"VCID-3whm-8fyv-zyhd"},{"vulnerability":"VCID-416b-93m6-jyby"},{"vulnerability":"VCID-42ma-8ash-j7c8"},{"vulnerability":"VCID-4429-qf2w-jqg3"},{"vulnerability":"VCID-4spa-usqt-93b2"},{"vulnerability":"VCID-5cw7-rv5f-jfaq"},{"vulnerability":"VCID-5dbd-kz24-6fc1"},{"vulnerability":"VCID-6kh6-edk7-xkcc"},{"vulnerability":"VCID-6xbp-t4qh-tbhv"},{"vulnerability":"VCID-77st-3475-5kdr"},{"vulnerability":"VCID-7d5b-66n7-zbe1"},{"vulnerability":"VCID-7ek3-weqx-9fhs"},{"vulnerability":"VCID-7etc-u5ya-zued"},{"vulnerability":"VCID-7t5h-jy8h-t3d4"},{"vulnerability":"VCID-7wyt-uh2c-a3ha"},{"vulnerability":"VCID-7ysh-usku-c3dz"},{"vulnerability":"VCID-7zpj-3par-s3b5"},{"vulnerability":"VCID-87tq-2me2-d3bb"},{"vulnerability":"VCID-8cb8-vq2c-q3e9"},{"vulnerability":"VCID-8r8y-8bq2-jufj"},{"vulnerability":"VCID-91hk-73kq-83g6"},{"vulnerability":"VCID-9hr5-p18q-7qb8"},{"vulnerability":"VCID-9s43-gewn-bycc"},{"vulnerability":"VCID-9zqd-3x84-43gc"},{"vulnerability":"VCID-az8d-xrb4-3ug4"},{"vulnerability":"VCID-b7tb-ns1t-fyaw"},{"vulnerability":"VCID-bc6f-wu8g-5yb4"},{"vulnerability":"VCID-bs56-1z79-uqbt"},{"vulnerability":"VCID-bxae-85uh-uyek"},{"vulnerability":"VCID-bxb7-7gpw-qybb"},{"vulnerability":"VCID-bzve-5gwu-8ydb"},{"vulnerability":"VCID-csy7-esn4-u3gq"},{"vulnerability":"VCID-d3ad-6tme-bfem"},{"vulnerability":"VCID-dfjm-gwzm-jqbt"},{"vulnerability":"VCID-dgm4-ye4m-1fcq"},{"vulnerability":"VCID-dj1v-h79p-9ydz"},{"vulnerability":"VCID-dqy9-zkvw-e3gk"},{"vulnerability":"VCID-drhd-ytb7-u3em"},{"vulnerability":"VCID-e96u-uwba-kfg5"},{"vulnerability":"VCID-eb8v-p31a-yuhu"},{"vulnerability":"VCID-eka3-u8e5-3uad"},{"vulnerability":"VCID-ep7n-um5m-ekgk"},{"vulnerability":"VCID-fekb-fbhz-y7g7"},{"vulnerability":"VCID-fhbs-3nvf-tbha"},{"vulnerability":"VCID-fqt9-2esb-ffan"},{"vulnerability":"VCID-g72t-7kx1-abcs"},{"vulnerability":"VCID-gdsj-4cbx-ufep"},{"vulnerability":"VCID-gj1u-mbaj-kyc5"},{"vulnerability":"VCID-h9c6-yw5r-v3ex"},{"vulnerability":"VCID-hg4z-ad3f-fbc2"},{"vulnerability":"VCID-hsau-swt9-kyf7"},{"vulnerability":"VCID-hx7j-eymk-4ygk"},{"vulnerability":"VCID-hyup-47wa-pfac"},{"vulnerability":"VCID-jwdv-qe4x-yfgw"},{"vulnerability":"VCID-k5j4-3xmv-a7bk"},{"vulnerability":"VCID-kcj6-ua4t-ybgj"},{"vulnerability":"VCID-knqd-zktw-cydm"},{"vulnerability":"VCID-mcs2-ndqd-tydv"},{"vulnerability":"VCID-mf8g-nbkw-f7gr"},{"vulnerability":"VCID-n3t2-m6br-ufb3"},{"vulnerability":"VCID-n7pg-b7kc-wkew"},{"vulnerability":"VCID-ndz3-372h-8fhk"},{"vulnerability":"VCID-p3uc-18e9-skb4"},{"vulnerability":"VCID-p7ug-wwk5-63gb"},{"vulnerability":"VCID-pb8n-hmsc-syfw"},{"vulnerability":"VCID-pphm-ygb7-q7g2"},{"vulnerability":"VCID-pzt3-abab-4kdd"},{"vulnerability":"VCID-qnew-xqte-kbej"},{"vulnerability":"VCID-qprv-989b-k3d3"},{"vulnerability":"VCID-s4nf-p69f-pue8"},{"vulnerability":"VCID-td6e-x2qb-syg3"},{"vulnerability":"VCID-uunr-69dt-q7fn"},{"vulnerability":"VCID-uvcp-ad38-2kcs"},{"vulnerability":"VCID-vb2u-yc2z-ayh5"},{"vulnerability":"VCID-vs9k-akwv-h3ak"},{"vulnerability":"VCID-w2ch-guy5-6ye9"},{"vulnerability":"VCID-wh75-sc4f-qqc1"},{"vulnerability":"VCID-xcvw-eex8-j3bf"},{"vulnerability":"VCID-xe4j-gg7f-wyfa"},{"vulnerability":"VCID-z3g4-1vhq-97dj"},{"vulnerability":"VCID-z3qj-cnxq-pkgq"},{"vulnerability":"VCID-z8zf-cqkb-guge"},{"vulnerability":"VCID-zkyv-h5at-xkgq"},{"vulnerability":"VCID-zrxf-3w1d-t3ba"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.4%252B107-gef32c7afa2-1"},{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2020-29479","XSA-353"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8r8y-8bq2-jufj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4329?format=json","vulnerability_id":"VCID-91hk-73kq-83g6","summary":"lock order inversion in transitive grant copy handling","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-33748","reference_id":"","reference_type":"","scores":[{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.1153","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11778","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11821","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11609","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11693","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11748","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11761","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11723","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11699","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.1156","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11563","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11686","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11646","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11606","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-33748"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021668","reference_id":"1021668","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021668"},{"reference_url":"https://security.gentoo.org/glsa/202402-07","reference_id":"GLSA-202402-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-07"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-411.html","reference_id":"XSA-411","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-411.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2022-33748","XSA-411"],"risk_score":1.3,"exploitability":"0.5","weighted_severity":"2.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-91hk-73kq-83g6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4254?format=json","vulnerability_id":"VCID-9hr5-p18q-7qb8","summary":"FIFO event channels control structure ordering","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-29571","reference_id":"","reference_type":"","scores":[{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18121","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18342","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18494","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18548","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18256","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18339","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18391","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18343","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18291","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18235","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18247","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18275","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18173","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18157","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-29571"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29479","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29479"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29481","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29481"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29482","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29482"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29483","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29483"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29484","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29484"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29485","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29485"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29486","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29486"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29566","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29566"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29570","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29570"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29571","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29571"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.gentoo.org/glsa/202107-30","reference_id":"GLSA-202107-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-30"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-359.html","reference_id":"XSA-359","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-359.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037808?format=json","purl":"pkg:deb/debian/xen@4.11.4%2B107-gef32c7afa2-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1wgc-r96w-7kg9"},{"vulnerability":"VCID-1wtd-67ef-1qej"},{"vulnerability":"VCID-1x3w-n7ms-eqeh"},{"vulnerability":"VCID-28t2-hng7-tfe5"},{"vulnerability":"VCID-2n9p-6t7s-kqc5"},{"vulnerability":"VCID-2uap-2vm1-efcr"},{"vulnerability":"VCID-32w3-vmcb-wfd9"},{"vulnerability":"VCID-34gr-dtsz-1fab"},{"vulnerability":"VCID-34ng-ftbx-e3cm"},{"vulnerability":"VCID-39t8-p1q7-eyag"},{"vulnerability":"VCID-3d53-4qtr-myhm"},{"vulnerability":"VCID-3pxf-xndw-5fft"},{"vulnerability":"VCID-3whm-8fyv-zyhd"},{"vulnerability":"VCID-416b-93m6-jyby"},{"vulnerability":"VCID-42ma-8ash-j7c8"},{"vulnerability":"VCID-4429-qf2w-jqg3"},{"vulnerability":"VCID-4spa-usqt-93b2"},{"vulnerability":"VCID-5cw7-rv5f-jfaq"},{"vulnerability":"VCID-5dbd-kz24-6fc1"},{"vulnerability":"VCID-6kh6-edk7-xkcc"},{"vulnerability":"VCID-6xbp-t4qh-tbhv"},{"vulnerability":"VCID-77st-3475-5kdr"},{"vulnerability":"VCID-7d5b-66n7-zbe1"},{"vulnerability":"VCID-7ek3-weqx-9fhs"},{"vulnerability":"VCID-7etc-u5ya-zued"},{"vulnerability":"VCID-7t5h-jy8h-t3d4"},{"vulnerability":"VCID-7wyt-uh2c-a3ha"},{"vulnerability":"VCID-7ysh-usku-c3dz"},{"vulnerability":"VCID-7zpj-3par-s3b5"},{"vulnerability":"VCID-87tq-2me2-d3bb"},{"vulnerability":"VCID-8cb8-vq2c-q3e9"},{"vulnerability":"VCID-8r8y-8bq2-jufj"},{"vulnerability":"VCID-91hk-73kq-83g6"},{"vulnerability":"VCID-9hr5-p18q-7qb8"},{"vulnerability":"VCID-9s43-gewn-bycc"},{"vulnerability":"VCID-9zqd-3x84-43gc"},{"vulnerability":"VCID-az8d-xrb4-3ug4"},{"vulnerability":"VCID-b7tb-ns1t-fyaw"},{"vulnerability":"VCID-bc6f-wu8g-5yb4"},{"vulnerability":"VCID-bs56-1z79-uqbt"},{"vulnerability":"VCID-bxae-85uh-uyek"},{"vulnerability":"VCID-bxb7-7gpw-qybb"},{"vulnerability":"VCID-bzve-5gwu-8ydb"},{"vulnerability":"VCID-csy7-esn4-u3gq"},{"vulnerability":"VCID-d3ad-6tme-bfem"},{"vulnerability":"VCID-dfjm-gwzm-jqbt"},{"vulnerability":"VCID-dgm4-ye4m-1fcq"},{"vulnerability":"VCID-dj1v-h79p-9ydz"},{"vulnerability":"VCID-dqy9-zkvw-e3gk"},{"vulnerability":"VCID-drhd-ytb7-u3em"},{"vulnerability":"VCID-e96u-uwba-kfg5"},{"vulnerability":"VCID-eb8v-p31a-yuhu"},{"vulnerability":"VCID-eka3-u8e5-3uad"},{"vulnerability":"VCID-ep7n-um5m-ekgk"},{"vulnerability":"VCID-fekb-fbhz-y7g7"},{"vulnerability":"VCID-fhbs-3nvf-tbha"},{"vulnerability":"VCID-fqt9-2esb-ffan"},{"vulnerability":"VCID-g72t-7kx1-abcs"},{"vulnerability":"VCID-gdsj-4cbx-ufep"},{"vulnerability":"VCID-gj1u-mbaj-kyc5"},{"vulnerability":"VCID-h9c6-yw5r-v3ex"},{"vulnerability":"VCID-hg4z-ad3f-fbc2"},{"vulnerability":"VCID-hsau-swt9-kyf7"},{"vulnerability":"VCID-hx7j-eymk-4ygk"},{"vulnerability":"VCID-hyup-47wa-pfac"},{"vulnerability":"VCID-jwdv-qe4x-yfgw"},{"vulnerability":"VCID-k5j4-3xmv-a7bk"},{"vulnerability":"VCID-kcj6-ua4t-ybgj"},{"vulnerability":"VCID-knqd-zktw-cydm"},{"vulnerability":"VCID-mcs2-ndqd-tydv"},{"vulnerability":"VCID-mf8g-nbkw-f7gr"},{"vulnerability":"VCID-n3t2-m6br-ufb3"},{"vulnerability":"VCID-n7pg-b7kc-wkew"},{"vulnerability":"VCID-ndz3-372h-8fhk"},{"vulnerability":"VCID-p3uc-18e9-skb4"},{"vulnerability":"VCID-p7ug-wwk5-63gb"},{"vulnerability":"VCID-pb8n-hmsc-syfw"},{"vulnerability":"VCID-pphm-ygb7-q7g2"},{"vulnerability":"VCID-pzt3-abab-4kdd"},{"vulnerability":"VCID-qnew-xqte-kbej"},{"vulnerability":"VCID-qprv-989b-k3d3"},{"vulnerability":"VCID-s4nf-p69f-pue8"},{"vulnerability":"VCID-td6e-x2qb-syg3"},{"vulnerability":"VCID-uunr-69dt-q7fn"},{"vulnerability":"VCID-uvcp-ad38-2kcs"},{"vulnerability":"VCID-vb2u-yc2z-ayh5"},{"vulnerability":"VCID-vs9k-akwv-h3ak"},{"vulnerability":"VCID-w2ch-guy5-6ye9"},{"vulnerability":"VCID-wh75-sc4f-qqc1"},{"vulnerability":"VCID-xcvw-eex8-j3bf"},{"vulnerability":"VCID-xe4j-gg7f-wyfa"},{"vulnerability":"VCID-z3g4-1vhq-97dj"},{"vulnerability":"VCID-z3qj-cnxq-pkgq"},{"vulnerability":"VCID-z8zf-cqkb-guge"},{"vulnerability":"VCID-zkyv-h5at-xkgq"},{"vulnerability":"VCID-zrxf-3w1d-t3ba"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.4%252B107-gef32c7afa2-1"},{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2020-29571","XSA-359"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9hr5-p18q-7qb8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4283?format=json","vulnerability_id":"VCID-9s43-gewn-bycc","summary":"grant table v2 status pages may remain accessible after de-allocation (take two)","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-28703","reference_id":"","reference_type":"","scores":[{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.2896","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29363","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29433","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.2948","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29292","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29356","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29398","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29401","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29357","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29304","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29329","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29259","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29143","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29032","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-28703"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28703","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28703"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.gentoo.org/glsa/202402-07","reference_id":"GLSA-202402-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-07"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-387.html","reference_id":"XSA-387","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-387.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2021-28703","XSA-387"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9s43-gewn-bycc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4295?format=json","vulnerability_id":"VCID-9zqd-3x84-43gc","summary":"arm: guest_physmap_remove_page not removing the p2m mappings","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23033.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23033.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-23033","reference_id":"","reference_type":"","scores":[{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.26003","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.26045","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25817","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25887","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25938","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25948","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25906","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25852","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25856","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25838","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25808","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25751","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25743","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25696","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-23033"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23033","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23033"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23034","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23034"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23035","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23035"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26356","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26356"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26357","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26357"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26358","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26358"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26359","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26359"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26360","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26360"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26361","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26361"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2045043","reference_id":"2045043","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2045043"},{"reference_url":"https://security.gentoo.org/glsa/202208-23","reference_id":"GLSA-202208-23","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-23"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-393.html","reference_id":"XSA-393","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-393.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2022-23033","XSA-393"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9zqd-3x84-43gc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4280?format=json","vulnerability_id":"VCID-az8d-xrb4-3ug4","summary":"Another race in XENMAPSPACE_grant_table handling","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-28701","reference_id":"","reference_type":"","scores":[{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18443","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18682","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18819","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18872","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18593","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18673","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18729","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18732","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18684","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18634","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18578","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18586","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18607","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.185","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18486","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-28701"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28694","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28694"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28695","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28695"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28696","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28696"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28697","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28697"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28698","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28698"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28699","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28699"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28700","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28700"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28701","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28701"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.gentoo.org/glsa/202208-23","reference_id":"GLSA-202208-23","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-23"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-384.html","reference_id":"XSA-384","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-384.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2021-28701","XSA-384"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-az8d-xrb4-3ug4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4310?format=json","vulnerability_id":"VCID-b7tb-ns1t-fyaw","summary":"IOMMU: RMRR (VT-d) and unity map (AMD-Vi) handling issues","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26361","reference_id":"","reference_type":"","scores":[{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31052","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31574","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31618","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31437","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.3149","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31519","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31523","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31481","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31444","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31479","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31457","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31426","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31257","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31132","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26361"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23033","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23033"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23034","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23034"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23035","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23035"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26356","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26356"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26357","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26357"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26358","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26358"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26359","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26359"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26360","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26360"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26361","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26361"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.gentoo.org/glsa/202402-07","reference_id":"GLSA-202402-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-07"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-400.html","reference_id":"XSA-400","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-400.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2022-26361"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b7tb-ns1t-fyaw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4215?format=json","vulnerability_id":"VCID-bc6f-wu8g-5yb4","summary":"Xenstore: guests can disturb domain cleanup","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-29483","reference_id":"","reference_type":"","scores":[{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17323","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17518","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17681","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17727","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17447","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17538","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17597","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17615","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17568","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17516","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.1746","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17469","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17505","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17414","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17391","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-29483"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29479","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29479"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29481","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29481"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29482","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29482"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29483","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29483"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29484","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29484"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29485","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29485"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29486","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29486"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29566","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29566"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29570","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29570"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29571","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29571"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-325.html","reference_id":"XSA-325","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-325.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037808?format=json","purl":"pkg:deb/debian/xen@4.11.4%2B107-gef32c7afa2-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1wgc-r96w-7kg9"},{"vulnerability":"VCID-1wtd-67ef-1qej"},{"vulnerability":"VCID-1x3w-n7ms-eqeh"},{"vulnerability":"VCID-28t2-hng7-tfe5"},{"vulnerability":"VCID-2n9p-6t7s-kqc5"},{"vulnerability":"VCID-2uap-2vm1-efcr"},{"vulnerability":"VCID-32w3-vmcb-wfd9"},{"vulnerability":"VCID-34gr-dtsz-1fab"},{"vulnerability":"VCID-34ng-ftbx-e3cm"},{"vulnerability":"VCID-39t8-p1q7-eyag"},{"vulnerability":"VCID-3d53-4qtr-myhm"},{"vulnerability":"VCID-3pxf-xndw-5fft"},{"vulnerability":"VCID-3whm-8fyv-zyhd"},{"vulnerability":"VCID-416b-93m6-jyby"},{"vulnerability":"VCID-42ma-8ash-j7c8"},{"vulnerability":"VCID-4429-qf2w-jqg3"},{"vulnerability":"VCID-4spa-usqt-93b2"},{"vulnerability":"VCID-5cw7-rv5f-jfaq"},{"vulnerability":"VCID-5dbd-kz24-6fc1"},{"vulnerability":"VCID-6kh6-edk7-xkcc"},{"vulnerability":"VCID-6xbp-t4qh-tbhv"},{"vulnerability":"VCID-77st-3475-5kdr"},{"vulnerability":"VCID-7d5b-66n7-zbe1"},{"vulnerability":"VCID-7ek3-weqx-9fhs"},{"vulnerability":"VCID-7etc-u5ya-zued"},{"vulnerability":"VCID-7t5h-jy8h-t3d4"},{"vulnerability":"VCID-7wyt-uh2c-a3ha"},{"vulnerability":"VCID-7ysh-usku-c3dz"},{"vulnerability":"VCID-7zpj-3par-s3b5"},{"vulnerability":"VCID-87tq-2me2-d3bb"},{"vulnerability":"VCID-8cb8-vq2c-q3e9"},{"vulnerability":"VCID-8r8y-8bq2-jufj"},{"vulnerability":"VCID-91hk-73kq-83g6"},{"vulnerability":"VCID-9hr5-p18q-7qb8"},{"vulnerability":"VCID-9s43-gewn-bycc"},{"vulnerability":"VCID-9zqd-3x84-43gc"},{"vulnerability":"VCID-az8d-xrb4-3ug4"},{"vulnerability":"VCID-b7tb-ns1t-fyaw"},{"vulnerability":"VCID-bc6f-wu8g-5yb4"},{"vulnerability":"VCID-bs56-1z79-uqbt"},{"vulnerability":"VCID-bxae-85uh-uyek"},{"vulnerability":"VCID-bxb7-7gpw-qybb"},{"vulnerability":"VCID-bzve-5gwu-8ydb"},{"vulnerability":"VCID-csy7-esn4-u3gq"},{"vulnerability":"VCID-d3ad-6tme-bfem"},{"vulnerability":"VCID-dfjm-gwzm-jqbt"},{"vulnerability":"VCID-dgm4-ye4m-1fcq"},{"vulnerability":"VCID-dj1v-h79p-9ydz"},{"vulnerability":"VCID-dqy9-zkvw-e3gk"},{"vulnerability":"VCID-drhd-ytb7-u3em"},{"vulnerability":"VCID-e96u-uwba-kfg5"},{"vulnerability":"VCID-eb8v-p31a-yuhu"},{"vulnerability":"VCID-eka3-u8e5-3uad"},{"vulnerability":"VCID-ep7n-um5m-ekgk"},{"vulnerability":"VCID-fekb-fbhz-y7g7"},{"vulnerability":"VCID-fhbs-3nvf-tbha"},{"vulnerability":"VCID-fqt9-2esb-ffan"},{"vulnerability":"VCID-g72t-7kx1-abcs"},{"vulnerability":"VCID-gdsj-4cbx-ufep"},{"vulnerability":"VCID-gj1u-mbaj-kyc5"},{"vulnerability":"VCID-h9c6-yw5r-v3ex"},{"vulnerability":"VCID-hg4z-ad3f-fbc2"},{"vulnerability":"VCID-hsau-swt9-kyf7"},{"vulnerability":"VCID-hx7j-eymk-4ygk"},{"vulnerability":"VCID-hyup-47wa-pfac"},{"vulnerability":"VCID-jwdv-qe4x-yfgw"},{"vulnerability":"VCID-k5j4-3xmv-a7bk"},{"vulnerability":"VCID-kcj6-ua4t-ybgj"},{"vulnerability":"VCID-knqd-zktw-cydm"},{"vulnerability":"VCID-mcs2-ndqd-tydv"},{"vulnerability":"VCID-mf8g-nbkw-f7gr"},{"vulnerability":"VCID-n3t2-m6br-ufb3"},{"vulnerability":"VCID-n7pg-b7kc-wkew"},{"vulnerability":"VCID-ndz3-372h-8fhk"},{"vulnerability":"VCID-p3uc-18e9-skb4"},{"vulnerability":"VCID-p7ug-wwk5-63gb"},{"vulnerability":"VCID-pb8n-hmsc-syfw"},{"vulnerability":"VCID-pphm-ygb7-q7g2"},{"vulnerability":"VCID-pzt3-abab-4kdd"},{"vulnerability":"VCID-qnew-xqte-kbej"},{"vulnerability":"VCID-qprv-989b-k3d3"},{"vulnerability":"VCID-s4nf-p69f-pue8"},{"vulnerability":"VCID-td6e-x2qb-syg3"},{"vulnerability":"VCID-uunr-69dt-q7fn"},{"vulnerability":"VCID-uvcp-ad38-2kcs"},{"vulnerability":"VCID-vb2u-yc2z-ayh5"},{"vulnerability":"VCID-vs9k-akwv-h3ak"},{"vulnerability":"VCID-w2ch-guy5-6ye9"},{"vulnerability":"VCID-wh75-sc4f-qqc1"},{"vulnerability":"VCID-xcvw-eex8-j3bf"},{"vulnerability":"VCID-xe4j-gg7f-wyfa"},{"vulnerability":"VCID-z3g4-1vhq-97dj"},{"vulnerability":"VCID-z3qj-cnxq-pkgq"},{"vulnerability":"VCID-z8zf-cqkb-guge"},{"vulnerability":"VCID-zkyv-h5at-xkgq"},{"vulnerability":"VCID-zrxf-3w1d-t3ba"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.4%252B107-gef32c7afa2-1"},{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2020-29483","XSA-325"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bc6f-wu8g-5yb4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4236?format=json","vulnerability_id":"VCID-bs56-1z79-uqbt","summary":"x86 pv guest kernel DoS via SYSENTER","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25596.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25596.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-25596","reference_id":"","reference_type":"","scores":[{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24863","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24941","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24982","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24755","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24823","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24867","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24881","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24843","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24787","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24799","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24791","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24768","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24707","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24696","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24653","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-25596"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25595","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25595"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25596","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25596"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25602","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25602"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25603","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25603"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25604","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25604"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1880137","reference_id":"1880137","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1880137"},{"reference_url":"https://security.gentoo.org/glsa/202011-06","reference_id":"GLSA-202011-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202011-06"},{"reference_url":"https://usn.ubuntu.com/5617-1/","reference_id":"USN-5617-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5617-1/"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-339.html","reference_id":"XSA-339","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-339.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037808?format=json","purl":"pkg:deb/debian/xen@4.11.4%2B107-gef32c7afa2-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1wgc-r96w-7kg9"},{"vulnerability":"VCID-1wtd-67ef-1qej"},{"vulnerability":"VCID-1x3w-n7ms-eqeh"},{"vulnerability":"VCID-28t2-hng7-tfe5"},{"vulnerability":"VCID-2n9p-6t7s-kqc5"},{"vulnerability":"VCID-2uap-2vm1-efcr"},{"vulnerability":"VCID-32w3-vmcb-wfd9"},{"vulnerability":"VCID-34gr-dtsz-1fab"},{"vulnerability":"VCID-34ng-ftbx-e3cm"},{"vulnerability":"VCID-39t8-p1q7-eyag"},{"vulnerability":"VCID-3d53-4qtr-myhm"},{"vulnerability":"VCID-3pxf-xndw-5fft"},{"vulnerability":"VCID-3whm-8fyv-zyhd"},{"vulnerability":"VCID-416b-93m6-jyby"},{"vulnerability":"VCID-42ma-8ash-j7c8"},{"vulnerability":"VCID-4429-qf2w-jqg3"},{"vulnerability":"VCID-4spa-usqt-93b2"},{"vulnerability":"VCID-5cw7-rv5f-jfaq"},{"vulnerability":"VCID-5dbd-kz24-6fc1"},{"vulnerability":"VCID-6kh6-edk7-xkcc"},{"vulnerability":"VCID-6xbp-t4qh-tbhv"},{"vulnerability":"VCID-77st-3475-5kdr"},{"vulnerability":"VCID-7d5b-66n7-zbe1"},{"vulnerability":"VCID-7ek3-weqx-9fhs"},{"vulnerability":"VCID-7etc-u5ya-zued"},{"vulnerability":"VCID-7t5h-jy8h-t3d4"},{"vulnerability":"VCID-7wyt-uh2c-a3ha"},{"vulnerability":"VCID-7ysh-usku-c3dz"},{"vulnerability":"VCID-7zpj-3par-s3b5"},{"vulnerability":"VCID-87tq-2me2-d3bb"},{"vulnerability":"VCID-8cb8-vq2c-q3e9"},{"vulnerability":"VCID-8r8y-8bq2-jufj"},{"vulnerability":"VCID-91hk-73kq-83g6"},{"vulnerability":"VCID-9hr5-p18q-7qb8"},{"vulnerability":"VCID-9s43-gewn-bycc"},{"vulnerability":"VCID-9zqd-3x84-43gc"},{"vulnerability":"VCID-az8d-xrb4-3ug4"},{"vulnerability":"VCID-b7tb-ns1t-fyaw"},{"vulnerability":"VCID-bc6f-wu8g-5yb4"},{"vulnerability":"VCID-bs56-1z79-uqbt"},{"vulnerability":"VCID-bxae-85uh-uyek"},{"vulnerability":"VCID-bxb7-7gpw-qybb"},{"vulnerability":"VCID-bzve-5gwu-8ydb"},{"vulnerability":"VCID-csy7-esn4-u3gq"},{"vulnerability":"VCID-d3ad-6tme-bfem"},{"vulnerability":"VCID-dfjm-gwzm-jqbt"},{"vulnerability":"VCID-dgm4-ye4m-1fcq"},{"vulnerability":"VCID-dj1v-h79p-9ydz"},{"vulnerability":"VCID-dqy9-zkvw-e3gk"},{"vulnerability":"VCID-drhd-ytb7-u3em"},{"vulnerability":"VCID-e96u-uwba-kfg5"},{"vulnerability":"VCID-eb8v-p31a-yuhu"},{"vulnerability":"VCID-eka3-u8e5-3uad"},{"vulnerability":"VCID-ep7n-um5m-ekgk"},{"vulnerability":"VCID-fekb-fbhz-y7g7"},{"vulnerability":"VCID-fhbs-3nvf-tbha"},{"vulnerability":"VCID-fqt9-2esb-ffan"},{"vulnerability":"VCID-g72t-7kx1-abcs"},{"vulnerability":"VCID-gdsj-4cbx-ufep"},{"vulnerability":"VCID-gj1u-mbaj-kyc5"},{"vulnerability":"VCID-h9c6-yw5r-v3ex"},{"vulnerability":"VCID-hg4z-ad3f-fbc2"},{"vulnerability":"VCID-hsau-swt9-kyf7"},{"vulnerability":"VCID-hx7j-eymk-4ygk"},{"vulnerability":"VCID-hyup-47wa-pfac"},{"vulnerability":"VCID-jwdv-qe4x-yfgw"},{"vulnerability":"VCID-k5j4-3xmv-a7bk"},{"vulnerability":"VCID-kcj6-ua4t-ybgj"},{"vulnerability":"VCID-knqd-zktw-cydm"},{"vulnerability":"VCID-mcs2-ndqd-tydv"},{"vulnerability":"VCID-mf8g-nbkw-f7gr"},{"vulnerability":"VCID-n3t2-m6br-ufb3"},{"vulnerability":"VCID-n7pg-b7kc-wkew"},{"vulnerability":"VCID-ndz3-372h-8fhk"},{"vulnerability":"VCID-p3uc-18e9-skb4"},{"vulnerability":"VCID-p7ug-wwk5-63gb"},{"vulnerability":"VCID-pb8n-hmsc-syfw"},{"vulnerability":"VCID-pphm-ygb7-q7g2"},{"vulnerability":"VCID-pzt3-abab-4kdd"},{"vulnerability":"VCID-qnew-xqte-kbej"},{"vulnerability":"VCID-qprv-989b-k3d3"},{"vulnerability":"VCID-s4nf-p69f-pue8"},{"vulnerability":"VCID-td6e-x2qb-syg3"},{"vulnerability":"VCID-uunr-69dt-q7fn"},{"vulnerability":"VCID-uvcp-ad38-2kcs"},{"vulnerability":"VCID-vb2u-yc2z-ayh5"},{"vulnerability":"VCID-vs9k-akwv-h3ak"},{"vulnerability":"VCID-w2ch-guy5-6ye9"},{"vulnerability":"VCID-wh75-sc4f-qqc1"},{"vulnerability":"VCID-xcvw-eex8-j3bf"},{"vulnerability":"VCID-xe4j-gg7f-wyfa"},{"vulnerability":"VCID-z3g4-1vhq-97dj"},{"vulnerability":"VCID-z3qj-cnxq-pkgq"},{"vulnerability":"VCID-z8zf-cqkb-guge"},{"vulnerability":"VCID-zkyv-h5at-xkgq"},{"vulnerability":"VCID-zrxf-3w1d-t3ba"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.4%252B107-gef32c7afa2-1"},{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2020-25596","XSA-339"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bs56-1z79-uqbt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4286?format=json","vulnerability_id":"VCID-bxae-85uh-uyek","summary":"PoD operations on misaligned GFNs","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-28708","reference_id":"","reference_type":"","scores":[{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24723","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24867","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.2486","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24838","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24781","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.2477","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24929","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.25008","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.25047","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.2482","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24888","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24934","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24949","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24909","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24855","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-28708"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28702","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28702"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28704","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28704"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28705","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28705"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28706","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28706"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28707","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28707"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28708","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28708"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28709","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28709"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://xenbits.xenproject.org/xsa/advisory-388.txt","reference_id":"advisory-388.txt","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-18T20:21:02Z/"}],"url":"https://xenbits.xenproject.org/xsa/advisory-388.txt"},{"reference_url":"https://www.debian.org/security/2021/dsa-5017","reference_id":"dsa-5017","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-18T20:21:02Z/"}],"url":"https://www.debian.org/security/2021/dsa-5017"},{"reference_url":"https://security.gentoo.org/glsa/202402-07","reference_id":"GLSA-202402-07","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-18T20:21:02Z/"}],"url":"https://security.gentoo.org/glsa/202402-07"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I7ZGWVVRI4XY2XSTBI3XEMWBXPDVX6OT/","reference_id":"I7ZGWVVRI4XY2XSTBI3XEMWBXPDVX6OT","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-18T20:21:02Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I7ZGWVVRI4XY2XSTBI3XEMWBXPDVX6OT/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PXUI4VMD52CH3T7YXAG3J2JW7ZNN3SXF/","reference_id":"PXUI4VMD52CH3T7YXAG3J2JW7ZNN3SXF","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-18T20:21:02Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PXUI4VMD52CH3T7YXAG3J2JW7ZNN3SXF/"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-388.html","reference_id":"XSA-388","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-388.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2021-28708"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bxae-85uh-uyek"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4220?format=json","vulnerability_id":"VCID-bxb7-7gpw-qybb","summary":"Xenstore: guests can let run xenstored out of memory","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42315","reference_id":"","reference_type":"","scores":[{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24514","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24557","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.2457","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24626","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36545","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36569","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36603","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36596","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36577","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36688","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36525","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36656","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36572","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.3659","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42315"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://xenbits.xen.org/xsa/advisory-326.html","reference_id":"advisory-326.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T14:49:24Z/"}],"url":"http://xenbits.xen.org/xsa/advisory-326.html"},{"reference_url":"https://xenbits.xenproject.org/xsa/advisory-326.txt","reference_id":"advisory-326.txt","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T14:49:24Z/"}],"url":"https://xenbits.xenproject.org/xsa/advisory-326.txt"},{"reference_url":"https://www.debian.org/security/2022/dsa-5272","reference_id":"dsa-5272","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T14:49:24Z/"}],"url":"https://www.debian.org/security/2022/dsa-5272"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-326.html","reference_id":"XSA-326","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-326.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/","reference_id":"YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T14:49:24Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/","reference_id":"YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T14:49:24Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/","reference_id":"ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T14:49:24Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2022-42315"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bxb7-7gpw-qybb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4230?format=json","vulnerability_id":"VCID-bzve-5gwu-8ydb","summary":"x86 pv: Crash when handling guest access to MSR_MISC_ENABLE","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25602.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25602.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-25602","reference_id":"","reference_type":"","scores":[{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23866","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23986","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.24025","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.2381","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23877","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23923","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.2394","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23896","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23841","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23853","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23842","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23822","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23704","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23693","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23657","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-25602"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25595","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25595"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25596","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25596"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25602","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25602"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25603","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25603"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25604","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25604"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1880158","reference_id":"1880158","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1880158"},{"reference_url":"https://security.gentoo.org/glsa/202011-06","reference_id":"GLSA-202011-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202011-06"},{"reference_url":"https://usn.ubuntu.com/5617-1/","reference_id":"USN-5617-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5617-1/"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-333.html","reference_id":"XSA-333","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-333.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037808?format=json","purl":"pkg:deb/debian/xen@4.11.4%2B107-gef32c7afa2-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1wgc-r96w-7kg9"},{"vulnerability":"VCID-1wtd-67ef-1qej"},{"vulnerability":"VCID-1x3w-n7ms-eqeh"},{"vulnerability":"VCID-28t2-hng7-tfe5"},{"vulnerability":"VCID-2n9p-6t7s-kqc5"},{"vulnerability":"VCID-2uap-2vm1-efcr"},{"vulnerability":"VCID-32w3-vmcb-wfd9"},{"vulnerability":"VCID-34gr-dtsz-1fab"},{"vulnerability":"VCID-34ng-ftbx-e3cm"},{"vulnerability":"VCID-39t8-p1q7-eyag"},{"vulnerability":"VCID-3d53-4qtr-myhm"},{"vulnerability":"VCID-3pxf-xndw-5fft"},{"vulnerability":"VCID-3whm-8fyv-zyhd"},{"vulnerability":"VCID-416b-93m6-jyby"},{"vulnerability":"VCID-42ma-8ash-j7c8"},{"vulnerability":"VCID-4429-qf2w-jqg3"},{"vulnerability":"VCID-4spa-usqt-93b2"},{"vulnerability":"VCID-5cw7-rv5f-jfaq"},{"vulnerability":"VCID-5dbd-kz24-6fc1"},{"vulnerability":"VCID-6kh6-edk7-xkcc"},{"vulnerability":"VCID-6xbp-t4qh-tbhv"},{"vulnerability":"VCID-77st-3475-5kdr"},{"vulnerability":"VCID-7d5b-66n7-zbe1"},{"vulnerability":"VCID-7ek3-weqx-9fhs"},{"vulnerability":"VCID-7etc-u5ya-zued"},{"vulnerability":"VCID-7t5h-jy8h-t3d4"},{"vulnerability":"VCID-7wyt-uh2c-a3ha"},{"vulnerability":"VCID-7ysh-usku-c3dz"},{"vulnerability":"VCID-7zpj-3par-s3b5"},{"vulnerability":"VCID-87tq-2me2-d3bb"},{"vulnerability":"VCID-8cb8-vq2c-q3e9"},{"vulnerability":"VCID-8r8y-8bq2-jufj"},{"vulnerability":"VCID-91hk-73kq-83g6"},{"vulnerability":"VCID-9hr5-p18q-7qb8"},{"vulnerability":"VCID-9s43-gewn-bycc"},{"vulnerability":"VCID-9zqd-3x84-43gc"},{"vulnerability":"VCID-az8d-xrb4-3ug4"},{"vulnerability":"VCID-b7tb-ns1t-fyaw"},{"vulnerability":"VCID-bc6f-wu8g-5yb4"},{"vulnerability":"VCID-bs56-1z79-uqbt"},{"vulnerability":"VCID-bxae-85uh-uyek"},{"vulnerability":"VCID-bxb7-7gpw-qybb"},{"vulnerability":"VCID-bzve-5gwu-8ydb"},{"vulnerability":"VCID-csy7-esn4-u3gq"},{"vulnerability":"VCID-d3ad-6tme-bfem"},{"vulnerability":"VCID-dfjm-gwzm-jqbt"},{"vulnerability":"VCID-dgm4-ye4m-1fcq"},{"vulnerability":"VCID-dj1v-h79p-9ydz"},{"vulnerability":"VCID-dqy9-zkvw-e3gk"},{"vulnerability":"VCID-drhd-ytb7-u3em"},{"vulnerability":"VCID-e96u-uwba-kfg5"},{"vulnerability":"VCID-eb8v-p31a-yuhu"},{"vulnerability":"VCID-eka3-u8e5-3uad"},{"vulnerability":"VCID-ep7n-um5m-ekgk"},{"vulnerability":"VCID-fekb-fbhz-y7g7"},{"vulnerability":"VCID-fhbs-3nvf-tbha"},{"vulnerability":"VCID-fqt9-2esb-ffan"},{"vulnerability":"VCID-g72t-7kx1-abcs"},{"vulnerability":"VCID-gdsj-4cbx-ufep"},{"vulnerability":"VCID-gj1u-mbaj-kyc5"},{"vulnerability":"VCID-h9c6-yw5r-v3ex"},{"vulnerability":"VCID-hg4z-ad3f-fbc2"},{"vulnerability":"VCID-hsau-swt9-kyf7"},{"vulnerability":"VCID-hx7j-eymk-4ygk"},{"vulnerability":"VCID-hyup-47wa-pfac"},{"vulnerability":"VCID-jwdv-qe4x-yfgw"},{"vulnerability":"VCID-k5j4-3xmv-a7bk"},{"vulnerability":"VCID-kcj6-ua4t-ybgj"},{"vulnerability":"VCID-knqd-zktw-cydm"},{"vulnerability":"VCID-mcs2-ndqd-tydv"},{"vulnerability":"VCID-mf8g-nbkw-f7gr"},{"vulnerability":"VCID-n3t2-m6br-ufb3"},{"vulnerability":"VCID-n7pg-b7kc-wkew"},{"vulnerability":"VCID-ndz3-372h-8fhk"},{"vulnerability":"VCID-p3uc-18e9-skb4"},{"vulnerability":"VCID-p7ug-wwk5-63gb"},{"vulnerability":"VCID-pb8n-hmsc-syfw"},{"vulnerability":"VCID-pphm-ygb7-q7g2"},{"vulnerability":"VCID-pzt3-abab-4kdd"},{"vulnerability":"VCID-qnew-xqte-kbej"},{"vulnerability":"VCID-qprv-989b-k3d3"},{"vulnerability":"VCID-s4nf-p69f-pue8"},{"vulnerability":"VCID-td6e-x2qb-syg3"},{"vulnerability":"VCID-uunr-69dt-q7fn"},{"vulnerability":"VCID-uvcp-ad38-2kcs"},{"vulnerability":"VCID-vb2u-yc2z-ayh5"},{"vulnerability":"VCID-vs9k-akwv-h3ak"},{"vulnerability":"VCID-w2ch-guy5-6ye9"},{"vulnerability":"VCID-wh75-sc4f-qqc1"},{"vulnerability":"VCID-xcvw-eex8-j3bf"},{"vulnerability":"VCID-xe4j-gg7f-wyfa"},{"vulnerability":"VCID-z3g4-1vhq-97dj"},{"vulnerability":"VCID-z3qj-cnxq-pkgq"},{"vulnerability":"VCID-z8zf-cqkb-guge"},{"vulnerability":"VCID-zkyv-h5at-xkgq"},{"vulnerability":"VCID-zrxf-3w1d-t3ba"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.4%252B107-gef32c7afa2-1"},{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2020-25602","XSA-333"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bzve-5gwu-8ydb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4318?format=json","vulnerability_id":"VCID-csy7-esn4-u3gq","summary":"x86: MMIO Stale Data vulnerabilities","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21123.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21123.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21123","reference_id":"","reference_type":"","scores":[{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63685","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63769","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63755","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63739","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63751","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63741","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63706","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63754","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.6374","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63723","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63711","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63671","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00464","scoring_system":"epss","scoring_elements":"0.64395","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21123"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21127","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21127"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21151","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21151"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2022/06/16/1","reference_id":"1","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/"}],"url":"http://www.openwall.com/lists/oss-security/2022/06/16/1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2090237","reference_id":"2090237","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2090237"},{"reference_url":"https://www.debian.org/security/2022/dsa-5173","reference_id":"dsa-5173","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/"}],"url":"https://www.debian.org/security/2022/dsa-5173"},{"reference_url":"https://www.debian.org/security/2022/dsa-5178","reference_id":"dsa-5178","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/"}],"url":"https://www.debian.org/security/2022/dsa-5178"},{"reference_url":"https://www.debian.org/security/2022/dsa-5184","reference_id":"dsa-5184","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/"}],"url":"https://www.debian.org/security/2022/dsa-5184"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV/","reference_id":"FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV/"},{"reference_url":"https://security.gentoo.org/glsa/202208-23","reference_id":"GLSA-202208-23","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/"}],"url":"https://security.gentoo.org/glsa/202208-23"},{"reference_url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html","reference_id":"intel-sa-00615.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/"}],"url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS/","reference_id":"MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220624-0008/","reference_id":"ntap-20220624-0008","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220624-0008/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5937","reference_id":"RHSA-2022:5937","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5937"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5939","reference_id":"RHSA-2022:5939","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5939"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6437","reference_id":"RHSA-2022:6437","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6437"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6460","reference_id":"RHSA-2022:6460","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6460"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6872","reference_id":"RHSA-2022:6872","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6872"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6983","reference_id":"RHSA-2022:6983","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6983"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6991","reference_id":"RHSA-2022:6991","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6991"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7279","reference_id":"RHSA-2022:7279","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7279"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7280","reference_id":"RHSA-2022:7280","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7280"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7933","reference_id":"RHSA-2022:7933","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7933"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8267","reference_id":"RHSA-2022:8267","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8267"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8973","reference_id":"RHSA-2022:8973","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8973"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8974","reference_id":"RHSA-2022:8974","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8974"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q/","reference_id":"RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA/","reference_id":"T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA/"},{"reference_url":"https://usn.ubuntu.com/5484-1/","reference_id":"USN-5484-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5484-1/"},{"reference_url":"https://usn.ubuntu.com/5485-1/","reference_id":"USN-5485-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5485-1/"},{"reference_url":"https://usn.ubuntu.com/5485-2/","reference_id":"USN-5485-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5485-2/"},{"reference_url":"https://usn.ubuntu.com/5486-1/","reference_id":"USN-5486-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5486-1/"},{"reference_url":"https://usn.ubuntu.com/5505-1/","reference_id":"USN-5505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5505-1/"},{"reference_url":"https://usn.ubuntu.com/5513-1/","reference_id":"USN-5513-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5513-1/"},{"reference_url":"https://usn.ubuntu.com/5529-1/","reference_id":"USN-5529-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5529-1/"},{"reference_url":"https://usn.ubuntu.com/5535-1/","reference_id":"USN-5535-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5535-1/"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-404.html","reference_id":"XSA-404","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-404.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2022-21123"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-csy7-esn4-u3gq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4248?format=json","vulnerability_id":"VCID-d3ad-6tme-bfem","summary":"oxenstored: node ownership can be changed by unprivileged clients","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-29486","reference_id":"","reference_type":"","scores":[{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18989","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19124","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19176","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18893","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18972","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19026","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19033","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18987","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18935","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18889","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18901","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18913","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18804","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18783","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18738","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-29486"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29479","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29479"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29481","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29481"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29482","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29482"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29483","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29483"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29484","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29484"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29485","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29485"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29486","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29486"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29566","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29566"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29570","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29570"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29571","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29571"},{"reference_url":"https://security.gentoo.org/glsa/202107-30","reference_id":"GLSA-202107-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-30"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-352.html","reference_id":"XSA-352","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-352.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037808?format=json","purl":"pkg:deb/debian/xen@4.11.4%2B107-gef32c7afa2-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1wgc-r96w-7kg9"},{"vulnerability":"VCID-1wtd-67ef-1qej"},{"vulnerability":"VCID-1x3w-n7ms-eqeh"},{"vulnerability":"VCID-28t2-hng7-tfe5"},{"vulnerability":"VCID-2n9p-6t7s-kqc5"},{"vulnerability":"VCID-2uap-2vm1-efcr"},{"vulnerability":"VCID-32w3-vmcb-wfd9"},{"vulnerability":"VCID-34gr-dtsz-1fab"},{"vulnerability":"VCID-34ng-ftbx-e3cm"},{"vulnerability":"VCID-39t8-p1q7-eyag"},{"vulnerability":"VCID-3d53-4qtr-myhm"},{"vulnerability":"VCID-3pxf-xndw-5fft"},{"vulnerability":"VCID-3whm-8fyv-zyhd"},{"vulnerability":"VCID-416b-93m6-jyby"},{"vulnerability":"VCID-42ma-8ash-j7c8"},{"vulnerability":"VCID-4429-qf2w-jqg3"},{"vulnerability":"VCID-4spa-usqt-93b2"},{"vulnerability":"VCID-5cw7-rv5f-jfaq"},{"vulnerability":"VCID-5dbd-kz24-6fc1"},{"vulnerability":"VCID-6kh6-edk7-xkcc"},{"vulnerability":"VCID-6xbp-t4qh-tbhv"},{"vulnerability":"VCID-77st-3475-5kdr"},{"vulnerability":"VCID-7d5b-66n7-zbe1"},{"vulnerability":"VCID-7ek3-weqx-9fhs"},{"vulnerability":"VCID-7etc-u5ya-zued"},{"vulnerability":"VCID-7t5h-jy8h-t3d4"},{"vulnerability":"VCID-7wyt-uh2c-a3ha"},{"vulnerability":"VCID-7ysh-usku-c3dz"},{"vulnerability":"VCID-7zpj-3par-s3b5"},{"vulnerability":"VCID-87tq-2me2-d3bb"},{"vulnerability":"VCID-8cb8-vq2c-q3e9"},{"vulnerability":"VCID-8r8y-8bq2-jufj"},{"vulnerability":"VCID-91hk-73kq-83g6"},{"vulnerability":"VCID-9hr5-p18q-7qb8"},{"vulnerability":"VCID-9s43-gewn-bycc"},{"vulnerability":"VCID-9zqd-3x84-43gc"},{"vulnerability":"VCID-az8d-xrb4-3ug4"},{"vulnerability":"VCID-b7tb-ns1t-fyaw"},{"vulnerability":"VCID-bc6f-wu8g-5yb4"},{"vulnerability":"VCID-bs56-1z79-uqbt"},{"vulnerability":"VCID-bxae-85uh-uyek"},{"vulnerability":"VCID-bxb7-7gpw-qybb"},{"vulnerability":"VCID-bzve-5gwu-8ydb"},{"vulnerability":"VCID-csy7-esn4-u3gq"},{"vulnerability":"VCID-d3ad-6tme-bfem"},{"vulnerability":"VCID-dfjm-gwzm-jqbt"},{"vulnerability":"VCID-dgm4-ye4m-1fcq"},{"vulnerability":"VCID-dj1v-h79p-9ydz"},{"vulnerability":"VCID-dqy9-zkvw-e3gk"},{"vulnerability":"VCID-drhd-ytb7-u3em"},{"vulnerability":"VCID-e96u-uwba-kfg5"},{"vulnerability":"VCID-eb8v-p31a-yuhu"},{"vulnerability":"VCID-eka3-u8e5-3uad"},{"vulnerability":"VCID-ep7n-um5m-ekgk"},{"vulnerability":"VCID-fekb-fbhz-y7g7"},{"vulnerability":"VCID-fhbs-3nvf-tbha"},{"vulnerability":"VCID-fqt9-2esb-ffan"},{"vulnerability":"VCID-g72t-7kx1-abcs"},{"vulnerability":"VCID-gdsj-4cbx-ufep"},{"vulnerability":"VCID-gj1u-mbaj-kyc5"},{"vulnerability":"VCID-h9c6-yw5r-v3ex"},{"vulnerability":"VCID-hg4z-ad3f-fbc2"},{"vulnerability":"VCID-hsau-swt9-kyf7"},{"vulnerability":"VCID-hx7j-eymk-4ygk"},{"vulnerability":"VCID-hyup-47wa-pfac"},{"vulnerability":"VCID-jwdv-qe4x-yfgw"},{"vulnerability":"VCID-k5j4-3xmv-a7bk"},{"vulnerability":"VCID-kcj6-ua4t-ybgj"},{"vulnerability":"VCID-knqd-zktw-cydm"},{"vulnerability":"VCID-mcs2-ndqd-tydv"},{"vulnerability":"VCID-mf8g-nbkw-f7gr"},{"vulnerability":"VCID-n3t2-m6br-ufb3"},{"vulnerability":"VCID-n7pg-b7kc-wkew"},{"vulnerability":"VCID-ndz3-372h-8fhk"},{"vulnerability":"VCID-p3uc-18e9-skb4"},{"vulnerability":"VCID-p7ug-wwk5-63gb"},{"vulnerability":"VCID-pb8n-hmsc-syfw"},{"vulnerability":"VCID-pphm-ygb7-q7g2"},{"vulnerability":"VCID-pzt3-abab-4kdd"},{"vulnerability":"VCID-qnew-xqte-kbej"},{"vulnerability":"VCID-qprv-989b-k3d3"},{"vulnerability":"VCID-s4nf-p69f-pue8"},{"vulnerability":"VCID-td6e-x2qb-syg3"},{"vulnerability":"VCID-uunr-69dt-q7fn"},{"vulnerability":"VCID-uvcp-ad38-2kcs"},{"vulnerability":"VCID-vb2u-yc2z-ayh5"},{"vulnerability":"VCID-vs9k-akwv-h3ak"},{"vulnerability":"VCID-w2ch-guy5-6ye9"},{"vulnerability":"VCID-wh75-sc4f-qqc1"},{"vulnerability":"VCID-xcvw-eex8-j3bf"},{"vulnerability":"VCID-xe4j-gg7f-wyfa"},{"vulnerability":"VCID-z3g4-1vhq-97dj"},{"vulnerability":"VCID-z3qj-cnxq-pkgq"},{"vulnerability":"VCID-z8zf-cqkb-guge"},{"vulnerability":"VCID-zkyv-h5at-xkgq"},{"vulnerability":"VCID-zrxf-3w1d-t3ba"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.4%252B107-gef32c7afa2-1"},{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2020-29486","XSA-352"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-d3ad-6tme-bfem"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4339?format=json","vulnerability_id":"VCID-dfjm-gwzm-jqbt","summary":"Oxenstored 32->31 bit integer truncation issues","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42324","reference_id":"","reference_type":"","scores":[{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10122","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10183","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10087","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.1015","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10047","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11591","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11713","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11671","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11632","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11556","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.1179","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11751","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11726","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11589","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42324"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.gentoo.org/glsa/202402-07","reference_id":"GLSA-202402-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-07"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-420.html","reference_id":"XSA-420","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-420.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2022-42324","XSA-420"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dfjm-gwzm-jqbt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4335?format=json","vulnerability_id":"VCID-dgm4-ye4m-1fcq","summary":"Xenstore: Guests can get access to Xenstore nodes of deleted domains","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42320","reference_id":"","reference_type":"","scores":[{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12428","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12384","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12359","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12308","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12229","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14067","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14108","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.13898","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.13907","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14013","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14753","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14774","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.1481","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14809","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42320"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2022/11/01/7","reference_id":"7","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T14:37:14Z/"}],"url":"http://www.openwall.com/lists/oss-security/2022/11/01/7"},{"reference_url":"http://xenbits.xen.org/xsa/advisory-417.html","reference_id":"advisory-417.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T14:37:14Z/"}],"url":"http://xenbits.xen.org/xsa/advisory-417.html"},{"reference_url":"https://xenbits.xenproject.org/xsa/advisory-417.txt","reference_id":"advisory-417.txt","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T14:37:14Z/"}],"url":"https://xenbits.xenproject.org/xsa/advisory-417.txt"},{"reference_url":"https://www.debian.org/security/2022/dsa-5272","reference_id":"dsa-5272","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T14:37:14Z/"}],"url":"https://www.debian.org/security/2022/dsa-5272"},{"reference_url":"https://security.gentoo.org/glsa/202402-07","reference_id":"GLSA-202402-07","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T14:37:14Z/"}],"url":"https://security.gentoo.org/glsa/202402-07"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-417.html","reference_id":"XSA-417","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-417.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/","reference_id":"YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T14:37:14Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/","reference_id":"YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T14:37:14Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/","reference_id":"ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T14:37:14Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2022-42320","XSA-417"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dgm4-ye4m-1fcq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4305?format=json","vulnerability_id":"VCID-dj1v-h79p-9ydz","summary":"Racy interactions between dirty vram tracking and paging log dirty hypercalls","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26356","reference_id":"","reference_type":"","scores":[{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14927","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15105","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15172","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14976","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15065","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15116","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15084","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15045","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14985","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14882","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14889","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14943","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14982","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26356"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23033","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23033"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23034","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23034"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23035","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23035"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26356","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26356"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26357","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26357"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26358","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26358"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26359","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26359"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26360","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26360"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26361","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26361"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.gentoo.org/glsa/202402-07","reference_id":"GLSA-202402-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-07"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-397.html","reference_id":"XSA-397","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-397.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2022-26356","XSA-397"],"risk_score":1.7,"exploitability":"0.5","weighted_severity":"3.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dj1v-h79p-9ydz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4240?format=json","vulnerability_id":"VCID-dqy9-zkvw-e3gk","summary":"lack of preemption in evtchn_reset() / evtchn_destroy()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25601.json","reference_id":"","reference_type":"","scores":[{"value":"6.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25601.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-25601","reference_id":"","reference_type":"","scores":[{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22683","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22858","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22902","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22695","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22771","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22823","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22845","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22808","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22751","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22765","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22761","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.2272","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22557","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22549","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22547","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-25601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25595","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25595"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25596","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25596"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25602","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25602"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25603","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25603"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25604","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25604"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1877378","reference_id":"1877378","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1877378"},{"reference_url":"https://security.gentoo.org/glsa/202011-06","reference_id":"GLSA-202011-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202011-06"},{"reference_url":"https://usn.ubuntu.com/5617-1/","reference_id":"USN-5617-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5617-1/"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-344.html","reference_id":"XSA-344","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-344.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037808?format=json","purl":"pkg:deb/debian/xen@4.11.4%2B107-gef32c7afa2-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1wgc-r96w-7kg9"},{"vulnerability":"VCID-1wtd-67ef-1qej"},{"vulnerability":"VCID-1x3w-n7ms-eqeh"},{"vulnerability":"VCID-28t2-hng7-tfe5"},{"vulnerability":"VCID-2n9p-6t7s-kqc5"},{"vulnerability":"VCID-2uap-2vm1-efcr"},{"vulnerability":"VCID-32w3-vmcb-wfd9"},{"vulnerability":"VCID-34gr-dtsz-1fab"},{"vulnerability":"VCID-34ng-ftbx-e3cm"},{"vulnerability":"VCID-39t8-p1q7-eyag"},{"vulnerability":"VCID-3d53-4qtr-myhm"},{"vulnerability":"VCID-3pxf-xndw-5fft"},{"vulnerability":"VCID-3whm-8fyv-zyhd"},{"vulnerability":"VCID-416b-93m6-jyby"},{"vulnerability":"VCID-42ma-8ash-j7c8"},{"vulnerability":"VCID-4429-qf2w-jqg3"},{"vulnerability":"VCID-4spa-usqt-93b2"},{"vulnerability":"VCID-5cw7-rv5f-jfaq"},{"vulnerability":"VCID-5dbd-kz24-6fc1"},{"vulnerability":"VCID-6kh6-edk7-xkcc"},{"vulnerability":"VCID-6xbp-t4qh-tbhv"},{"vulnerability":"VCID-77st-3475-5kdr"},{"vulnerability":"VCID-7d5b-66n7-zbe1"},{"vulnerability":"VCID-7ek3-weqx-9fhs"},{"vulnerability":"VCID-7etc-u5ya-zued"},{"vulnerability":"VCID-7t5h-jy8h-t3d4"},{"vulnerability":"VCID-7wyt-uh2c-a3ha"},{"vulnerability":"VCID-7ysh-usku-c3dz"},{"vulnerability":"VCID-7zpj-3par-s3b5"},{"vulnerability":"VCID-87tq-2me2-d3bb"},{"vulnerability":"VCID-8cb8-vq2c-q3e9"},{"vulnerability":"VCID-8r8y-8bq2-jufj"},{"vulnerability":"VCID-91hk-73kq-83g6"},{"vulnerability":"VCID-9hr5-p18q-7qb8"},{"vulnerability":"VCID-9s43-gewn-bycc"},{"vulnerability":"VCID-9zqd-3x84-43gc"},{"vulnerability":"VCID-az8d-xrb4-3ug4"},{"vulnerability":"VCID-b7tb-ns1t-fyaw"},{"vulnerability":"VCID-bc6f-wu8g-5yb4"},{"vulnerability":"VCID-bs56-1z79-uqbt"},{"vulnerability":"VCID-bxae-85uh-uyek"},{"vulnerability":"VCID-bxb7-7gpw-qybb"},{"vulnerability":"VCID-bzve-5gwu-8ydb"},{"vulnerability":"VCID-csy7-esn4-u3gq"},{"vulnerability":"VCID-d3ad-6tme-bfem"},{"vulnerability":"VCID-dfjm-gwzm-jqbt"},{"vulnerability":"VCID-dgm4-ye4m-1fcq"},{"vulnerability":"VCID-dj1v-h79p-9ydz"},{"vulnerability":"VCID-dqy9-zkvw-e3gk"},{"vulnerability":"VCID-drhd-ytb7-u3em"},{"vulnerability":"VCID-e96u-uwba-kfg5"},{"vulnerability":"VCID-eb8v-p31a-yuhu"},{"vulnerability":"VCID-eka3-u8e5-3uad"},{"vulnerability":"VCID-ep7n-um5m-ekgk"},{"vulnerability":"VCID-fekb-fbhz-y7g7"},{"vulnerability":"VCID-fhbs-3nvf-tbha"},{"vulnerability":"VCID-fqt9-2esb-ffan"},{"vulnerability":"VCID-g72t-7kx1-abcs"},{"vulnerability":"VCID-gdsj-4cbx-ufep"},{"vulnerability":"VCID-gj1u-mbaj-kyc5"},{"vulnerability":"VCID-h9c6-yw5r-v3ex"},{"vulnerability":"VCID-hg4z-ad3f-fbc2"},{"vulnerability":"VCID-hsau-swt9-kyf7"},{"vulnerability":"VCID-hx7j-eymk-4ygk"},{"vulnerability":"VCID-hyup-47wa-pfac"},{"vulnerability":"VCID-jwdv-qe4x-yfgw"},{"vulnerability":"VCID-k5j4-3xmv-a7bk"},{"vulnerability":"VCID-kcj6-ua4t-ybgj"},{"vulnerability":"VCID-knqd-zktw-cydm"},{"vulnerability":"VCID-mcs2-ndqd-tydv"},{"vulnerability":"VCID-mf8g-nbkw-f7gr"},{"vulnerability":"VCID-n3t2-m6br-ufb3"},{"vulnerability":"VCID-n7pg-b7kc-wkew"},{"vulnerability":"VCID-ndz3-372h-8fhk"},{"vulnerability":"VCID-p3uc-18e9-skb4"},{"vulnerability":"VCID-p7ug-wwk5-63gb"},{"vulnerability":"VCID-pb8n-hmsc-syfw"},{"vulnerability":"VCID-pphm-ygb7-q7g2"},{"vulnerability":"VCID-pzt3-abab-4kdd"},{"vulnerability":"VCID-qnew-xqte-kbej"},{"vulnerability":"VCID-qprv-989b-k3d3"},{"vulnerability":"VCID-s4nf-p69f-pue8"},{"vulnerability":"VCID-td6e-x2qb-syg3"},{"vulnerability":"VCID-uunr-69dt-q7fn"},{"vulnerability":"VCID-uvcp-ad38-2kcs"},{"vulnerability":"VCID-vb2u-yc2z-ayh5"},{"vulnerability":"VCID-vs9k-akwv-h3ak"},{"vulnerability":"VCID-w2ch-guy5-6ye9"},{"vulnerability":"VCID-wh75-sc4f-qqc1"},{"vulnerability":"VCID-xcvw-eex8-j3bf"},{"vulnerability":"VCID-xe4j-gg7f-wyfa"},{"vulnerability":"VCID-z3g4-1vhq-97dj"},{"vulnerability":"VCID-z3qj-cnxq-pkgq"},{"vulnerability":"VCID-z8zf-cqkb-guge"},{"vulnerability":"VCID-zkyv-h5at-xkgq"},{"vulnerability":"VCID-zrxf-3w1d-t3ba"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.4%252B107-gef32c7afa2-1"},{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2020-25601","XSA-344"],"risk_score":2.7,"exploitability":"0.5","weighted_severity":"5.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dqy9-zkvw-e3gk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4212?format=json","vulnerability_id":"VCID-drhd-ytb7-u3em","summary":"Xenstore: new domains inheriting existing node permissions","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-29481","reference_id":"","reference_type":"","scores":[{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20281","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20465","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20609","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20667","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20394","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20475","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20534","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20558","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20513","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20458","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.2045","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20446","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20321","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20315","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-29481"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29479","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29479"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29481","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29481"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29482","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29482"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29483","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29483"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29484","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29484"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29485","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29485"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29486","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29486"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29566","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29566"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29570","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29570"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29571","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29571"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-322.html","reference_id":"XSA-322","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-322.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037808?format=json","purl":"pkg:deb/debian/xen@4.11.4%2B107-gef32c7afa2-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1wgc-r96w-7kg9"},{"vulnerability":"VCID-1wtd-67ef-1qej"},{"vulnerability":"VCID-1x3w-n7ms-eqeh"},{"vulnerability":"VCID-28t2-hng7-tfe5"},{"vulnerability":"VCID-2n9p-6t7s-kqc5"},{"vulnerability":"VCID-2uap-2vm1-efcr"},{"vulnerability":"VCID-32w3-vmcb-wfd9"},{"vulnerability":"VCID-34gr-dtsz-1fab"},{"vulnerability":"VCID-34ng-ftbx-e3cm"},{"vulnerability":"VCID-39t8-p1q7-eyag"},{"vulnerability":"VCID-3d53-4qtr-myhm"},{"vulnerability":"VCID-3pxf-xndw-5fft"},{"vulnerability":"VCID-3whm-8fyv-zyhd"},{"vulnerability":"VCID-416b-93m6-jyby"},{"vulnerability":"VCID-42ma-8ash-j7c8"},{"vulnerability":"VCID-4429-qf2w-jqg3"},{"vulnerability":"VCID-4spa-usqt-93b2"},{"vulnerability":"VCID-5cw7-rv5f-jfaq"},{"vulnerability":"VCID-5dbd-kz24-6fc1"},{"vulnerability":"VCID-6kh6-edk7-xkcc"},{"vulnerability":"VCID-6xbp-t4qh-tbhv"},{"vulnerability":"VCID-77st-3475-5kdr"},{"vulnerability":"VCID-7d5b-66n7-zbe1"},{"vulnerability":"VCID-7ek3-weqx-9fhs"},{"vulnerability":"VCID-7etc-u5ya-zued"},{"vulnerability":"VCID-7t5h-jy8h-t3d4"},{"vulnerability":"VCID-7wyt-uh2c-a3ha"},{"vulnerability":"VCID-7ysh-usku-c3dz"},{"vulnerability":"VCID-7zpj-3par-s3b5"},{"vulnerability":"VCID-87tq-2me2-d3bb"},{"vulnerability":"VCID-8cb8-vq2c-q3e9"},{"vulnerability":"VCID-8r8y-8bq2-jufj"},{"vulnerability":"VCID-91hk-73kq-83g6"},{"vulnerability":"VCID-9hr5-p18q-7qb8"},{"vulnerability":"VCID-9s43-gewn-bycc"},{"vulnerability":"VCID-9zqd-3x84-43gc"},{"vulnerability":"VCID-az8d-xrb4-3ug4"},{"vulnerability":"VCID-b7tb-ns1t-fyaw"},{"vulnerability":"VCID-bc6f-wu8g-5yb4"},{"vulnerability":"VCID-bs56-1z79-uqbt"},{"vulnerability":"VCID-bxae-85uh-uyek"},{"vulnerability":"VCID-bxb7-7gpw-qybb"},{"vulnerability":"VCID-bzve-5gwu-8ydb"},{"vulnerability":"VCID-csy7-esn4-u3gq"},{"vulnerability":"VCID-d3ad-6tme-bfem"},{"vulnerability":"VCID-dfjm-gwzm-jqbt"},{"vulnerability":"VCID-dgm4-ye4m-1fcq"},{"vulnerability":"VCID-dj1v-h79p-9ydz"},{"vulnerability":"VCID-dqy9-zkvw-e3gk"},{"vulnerability":"VCID-drhd-ytb7-u3em"},{"vulnerability":"VCID-e96u-uwba-kfg5"},{"vulnerability":"VCID-eb8v-p31a-yuhu"},{"vulnerability":"VCID-eka3-u8e5-3uad"},{"vulnerability":"VCID-ep7n-um5m-ekgk"},{"vulnerability":"VCID-fekb-fbhz-y7g7"},{"vulnerability":"VCID-fhbs-3nvf-tbha"},{"vulnerability":"VCID-fqt9-2esb-ffan"},{"vulnerability":"VCID-g72t-7kx1-abcs"},{"vulnerability":"VCID-gdsj-4cbx-ufep"},{"vulnerability":"VCID-gj1u-mbaj-kyc5"},{"vulnerability":"VCID-h9c6-yw5r-v3ex"},{"vulnerability":"VCID-hg4z-ad3f-fbc2"},{"vulnerability":"VCID-hsau-swt9-kyf7"},{"vulnerability":"VCID-hx7j-eymk-4ygk"},{"vulnerability":"VCID-hyup-47wa-pfac"},{"vulnerability":"VCID-jwdv-qe4x-yfgw"},{"vulnerability":"VCID-k5j4-3xmv-a7bk"},{"vulnerability":"VCID-kcj6-ua4t-ybgj"},{"vulnerability":"VCID-knqd-zktw-cydm"},{"vulnerability":"VCID-mcs2-ndqd-tydv"},{"vulnerability":"VCID-mf8g-nbkw-f7gr"},{"vulnerability":"VCID-n3t2-m6br-ufb3"},{"vulnerability":"VCID-n7pg-b7kc-wkew"},{"vulnerability":"VCID-ndz3-372h-8fhk"},{"vulnerability":"VCID-p3uc-18e9-skb4"},{"vulnerability":"VCID-p7ug-wwk5-63gb"},{"vulnerability":"VCID-pb8n-hmsc-syfw"},{"vulnerability":"VCID-pphm-ygb7-q7g2"},{"vulnerability":"VCID-pzt3-abab-4kdd"},{"vulnerability":"VCID-qnew-xqte-kbej"},{"vulnerability":"VCID-qprv-989b-k3d3"},{"vulnerability":"VCID-s4nf-p69f-pue8"},{"vulnerability":"VCID-td6e-x2qb-syg3"},{"vulnerability":"VCID-uunr-69dt-q7fn"},{"vulnerability":"VCID-uvcp-ad38-2kcs"},{"vulnerability":"VCID-vb2u-yc2z-ayh5"},{"vulnerability":"VCID-vs9k-akwv-h3ak"},{"vulnerability":"VCID-w2ch-guy5-6ye9"},{"vulnerability":"VCID-wh75-sc4f-qqc1"},{"vulnerability":"VCID-xcvw-eex8-j3bf"},{"vulnerability":"VCID-xe4j-gg7f-wyfa"},{"vulnerability":"VCID-z3g4-1vhq-97dj"},{"vulnerability":"VCID-z3qj-cnxq-pkgq"},{"vulnerability":"VCID-z8zf-cqkb-guge"},{"vulnerability":"VCID-zkyv-h5at-xkgq"},{"vulnerability":"VCID-zrxf-3w1d-t3ba"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.4%252B107-gef32c7afa2-1"},{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2020-29481","XSA-322"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-drhd-ytb7-u3em"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4271?format=json","vulnerability_id":"VCID-e96u-uwba-kfg5","summary":"Speculative Code Store Bypass","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-26313","reference_id":"","reference_type":"","scores":[{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23106","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23281","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23324","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23112","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23186","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23237","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23259","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23222","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23163","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.2318","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23172","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23133","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.22958","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.22952","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.22948","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-26313"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0089","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0089"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26313","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26313"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28690","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28690"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28692","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28692"},{"reference_url":"https://security.gentoo.org/glsa/202107-30","reference_id":"GLSA-202107-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-30"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-375.html","reference_id":"XSA-375","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-375.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037808?format=json","purl":"pkg:deb/debian/xen@4.11.4%2B107-gef32c7afa2-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1wgc-r96w-7kg9"},{"vulnerability":"VCID-1wtd-67ef-1qej"},{"vulnerability":"VCID-1x3w-n7ms-eqeh"},{"vulnerability":"VCID-28t2-hng7-tfe5"},{"vulnerability":"VCID-2n9p-6t7s-kqc5"},{"vulnerability":"VCID-2uap-2vm1-efcr"},{"vulnerability":"VCID-32w3-vmcb-wfd9"},{"vulnerability":"VCID-34gr-dtsz-1fab"},{"vulnerability":"VCID-34ng-ftbx-e3cm"},{"vulnerability":"VCID-39t8-p1q7-eyag"},{"vulnerability":"VCID-3d53-4qtr-myhm"},{"vulnerability":"VCID-3pxf-xndw-5fft"},{"vulnerability":"VCID-3whm-8fyv-zyhd"},{"vulnerability":"VCID-416b-93m6-jyby"},{"vulnerability":"VCID-42ma-8ash-j7c8"},{"vulnerability":"VCID-4429-qf2w-jqg3"},{"vulnerability":"VCID-4spa-usqt-93b2"},{"vulnerability":"VCID-5cw7-rv5f-jfaq"},{"vulnerability":"VCID-5dbd-kz24-6fc1"},{"vulnerability":"VCID-6kh6-edk7-xkcc"},{"vulnerability":"VCID-6xbp-t4qh-tbhv"},{"vulnerability":"VCID-77st-3475-5kdr"},{"vulnerability":"VCID-7d5b-66n7-zbe1"},{"vulnerability":"VCID-7ek3-weqx-9fhs"},{"vulnerability":"VCID-7etc-u5ya-zued"},{"vulnerability":"VCID-7t5h-jy8h-t3d4"},{"vulnerability":"VCID-7wyt-uh2c-a3ha"},{"vulnerability":"VCID-7ysh-usku-c3dz"},{"vulnerability":"VCID-7zpj-3par-s3b5"},{"vulnerability":"VCID-87tq-2me2-d3bb"},{"vulnerability":"VCID-8cb8-vq2c-q3e9"},{"vulnerability":"VCID-8r8y-8bq2-jufj"},{"vulnerability":"VCID-91hk-73kq-83g6"},{"vulnerability":"VCID-9hr5-p18q-7qb8"},{"vulnerability":"VCID-9s43-gewn-bycc"},{"vulnerability":"VCID-9zqd-3x84-43gc"},{"vulnerability":"VCID-az8d-xrb4-3ug4"},{"vulnerability":"VCID-b7tb-ns1t-fyaw"},{"vulnerability":"VCID-bc6f-wu8g-5yb4"},{"vulnerability":"VCID-bs56-1z79-uqbt"},{"vulnerability":"VCID-bxae-85uh-uyek"},{"vulnerability":"VCID-bxb7-7gpw-qybb"},{"vulnerability":"VCID-bzve-5gwu-8ydb"},{"vulnerability":"VCID-csy7-esn4-u3gq"},{"vulnerability":"VCID-d3ad-6tme-bfem"},{"vulnerability":"VCID-dfjm-gwzm-jqbt"},{"vulnerability":"VCID-dgm4-ye4m-1fcq"},{"vulnerability":"VCID-dj1v-h79p-9ydz"},{"vulnerability":"VCID-dqy9-zkvw-e3gk"},{"vulnerability":"VCID-drhd-ytb7-u3em"},{"vulnerability":"VCID-e96u-uwba-kfg5"},{"vulnerability":"VCID-eb8v-p31a-yuhu"},{"vulnerability":"VCID-eka3-u8e5-3uad"},{"vulnerability":"VCID-ep7n-um5m-ekgk"},{"vulnerability":"VCID-fekb-fbhz-y7g7"},{"vulnerability":"VCID-fhbs-3nvf-tbha"},{"vulnerability":"VCID-fqt9-2esb-ffan"},{"vulnerability":"VCID-g72t-7kx1-abcs"},{"vulnerability":"VCID-gdsj-4cbx-ufep"},{"vulnerability":"VCID-gj1u-mbaj-kyc5"},{"vulnerability":"VCID-h9c6-yw5r-v3ex"},{"vulnerability":"VCID-hg4z-ad3f-fbc2"},{"vulnerability":"VCID-hsau-swt9-kyf7"},{"vulnerability":"VCID-hx7j-eymk-4ygk"},{"vulnerability":"VCID-hyup-47wa-pfac"},{"vulnerability":"VCID-jwdv-qe4x-yfgw"},{"vulnerability":"VCID-k5j4-3xmv-a7bk"},{"vulnerability":"VCID-kcj6-ua4t-ybgj"},{"vulnerability":"VCID-knqd-zktw-cydm"},{"vulnerability":"VCID-mcs2-ndqd-tydv"},{"vulnerability":"VCID-mf8g-nbkw-f7gr"},{"vulnerability":"VCID-n3t2-m6br-ufb3"},{"vulnerability":"VCID-n7pg-b7kc-wkew"},{"vulnerability":"VCID-ndz3-372h-8fhk"},{"vulnerability":"VCID-p3uc-18e9-skb4"},{"vulnerability":"VCID-p7ug-wwk5-63gb"},{"vulnerability":"VCID-pb8n-hmsc-syfw"},{"vulnerability":"VCID-pphm-ygb7-q7g2"},{"vulnerability":"VCID-pzt3-abab-4kdd"},{"vulnerability":"VCID-qnew-xqte-kbej"},{"vulnerability":"VCID-qprv-989b-k3d3"},{"vulnerability":"VCID-s4nf-p69f-pue8"},{"vulnerability":"VCID-td6e-x2qb-syg3"},{"vulnerability":"VCID-uunr-69dt-q7fn"},{"vulnerability":"VCID-uvcp-ad38-2kcs"},{"vulnerability":"VCID-vb2u-yc2z-ayh5"},{"vulnerability":"VCID-vs9k-akwv-h3ak"},{"vulnerability":"VCID-w2ch-guy5-6ye9"},{"vulnerability":"VCID-wh75-sc4f-qqc1"},{"vulnerability":"VCID-xcvw-eex8-j3bf"},{"vulnerability":"VCID-xe4j-gg7f-wyfa"},{"vulnerability":"VCID-z3g4-1vhq-97dj"},{"vulnerability":"VCID-z3qj-cnxq-pkgq"},{"vulnerability":"VCID-z8zf-cqkb-guge"},{"vulnerability":"VCID-zkyv-h5at-xkgq"},{"vulnerability":"VCID-zrxf-3w1d-t3ba"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.4%252B107-gef32c7afa2-1"},{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2021-26313"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e96u-uwba-kfg5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4235?format=json","vulnerability_id":"VCID-eb8v-p31a-yuhu","summary":"once valid event channels may not turn invalid","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25597.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25597.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-25597","reference_id":"","reference_type":"","scores":[{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29184","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.2926","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.2931","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29122","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29187","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29227","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29233","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29186","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29134","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.2916","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29137","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29088","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.28968","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.28856","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.28785","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-25597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25595","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25595"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25596","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25596"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25602","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25602"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25603","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25603"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25604","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25604"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1879553","reference_id":"1879553","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1879553"},{"reference_url":"https://security.gentoo.org/glsa/202011-06","reference_id":"GLSA-202011-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202011-06"},{"reference_url":"https://usn.ubuntu.com/5617-1/","reference_id":"USN-5617-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5617-1/"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-338.html","reference_id":"XSA-338","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-338.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037808?format=json","purl":"pkg:deb/debian/xen@4.11.4%2B107-gef32c7afa2-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1wgc-r96w-7kg9"},{"vulnerability":"VCID-1wtd-67ef-1qej"},{"vulnerability":"VCID-1x3w-n7ms-eqeh"},{"vulnerability":"VCID-28t2-hng7-tfe5"},{"vulnerability":"VCID-2n9p-6t7s-kqc5"},{"vulnerability":"VCID-2uap-2vm1-efcr"},{"vulnerability":"VCID-32w3-vmcb-wfd9"},{"vulnerability":"VCID-34gr-dtsz-1fab"},{"vulnerability":"VCID-34ng-ftbx-e3cm"},{"vulnerability":"VCID-39t8-p1q7-eyag"},{"vulnerability":"VCID-3d53-4qtr-myhm"},{"vulnerability":"VCID-3pxf-xndw-5fft"},{"vulnerability":"VCID-3whm-8fyv-zyhd"},{"vulnerability":"VCID-416b-93m6-jyby"},{"vulnerability":"VCID-42ma-8ash-j7c8"},{"vulnerability":"VCID-4429-qf2w-jqg3"},{"vulnerability":"VCID-4spa-usqt-93b2"},{"vulnerability":"VCID-5cw7-rv5f-jfaq"},{"vulnerability":"VCID-5dbd-kz24-6fc1"},{"vulnerability":"VCID-6kh6-edk7-xkcc"},{"vulnerability":"VCID-6xbp-t4qh-tbhv"},{"vulnerability":"VCID-77st-3475-5kdr"},{"vulnerability":"VCID-7d5b-66n7-zbe1"},{"vulnerability":"VCID-7ek3-weqx-9fhs"},{"vulnerability":"VCID-7etc-u5ya-zued"},{"vulnerability":"VCID-7t5h-jy8h-t3d4"},{"vulnerability":"VCID-7wyt-uh2c-a3ha"},{"vulnerability":"VCID-7ysh-usku-c3dz"},{"vulnerability":"VCID-7zpj-3par-s3b5"},{"vulnerability":"VCID-87tq-2me2-d3bb"},{"vulnerability":"VCID-8cb8-vq2c-q3e9"},{"vulnerability":"VCID-8r8y-8bq2-jufj"},{"vulnerability":"VCID-91hk-73kq-83g6"},{"vulnerability":"VCID-9hr5-p18q-7qb8"},{"vulnerability":"VCID-9s43-gewn-bycc"},{"vulnerability":"VCID-9zqd-3x84-43gc"},{"vulnerability":"VCID-az8d-xrb4-3ug4"},{"vulnerability":"VCID-b7tb-ns1t-fyaw"},{"vulnerability":"VCID-bc6f-wu8g-5yb4"},{"vulnerability":"VCID-bs56-1z79-uqbt"},{"vulnerability":"VCID-bxae-85uh-uyek"},{"vulnerability":"VCID-bxb7-7gpw-qybb"},{"vulnerability":"VCID-bzve-5gwu-8ydb"},{"vulnerability":"VCID-csy7-esn4-u3gq"},{"vulnerability":"VCID-d3ad-6tme-bfem"},{"vulnerability":"VCID-dfjm-gwzm-jqbt"},{"vulnerability":"VCID-dgm4-ye4m-1fcq"},{"vulnerability":"VCID-dj1v-h79p-9ydz"},{"vulnerability":"VCID-dqy9-zkvw-e3gk"},{"vulnerability":"VCID-drhd-ytb7-u3em"},{"vulnerability":"VCID-e96u-uwba-kfg5"},{"vulnerability":"VCID-eb8v-p31a-yuhu"},{"vulnerability":"VCID-eka3-u8e5-3uad"},{"vulnerability":"VCID-ep7n-um5m-ekgk"},{"vulnerability":"VCID-fekb-fbhz-y7g7"},{"vulnerability":"VCID-fhbs-3nvf-tbha"},{"vulnerability":"VCID-fqt9-2esb-ffan"},{"vulnerability":"VCID-g72t-7kx1-abcs"},{"vulnerability":"VCID-gdsj-4cbx-ufep"},{"vulnerability":"VCID-gj1u-mbaj-kyc5"},{"vulnerability":"VCID-h9c6-yw5r-v3ex"},{"vulnerability":"VCID-hg4z-ad3f-fbc2"},{"vulnerability":"VCID-hsau-swt9-kyf7"},{"vulnerability":"VCID-hx7j-eymk-4ygk"},{"vulnerability":"VCID-hyup-47wa-pfac"},{"vulnerability":"VCID-jwdv-qe4x-yfgw"},{"vulnerability":"VCID-k5j4-3xmv-a7bk"},{"vulnerability":"VCID-kcj6-ua4t-ybgj"},{"vulnerability":"VCID-knqd-zktw-cydm"},{"vulnerability":"VCID-mcs2-ndqd-tydv"},{"vulnerability":"VCID-mf8g-nbkw-f7gr"},{"vulnerability":"VCID-n3t2-m6br-ufb3"},{"vulnerability":"VCID-n7pg-b7kc-wkew"},{"vulnerability":"VCID-ndz3-372h-8fhk"},{"vulnerability":"VCID-p3uc-18e9-skb4"},{"vulnerability":"VCID-p7ug-wwk5-63gb"},{"vulnerability":"VCID-pb8n-hmsc-syfw"},{"vulnerability":"VCID-pphm-ygb7-q7g2"},{"vulnerability":"VCID-pzt3-abab-4kdd"},{"vulnerability":"VCID-qnew-xqte-kbej"},{"vulnerability":"VCID-qprv-989b-k3d3"},{"vulnerability":"VCID-s4nf-p69f-pue8"},{"vulnerability":"VCID-td6e-x2qb-syg3"},{"vulnerability":"VCID-uunr-69dt-q7fn"},{"vulnerability":"VCID-uvcp-ad38-2kcs"},{"vulnerability":"VCID-vb2u-yc2z-ayh5"},{"vulnerability":"VCID-vs9k-akwv-h3ak"},{"vulnerability":"VCID-w2ch-guy5-6ye9"},{"vulnerability":"VCID-wh75-sc4f-qqc1"},{"vulnerability":"VCID-xcvw-eex8-j3bf"},{"vulnerability":"VCID-xe4j-gg7f-wyfa"},{"vulnerability":"VCID-z3g4-1vhq-97dj"},{"vulnerability":"VCID-z3qj-cnxq-pkgq"},{"vulnerability":"VCID-z8zf-cqkb-guge"},{"vulnerability":"VCID-zkyv-h5at-xkgq"},{"vulnerability":"VCID-zrxf-3w1d-t3ba"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.4%252B107-gef32c7afa2-1"},{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2020-25597","XSA-338"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-eb8v-p31a-yuhu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4242?format=json","vulnerability_id":"VCID-eka3-u8e5-3uad","summary":"undue deferral of IOMMU TLB flushes","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27671.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27671.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-27671","reference_id":"","reference_type":"","scores":[{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21789","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21954","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.22007","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21772","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21849","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21905","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21916","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21876","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21819","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21821","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21828","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21791","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21643","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21638","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21627","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-27671"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27670","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27670"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27671","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27671"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27672","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27672"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27674","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27674"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28368","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28368"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1891091","reference_id":"1891091","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1891091"},{"reference_url":"https://security.gentoo.org/glsa/202011-06","reference_id":"GLSA-202011-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202011-06"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-346.html","reference_id":"XSA-346","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-346.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037808?format=json","purl":"pkg:deb/debian/xen@4.11.4%2B107-gef32c7afa2-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1wgc-r96w-7kg9"},{"vulnerability":"VCID-1wtd-67ef-1qej"},{"vulnerability":"VCID-1x3w-n7ms-eqeh"},{"vulnerability":"VCID-28t2-hng7-tfe5"},{"vulnerability":"VCID-2n9p-6t7s-kqc5"},{"vulnerability":"VCID-2uap-2vm1-efcr"},{"vulnerability":"VCID-32w3-vmcb-wfd9"},{"vulnerability":"VCID-34gr-dtsz-1fab"},{"vulnerability":"VCID-34ng-ftbx-e3cm"},{"vulnerability":"VCID-39t8-p1q7-eyag"},{"vulnerability":"VCID-3d53-4qtr-myhm"},{"vulnerability":"VCID-3pxf-xndw-5fft"},{"vulnerability":"VCID-3whm-8fyv-zyhd"},{"vulnerability":"VCID-416b-93m6-jyby"},{"vulnerability":"VCID-42ma-8ash-j7c8"},{"vulnerability":"VCID-4429-qf2w-jqg3"},{"vulnerability":"VCID-4spa-usqt-93b2"},{"vulnerability":"VCID-5cw7-rv5f-jfaq"},{"vulnerability":"VCID-5dbd-kz24-6fc1"},{"vulnerability":"VCID-6kh6-edk7-xkcc"},{"vulnerability":"VCID-6xbp-t4qh-tbhv"},{"vulnerability":"VCID-77st-3475-5kdr"},{"vulnerability":"VCID-7d5b-66n7-zbe1"},{"vulnerability":"VCID-7ek3-weqx-9fhs"},{"vulnerability":"VCID-7etc-u5ya-zued"},{"vulnerability":"VCID-7t5h-jy8h-t3d4"},{"vulnerability":"VCID-7wyt-uh2c-a3ha"},{"vulnerability":"VCID-7ysh-usku-c3dz"},{"vulnerability":"VCID-7zpj-3par-s3b5"},{"vulnerability":"VCID-87tq-2me2-d3bb"},{"vulnerability":"VCID-8cb8-vq2c-q3e9"},{"vulnerability":"VCID-8r8y-8bq2-jufj"},{"vulnerability":"VCID-91hk-73kq-83g6"},{"vulnerability":"VCID-9hr5-p18q-7qb8"},{"vulnerability":"VCID-9s43-gewn-bycc"},{"vulnerability":"VCID-9zqd-3x84-43gc"},{"vulnerability":"VCID-az8d-xrb4-3ug4"},{"vulnerability":"VCID-b7tb-ns1t-fyaw"},{"vulnerability":"VCID-bc6f-wu8g-5yb4"},{"vulnerability":"VCID-bs56-1z79-uqbt"},{"vulnerability":"VCID-bxae-85uh-uyek"},{"vulnerability":"VCID-bxb7-7gpw-qybb"},{"vulnerability":"VCID-bzve-5gwu-8ydb"},{"vulnerability":"VCID-csy7-esn4-u3gq"},{"vulnerability":"VCID-d3ad-6tme-bfem"},{"vulnerability":"VCID-dfjm-gwzm-jqbt"},{"vulnerability":"VCID-dgm4-ye4m-1fcq"},{"vulnerability":"VCID-dj1v-h79p-9ydz"},{"vulnerability":"VCID-dqy9-zkvw-e3gk"},{"vulnerability":"VCID-drhd-ytb7-u3em"},{"vulnerability":"VCID-e96u-uwba-kfg5"},{"vulnerability":"VCID-eb8v-p31a-yuhu"},{"vulnerability":"VCID-eka3-u8e5-3uad"},{"vulnerability":"VCID-ep7n-um5m-ekgk"},{"vulnerability":"VCID-fekb-fbhz-y7g7"},{"vulnerability":"VCID-fhbs-3nvf-tbha"},{"vulnerability":"VCID-fqt9-2esb-ffan"},{"vulnerability":"VCID-g72t-7kx1-abcs"},{"vulnerability":"VCID-gdsj-4cbx-ufep"},{"vulnerability":"VCID-gj1u-mbaj-kyc5"},{"vulnerability":"VCID-h9c6-yw5r-v3ex"},{"vulnerability":"VCID-hg4z-ad3f-fbc2"},{"vulnerability":"VCID-hsau-swt9-kyf7"},{"vulnerability":"VCID-hx7j-eymk-4ygk"},{"vulnerability":"VCID-hyup-47wa-pfac"},{"vulnerability":"VCID-jwdv-qe4x-yfgw"},{"vulnerability":"VCID-k5j4-3xmv-a7bk"},{"vulnerability":"VCID-kcj6-ua4t-ybgj"},{"vulnerability":"VCID-knqd-zktw-cydm"},{"vulnerability":"VCID-mcs2-ndqd-tydv"},{"vulnerability":"VCID-mf8g-nbkw-f7gr"},{"vulnerability":"VCID-n3t2-m6br-ufb3"},{"vulnerability":"VCID-n7pg-b7kc-wkew"},{"vulnerability":"VCID-ndz3-372h-8fhk"},{"vulnerability":"VCID-p3uc-18e9-skb4"},{"vulnerability":"VCID-p7ug-wwk5-63gb"},{"vulnerability":"VCID-pb8n-hmsc-syfw"},{"vulnerability":"VCID-pphm-ygb7-q7g2"},{"vulnerability":"VCID-pzt3-abab-4kdd"},{"vulnerability":"VCID-qnew-xqte-kbej"},{"vulnerability":"VCID-qprv-989b-k3d3"},{"vulnerability":"VCID-s4nf-p69f-pue8"},{"vulnerability":"VCID-td6e-x2qb-syg3"},{"vulnerability":"VCID-uunr-69dt-q7fn"},{"vulnerability":"VCID-uvcp-ad38-2kcs"},{"vulnerability":"VCID-vb2u-yc2z-ayh5"},{"vulnerability":"VCID-vs9k-akwv-h3ak"},{"vulnerability":"VCID-w2ch-guy5-6ye9"},{"vulnerability":"VCID-wh75-sc4f-qqc1"},{"vulnerability":"VCID-xcvw-eex8-j3bf"},{"vulnerability":"VCID-xe4j-gg7f-wyfa"},{"vulnerability":"VCID-z3g4-1vhq-97dj"},{"vulnerability":"VCID-z3qj-cnxq-pkgq"},{"vulnerability":"VCID-z8zf-cqkb-guge"},{"vulnerability":"VCID-zkyv-h5at-xkgq"},{"vulnerability":"VCID-zrxf-3w1d-t3ba"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.4%252B107-gef32c7afa2-1"},{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2020-27671","XSA-346"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-eka3-u8e5-3uad"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4234?format=json","vulnerability_id":"VCID-ep7n-um5m-ekgk","summary":"PCI passthrough code reading back hardware registers","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25595.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25595.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-25595","reference_id":"","reference_type":"","scores":[{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25165","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25245","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25284","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25056","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25126","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25171","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25184","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25141","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25089","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.251","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25091","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25062","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25002","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.24992","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.24947","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-25595"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25595","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25595"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25596","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25596"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25602","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25602"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25603","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25603"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25604","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25604"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1877369","reference_id":"1877369","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1877369"},{"reference_url":"https://security.gentoo.org/glsa/202011-06","reference_id":"GLSA-202011-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202011-06"},{"reference_url":"https://usn.ubuntu.com/5617-1/","reference_id":"USN-5617-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5617-1/"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-337.html","reference_id":"XSA-337","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-337.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037808?format=json","purl":"pkg:deb/debian/xen@4.11.4%2B107-gef32c7afa2-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1wgc-r96w-7kg9"},{"vulnerability":"VCID-1wtd-67ef-1qej"},{"vulnerability":"VCID-1x3w-n7ms-eqeh"},{"vulnerability":"VCID-28t2-hng7-tfe5"},{"vulnerability":"VCID-2n9p-6t7s-kqc5"},{"vulnerability":"VCID-2uap-2vm1-efcr"},{"vulnerability":"VCID-32w3-vmcb-wfd9"},{"vulnerability":"VCID-34gr-dtsz-1fab"},{"vulnerability":"VCID-34ng-ftbx-e3cm"},{"vulnerability":"VCID-39t8-p1q7-eyag"},{"vulnerability":"VCID-3d53-4qtr-myhm"},{"vulnerability":"VCID-3pxf-xndw-5fft"},{"vulnerability":"VCID-3whm-8fyv-zyhd"},{"vulnerability":"VCID-416b-93m6-jyby"},{"vulnerability":"VCID-42ma-8ash-j7c8"},{"vulnerability":"VCID-4429-qf2w-jqg3"},{"vulnerability":"VCID-4spa-usqt-93b2"},{"vulnerability":"VCID-5cw7-rv5f-jfaq"},{"vulnerability":"VCID-5dbd-kz24-6fc1"},{"vulnerability":"VCID-6kh6-edk7-xkcc"},{"vulnerability":"VCID-6xbp-t4qh-tbhv"},{"vulnerability":"VCID-77st-3475-5kdr"},{"vulnerability":"VCID-7d5b-66n7-zbe1"},{"vulnerability":"VCID-7ek3-weqx-9fhs"},{"vulnerability":"VCID-7etc-u5ya-zued"},{"vulnerability":"VCID-7t5h-jy8h-t3d4"},{"vulnerability":"VCID-7wyt-uh2c-a3ha"},{"vulnerability":"VCID-7ysh-usku-c3dz"},{"vulnerability":"VCID-7zpj-3par-s3b5"},{"vulnerability":"VCID-87tq-2me2-d3bb"},{"vulnerability":"VCID-8cb8-vq2c-q3e9"},{"vulnerability":"VCID-8r8y-8bq2-jufj"},{"vulnerability":"VCID-91hk-73kq-83g6"},{"vulnerability":"VCID-9hr5-p18q-7qb8"},{"vulnerability":"VCID-9s43-gewn-bycc"},{"vulnerability":"VCID-9zqd-3x84-43gc"},{"vulnerability":"VCID-az8d-xrb4-3ug4"},{"vulnerability":"VCID-b7tb-ns1t-fyaw"},{"vulnerability":"VCID-bc6f-wu8g-5yb4"},{"vulnerability":"VCID-bs56-1z79-uqbt"},{"vulnerability":"VCID-bxae-85uh-uyek"},{"vulnerability":"VCID-bxb7-7gpw-qybb"},{"vulnerability":"VCID-bzve-5gwu-8ydb"},{"vulnerability":"VCID-csy7-esn4-u3gq"},{"vulnerability":"VCID-d3ad-6tme-bfem"},{"vulnerability":"VCID-dfjm-gwzm-jqbt"},{"vulnerability":"VCID-dgm4-ye4m-1fcq"},{"vulnerability":"VCID-dj1v-h79p-9ydz"},{"vulnerability":"VCID-dqy9-zkvw-e3gk"},{"vulnerability":"VCID-drhd-ytb7-u3em"},{"vulnerability":"VCID-e96u-uwba-kfg5"},{"vulnerability":"VCID-eb8v-p31a-yuhu"},{"vulnerability":"VCID-eka3-u8e5-3uad"},{"vulnerability":"VCID-ep7n-um5m-ekgk"},{"vulnerability":"VCID-fekb-fbhz-y7g7"},{"vulnerability":"VCID-fhbs-3nvf-tbha"},{"vulnerability":"VCID-fqt9-2esb-ffan"},{"vulnerability":"VCID-g72t-7kx1-abcs"},{"vulnerability":"VCID-gdsj-4cbx-ufep"},{"vulnerability":"VCID-gj1u-mbaj-kyc5"},{"vulnerability":"VCID-h9c6-yw5r-v3ex"},{"vulnerability":"VCID-hg4z-ad3f-fbc2"},{"vulnerability":"VCID-hsau-swt9-kyf7"},{"vulnerability":"VCID-hx7j-eymk-4ygk"},{"vulnerability":"VCID-hyup-47wa-pfac"},{"vulnerability":"VCID-jwdv-qe4x-yfgw"},{"vulnerability":"VCID-k5j4-3xmv-a7bk"},{"vulnerability":"VCID-kcj6-ua4t-ybgj"},{"vulnerability":"VCID-knqd-zktw-cydm"},{"vulnerability":"VCID-mcs2-ndqd-tydv"},{"vulnerability":"VCID-mf8g-nbkw-f7gr"},{"vulnerability":"VCID-n3t2-m6br-ufb3"},{"vulnerability":"VCID-n7pg-b7kc-wkew"},{"vulnerability":"VCID-ndz3-372h-8fhk"},{"vulnerability":"VCID-p3uc-18e9-skb4"},{"vulnerability":"VCID-p7ug-wwk5-63gb"},{"vulnerability":"VCID-pb8n-hmsc-syfw"},{"vulnerability":"VCID-pphm-ygb7-q7g2"},{"vulnerability":"VCID-pzt3-abab-4kdd"},{"vulnerability":"VCID-qnew-xqte-kbej"},{"vulnerability":"VCID-qprv-989b-k3d3"},{"vulnerability":"VCID-s4nf-p69f-pue8"},{"vulnerability":"VCID-td6e-x2qb-syg3"},{"vulnerability":"VCID-uunr-69dt-q7fn"},{"vulnerability":"VCID-uvcp-ad38-2kcs"},{"vulnerability":"VCID-vb2u-yc2z-ayh5"},{"vulnerability":"VCID-vs9k-akwv-h3ak"},{"vulnerability":"VCID-w2ch-guy5-6ye9"},{"vulnerability":"VCID-wh75-sc4f-qqc1"},{"vulnerability":"VCID-xcvw-eex8-j3bf"},{"vulnerability":"VCID-xe4j-gg7f-wyfa"},{"vulnerability":"VCID-z3g4-1vhq-97dj"},{"vulnerability":"VCID-z3qj-cnxq-pkgq"},{"vulnerability":"VCID-z8zf-cqkb-guge"},{"vulnerability":"VCID-zkyv-h5at-xkgq"},{"vulnerability":"VCID-zrxf-3w1d-t3ba"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.4%252B107-gef32c7afa2-1"},{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2020-25595","XSA-337"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ep7n-um5m-ekgk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4284?format=json","vulnerability_id":"VCID-fekb-fbhz-y7g7","summary":"PoD operations on misaligned GFNs","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-28704","reference_id":"","reference_type":"","scores":[{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24599","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24807","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24885","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24925","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.247","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24767","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24813","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24827","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24787","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.2473","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24745","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24737","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24714","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24654","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24643","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-28704"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28702","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28702"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28704","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28704"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28705","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28705"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28706","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28706"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28707","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28707"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28708","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28708"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28709","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28709"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.gentoo.org/glsa/202402-07","reference_id":"GLSA-202402-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-07"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-388.html","reference_id":"XSA-388","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-388.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2021-28704","XSA-388"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fekb-fbhz-y7g7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4327?format=json","vulnerability_id":"VCID-fhbs-3nvf-tbha","summary":"Arm: unbounded memory consumption for 2nd-level page tables","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-33747","reference_id":"","reference_type":"","scores":[{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08339","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08391","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08312","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08376","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08392","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08384","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08365","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08349","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08242","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08227","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08388","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.0836","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08325","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08291","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-33747"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021668","reference_id":"1021668","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021668"},{"reference_url":"https://security.gentoo.org/glsa/202402-07","reference_id":"GLSA-202402-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-07"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-409.html","reference_id":"XSA-409","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-409.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2022-33747","XSA-409"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fhbs-3nvf-tbha"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4282?format=json","vulnerability_id":"VCID-fqt9-2esb-ffan","summary":"PCI devices with RMRRs not deassigned correctly","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-28702","reference_id":"","reference_type":"","scores":[{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16571","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16789","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.1673","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16666","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16674","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16711","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16617","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16606","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16834","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22371","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22541","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22583","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22374","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22453","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22508","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-28702"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28702","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28702"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28704","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28704"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28705","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28705"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28706","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28706"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28707","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28707"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28708","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28708"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28709","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28709"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.gentoo.org/glsa/202208-23","reference_id":"GLSA-202208-23","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-23"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-386.html","reference_id":"XSA-386","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-386.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2021-28702","XSA-386"],"risk_score":1.7,"exploitability":"0.5","weighted_severity":"3.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fqt9-2esb-ffan"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4279?format=json","vulnerability_id":"VCID-g72t-7kx1-abcs","summary":"xen/arm: No memory limit for dom0less domUs","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-28700","reference_id":"","reference_type":"","scores":[{"value":"0.02126","scoring_system":"epss","scoring_elements":"0.84224","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02126","scoring_system":"epss","scoring_elements":"0.8409","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02126","scoring_system":"epss","scoring_elements":"0.84103","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02126","scoring_system":"epss","scoring_elements":"0.84121","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02126","scoring_system":"epss","scoring_elements":"0.84122","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02126","scoring_system":"epss","scoring_elements":"0.84145","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02126","scoring_system":"epss","scoring_elements":"0.84151","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02126","scoring_system":"epss","scoring_elements":"0.84168","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02126","scoring_system":"epss","scoring_elements":"0.84163","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02126","scoring_system":"epss","scoring_elements":"0.84158","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02126","scoring_system":"epss","scoring_elements":"0.84181","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02126","scoring_system":"epss","scoring_elements":"0.84182","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02126","scoring_system":"epss","scoring_elements":"0.84186","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02126","scoring_system":"epss","scoring_elements":"0.84211","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02126","scoring_system":"epss","scoring_elements":"0.84219","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-28700"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28694","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28694"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28695","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28695"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28696","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28696"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28697","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28697"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28698","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28698"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28699","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28699"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28700","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28700"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28701","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28701"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.gentoo.org/glsa/202208-23","reference_id":"GLSA-202208-23","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-23"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-383.html","reference_id":"XSA-383","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-383.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2021-28700","XSA-383"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-g72t-7kx1-abcs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4287?format=json","vulnerability_id":"VCID-gdsj-4cbx-ufep","summary":"issues with partially successful P2M updates on x86","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-28705","reference_id":"","reference_type":"","scores":[{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.29762","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30158","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30195","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30243","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30063","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30122","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30161","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30119","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30069","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30082","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.3006","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30014","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.29944","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.29828","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-28705"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28702","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28702"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28704","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28704"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28705","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28705"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28706","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28706"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28707","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28707"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28708","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28708"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28709","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28709"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.gentoo.org/glsa/202402-07","reference_id":"GLSA-202402-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-07"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-389.html","reference_id":"XSA-389","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-389.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2021-28705"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gdsj-4cbx-ufep"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4333?format=json","vulnerability_id":"VCID-gj1u-mbaj-kyc5","summary":"Xenstore: Guests can create orphaned Xenstore nodes","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42310","reference_id":"","reference_type":"","scores":[{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06106","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06008","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06043","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06028","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06067","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07039","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07124","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07114","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07103","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07023","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07487","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07566","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07528","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07518","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.gentoo.org/glsa/202402-07","reference_id":"GLSA-202402-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-07"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-415.html","reference_id":"XSA-415","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-415.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2022-42310","XSA-415"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gj1u-mbaj-kyc5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4252?format=json","vulnerability_id":"VCID-h9c6-yw5r-v3ex","summary":"infinite loop when cleaning up IRQ vectors","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-29567","reference_id":"","reference_type":"","scores":[{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17018","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17159","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17324","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17373","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17152","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17243","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17301","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17315","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17265","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17206","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17145","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17151","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17186","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17091","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17074","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-29567"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29567","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29567"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.gentoo.org/glsa/202107-30","reference_id":"GLSA-202107-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-30"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-356.html","reference_id":"XSA-356","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-356.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2020-29567","XSA-356"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-h9c6-yw5r-v3ex"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4313?format=json","vulnerability_id":"VCID-hg4z-ad3f-fbc2","summary":"x86 pv: Insufficient care with non-coherent mappings","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26364","reference_id":"","reference_type":"","scores":[{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.28752","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29219","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29272","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29086","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29149","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29191","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29197","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29151","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29099","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29125","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29101","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29054","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.28936","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.28823","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26364"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014414","reference_id":"1014414","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014414"},{"reference_url":"https://security.gentoo.org/glsa/202208-23","reference_id":"GLSA-202208-23","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-23"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-402.html","reference_id":"XSA-402","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-402.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2022-26364","XSA-402"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hg4z-ad3f-fbc2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4334?format=json","vulnerability_id":"VCID-hsau-swt9-kyf7","summary":"Xenstore: Guests can cause Xenstore to not free temporary memory","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42319","reference_id":"","reference_type":"","scores":[{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06792","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06679","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06724","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06708","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06759","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07834","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07948","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07931","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07918","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07818","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08324","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08423","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08393","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08359","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42319"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.gentoo.org/glsa/202402-07","reference_id":"GLSA-202402-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-07"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-416.html","reference_id":"XSA-416","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-416.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2022-42319","XSA-416"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hsau-swt9-kyf7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4308?format=json","vulnerability_id":"VCID-hx7j-eymk-4ygk","summary":"IOMMU: RMRR (VT-d) and unity map (AMD-Vi) handling issues","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26359","reference_id":"","reference_type":"","scores":[{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31052","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31574","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31618","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31437","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.3149","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31519","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31523","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31481","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31444","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31479","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31457","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31426","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31257","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31132","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26359"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23033","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23033"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23034","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23034"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23035","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23035"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26356","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26356"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26357","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26357"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26358","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26358"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26359","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26359"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26360","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26360"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26361","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26361"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.gentoo.org/glsa/202402-07","reference_id":"GLSA-202402-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-07"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-400.html","reference_id":"XSA-400","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-400.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2022-26359"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hx7j-eymk-4ygk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4272?format=json","vulnerability_id":"VCID-hyup-47wa-pfac","summary":"x86: TSX Async Abort protections not restored after S3","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-28690","reference_id":"","reference_type":"","scores":[{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57967","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57887","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57971","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.5799","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57966","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.58022","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.58024","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.58041","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.58019","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57999","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.58029","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.58028","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.58005","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57968","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57984","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-28690"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0089","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0089"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26313","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26313"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28690","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28690"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28692","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28692"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.gentoo.org/glsa/202107-30","reference_id":"GLSA-202107-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-30"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-377.html","reference_id":"XSA-377","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-377.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037808?format=json","purl":"pkg:deb/debian/xen@4.11.4%2B107-gef32c7afa2-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1wgc-r96w-7kg9"},{"vulnerability":"VCID-1wtd-67ef-1qej"},{"vulnerability":"VCID-1x3w-n7ms-eqeh"},{"vulnerability":"VCID-28t2-hng7-tfe5"},{"vulnerability":"VCID-2n9p-6t7s-kqc5"},{"vulnerability":"VCID-2uap-2vm1-efcr"},{"vulnerability":"VCID-32w3-vmcb-wfd9"},{"vulnerability":"VCID-34gr-dtsz-1fab"},{"vulnerability":"VCID-34ng-ftbx-e3cm"},{"vulnerability":"VCID-39t8-p1q7-eyag"},{"vulnerability":"VCID-3d53-4qtr-myhm"},{"vulnerability":"VCID-3pxf-xndw-5fft"},{"vulnerability":"VCID-3whm-8fyv-zyhd"},{"vulnerability":"VCID-416b-93m6-jyby"},{"vulnerability":"VCID-42ma-8ash-j7c8"},{"vulnerability":"VCID-4429-qf2w-jqg3"},{"vulnerability":"VCID-4spa-usqt-93b2"},{"vulnerability":"VCID-5cw7-rv5f-jfaq"},{"vulnerability":"VCID-5dbd-kz24-6fc1"},{"vulnerability":"VCID-6kh6-edk7-xkcc"},{"vulnerability":"VCID-6xbp-t4qh-tbhv"},{"vulnerability":"VCID-77st-3475-5kdr"},{"vulnerability":"VCID-7d5b-66n7-zbe1"},{"vulnerability":"VCID-7ek3-weqx-9fhs"},{"vulnerability":"VCID-7etc-u5ya-zued"},{"vulnerability":"VCID-7t5h-jy8h-t3d4"},{"vulnerability":"VCID-7wyt-uh2c-a3ha"},{"vulnerability":"VCID-7ysh-usku-c3dz"},{"vulnerability":"VCID-7zpj-3par-s3b5"},{"vulnerability":"VCID-87tq-2me2-d3bb"},{"vulnerability":"VCID-8cb8-vq2c-q3e9"},{"vulnerability":"VCID-8r8y-8bq2-jufj"},{"vulnerability":"VCID-91hk-73kq-83g6"},{"vulnerability":"VCID-9hr5-p18q-7qb8"},{"vulnerability":"VCID-9s43-gewn-bycc"},{"vulnerability":"VCID-9zqd-3x84-43gc"},{"vulnerability":"VCID-az8d-xrb4-3ug4"},{"vulnerability":"VCID-b7tb-ns1t-fyaw"},{"vulnerability":"VCID-bc6f-wu8g-5yb4"},{"vulnerability":"VCID-bs56-1z79-uqbt"},{"vulnerability":"VCID-bxae-85uh-uyek"},{"vulnerability":"VCID-bxb7-7gpw-qybb"},{"vulnerability":"VCID-bzve-5gwu-8ydb"},{"vulnerability":"VCID-csy7-esn4-u3gq"},{"vulnerability":"VCID-d3ad-6tme-bfem"},{"vulnerability":"VCID-dfjm-gwzm-jqbt"},{"vulnerability":"VCID-dgm4-ye4m-1fcq"},{"vulnerability":"VCID-dj1v-h79p-9ydz"},{"vulnerability":"VCID-dqy9-zkvw-e3gk"},{"vulnerability":"VCID-drhd-ytb7-u3em"},{"vulnerability":"VCID-e96u-uwba-kfg5"},{"vulnerability":"VCID-eb8v-p31a-yuhu"},{"vulnerability":"VCID-eka3-u8e5-3uad"},{"vulnerability":"VCID-ep7n-um5m-ekgk"},{"vulnerability":"VCID-fekb-fbhz-y7g7"},{"vulnerability":"VCID-fhbs-3nvf-tbha"},{"vulnerability":"VCID-fqt9-2esb-ffan"},{"vulnerability":"VCID-g72t-7kx1-abcs"},{"vulnerability":"VCID-gdsj-4cbx-ufep"},{"vulnerability":"VCID-gj1u-mbaj-kyc5"},{"vulnerability":"VCID-h9c6-yw5r-v3ex"},{"vulnerability":"VCID-hg4z-ad3f-fbc2"},{"vulnerability":"VCID-hsau-swt9-kyf7"},{"vulnerability":"VCID-hx7j-eymk-4ygk"},{"vulnerability":"VCID-hyup-47wa-pfac"},{"vulnerability":"VCID-jwdv-qe4x-yfgw"},{"vulnerability":"VCID-k5j4-3xmv-a7bk"},{"vulnerability":"VCID-kcj6-ua4t-ybgj"},{"vulnerability":"VCID-knqd-zktw-cydm"},{"vulnerability":"VCID-mcs2-ndqd-tydv"},{"vulnerability":"VCID-mf8g-nbkw-f7gr"},{"vulnerability":"VCID-n3t2-m6br-ufb3"},{"vulnerability":"VCID-n7pg-b7kc-wkew"},{"vulnerability":"VCID-ndz3-372h-8fhk"},{"vulnerability":"VCID-p3uc-18e9-skb4"},{"vulnerability":"VCID-p7ug-wwk5-63gb"},{"vulnerability":"VCID-pb8n-hmsc-syfw"},{"vulnerability":"VCID-pphm-ygb7-q7g2"},{"vulnerability":"VCID-pzt3-abab-4kdd"},{"vulnerability":"VCID-qnew-xqte-kbej"},{"vulnerability":"VCID-qprv-989b-k3d3"},{"vulnerability":"VCID-s4nf-p69f-pue8"},{"vulnerability":"VCID-td6e-x2qb-syg3"},{"vulnerability":"VCID-uunr-69dt-q7fn"},{"vulnerability":"VCID-uvcp-ad38-2kcs"},{"vulnerability":"VCID-vb2u-yc2z-ayh5"},{"vulnerability":"VCID-vs9k-akwv-h3ak"},{"vulnerability":"VCID-w2ch-guy5-6ye9"},{"vulnerability":"VCID-wh75-sc4f-qqc1"},{"vulnerability":"VCID-xcvw-eex8-j3bf"},{"vulnerability":"VCID-xe4j-gg7f-wyfa"},{"vulnerability":"VCID-z3g4-1vhq-97dj"},{"vulnerability":"VCID-z3qj-cnxq-pkgq"},{"vulnerability":"VCID-z8zf-cqkb-guge"},{"vulnerability":"VCID-zkyv-h5at-xkgq"},{"vulnerability":"VCID-zrxf-3w1d-t3ba"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.4%252B107-gef32c7afa2-1"},{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2021-28690","XSA-377"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hyup-47wa-pfac"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4306?format=json","vulnerability_id":"VCID-jwdv-qe4x-yfgw","summary":"race in VT-d domain ID cleanup","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26357","reference_id":"","reference_type":"","scores":[{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05213","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05011","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05039","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05061","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05094","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05109","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05083","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05066","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05049","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04991","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04997","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05143","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.0517","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05211","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26357"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23033","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23033"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23034","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23034"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23035","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23035"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26356","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26356"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26357","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26357"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26358","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26358"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26359","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26359"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26360","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26360"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26361","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26361"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.gentoo.org/glsa/202402-07","reference_id":"GLSA-202402-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-07"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-399.html","reference_id":"XSA-399","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-399.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2022-26357","XSA-399"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jwdv-qe4x-yfgw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4244?format=json","vulnerability_id":"VCID-k5j4-3xmv-a7bk","summary":"undue recursion in x86 HVM context switch code","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-29566","reference_id":"","reference_type":"","scores":[{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21428","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21589","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21761","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21816","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21567","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21644","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21702","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21713","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21674","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21617","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21616","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21624","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21593","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21446","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.2144","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-29566"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29479","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29479"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29481","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29481"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29482","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29482"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29483","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29483"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29484","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29484"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29485","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29485"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29486","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29486"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29566","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29566"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29570","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29570"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29571","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29571"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.gentoo.org/glsa/202107-30","reference_id":"GLSA-202107-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-30"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-348.html","reference_id":"XSA-348","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-348.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037808?format=json","purl":"pkg:deb/debian/xen@4.11.4%2B107-gef32c7afa2-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1wgc-r96w-7kg9"},{"vulnerability":"VCID-1wtd-67ef-1qej"},{"vulnerability":"VCID-1x3w-n7ms-eqeh"},{"vulnerability":"VCID-28t2-hng7-tfe5"},{"vulnerability":"VCID-2n9p-6t7s-kqc5"},{"vulnerability":"VCID-2uap-2vm1-efcr"},{"vulnerability":"VCID-32w3-vmcb-wfd9"},{"vulnerability":"VCID-34gr-dtsz-1fab"},{"vulnerability":"VCID-34ng-ftbx-e3cm"},{"vulnerability":"VCID-39t8-p1q7-eyag"},{"vulnerability":"VCID-3d53-4qtr-myhm"},{"vulnerability":"VCID-3pxf-xndw-5fft"},{"vulnerability":"VCID-3whm-8fyv-zyhd"},{"vulnerability":"VCID-416b-93m6-jyby"},{"vulnerability":"VCID-42ma-8ash-j7c8"},{"vulnerability":"VCID-4429-qf2w-jqg3"},{"vulnerability":"VCID-4spa-usqt-93b2"},{"vulnerability":"VCID-5cw7-rv5f-jfaq"},{"vulnerability":"VCID-5dbd-kz24-6fc1"},{"vulnerability":"VCID-6kh6-edk7-xkcc"},{"vulnerability":"VCID-6xbp-t4qh-tbhv"},{"vulnerability":"VCID-77st-3475-5kdr"},{"vulnerability":"VCID-7d5b-66n7-zbe1"},{"vulnerability":"VCID-7ek3-weqx-9fhs"},{"vulnerability":"VCID-7etc-u5ya-zued"},{"vulnerability":"VCID-7t5h-jy8h-t3d4"},{"vulnerability":"VCID-7wyt-uh2c-a3ha"},{"vulnerability":"VCID-7ysh-usku-c3dz"},{"vulnerability":"VCID-7zpj-3par-s3b5"},{"vulnerability":"VCID-87tq-2me2-d3bb"},{"vulnerability":"VCID-8cb8-vq2c-q3e9"},{"vulnerability":"VCID-8r8y-8bq2-jufj"},{"vulnerability":"VCID-91hk-73kq-83g6"},{"vulnerability":"VCID-9hr5-p18q-7qb8"},{"vulnerability":"VCID-9s43-gewn-bycc"},{"vulnerability":"VCID-9zqd-3x84-43gc"},{"vulnerability":"VCID-az8d-xrb4-3ug4"},{"vulnerability":"VCID-b7tb-ns1t-fyaw"},{"vulnerability":"VCID-bc6f-wu8g-5yb4"},{"vulnerability":"VCID-bs56-1z79-uqbt"},{"vulnerability":"VCID-bxae-85uh-uyek"},{"vulnerability":"VCID-bxb7-7gpw-qybb"},{"vulnerability":"VCID-bzve-5gwu-8ydb"},{"vulnerability":"VCID-csy7-esn4-u3gq"},{"vulnerability":"VCID-d3ad-6tme-bfem"},{"vulnerability":"VCID-dfjm-gwzm-jqbt"},{"vulnerability":"VCID-dgm4-ye4m-1fcq"},{"vulnerability":"VCID-dj1v-h79p-9ydz"},{"vulnerability":"VCID-dqy9-zkvw-e3gk"},{"vulnerability":"VCID-drhd-ytb7-u3em"},{"vulnerability":"VCID-e96u-uwba-kfg5"},{"vulnerability":"VCID-eb8v-p31a-yuhu"},{"vulnerability":"VCID-eka3-u8e5-3uad"},{"vulnerability":"VCID-ep7n-um5m-ekgk"},{"vulnerability":"VCID-fekb-fbhz-y7g7"},{"vulnerability":"VCID-fhbs-3nvf-tbha"},{"vulnerability":"VCID-fqt9-2esb-ffan"},{"vulnerability":"VCID-g72t-7kx1-abcs"},{"vulnerability":"VCID-gdsj-4cbx-ufep"},{"vulnerability":"VCID-gj1u-mbaj-kyc5"},{"vulnerability":"VCID-h9c6-yw5r-v3ex"},{"vulnerability":"VCID-hg4z-ad3f-fbc2"},{"vulnerability":"VCID-hsau-swt9-kyf7"},{"vulnerability":"VCID-hx7j-eymk-4ygk"},{"vulnerability":"VCID-hyup-47wa-pfac"},{"vulnerability":"VCID-jwdv-qe4x-yfgw"},{"vulnerability":"VCID-k5j4-3xmv-a7bk"},{"vulnerability":"VCID-kcj6-ua4t-ybgj"},{"vulnerability":"VCID-knqd-zktw-cydm"},{"vulnerability":"VCID-mcs2-ndqd-tydv"},{"vulnerability":"VCID-mf8g-nbkw-f7gr"},{"vulnerability":"VCID-n3t2-m6br-ufb3"},{"vulnerability":"VCID-n7pg-b7kc-wkew"},{"vulnerability":"VCID-ndz3-372h-8fhk"},{"vulnerability":"VCID-p3uc-18e9-skb4"},{"vulnerability":"VCID-p7ug-wwk5-63gb"},{"vulnerability":"VCID-pb8n-hmsc-syfw"},{"vulnerability":"VCID-pphm-ygb7-q7g2"},{"vulnerability":"VCID-pzt3-abab-4kdd"},{"vulnerability":"VCID-qnew-xqte-kbej"},{"vulnerability":"VCID-qprv-989b-k3d3"},{"vulnerability":"VCID-s4nf-p69f-pue8"},{"vulnerability":"VCID-td6e-x2qb-syg3"},{"vulnerability":"VCID-uunr-69dt-q7fn"},{"vulnerability":"VCID-uvcp-ad38-2kcs"},{"vulnerability":"VCID-vb2u-yc2z-ayh5"},{"vulnerability":"VCID-vs9k-akwv-h3ak"},{"vulnerability":"VCID-w2ch-guy5-6ye9"},{"vulnerability":"VCID-wh75-sc4f-qqc1"},{"vulnerability":"VCID-xcvw-eex8-j3bf"},{"vulnerability":"VCID-xe4j-gg7f-wyfa"},{"vulnerability":"VCID-z3g4-1vhq-97dj"},{"vulnerability":"VCID-z3qj-cnxq-pkgq"},{"vulnerability":"VCID-z8zf-cqkb-guge"},{"vulnerability":"VCID-zkyv-h5at-xkgq"},{"vulnerability":"VCID-zrxf-3w1d-t3ba"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.4%252B107-gef32c7afa2-1"},{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2020-29566","XSA-348"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k5j4-3xmv-a7bk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4275?format=json","vulnerability_id":"VCID-kcj6-ua4t-ybgj","summary":"IOMMU page mapping issues on x86","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-28696","reference_id":"","reference_type":"","scores":[{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25731","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25974","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.26057","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.26099","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25866","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25936","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25988","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25998","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25954","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25894","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25897","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25879","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25848","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25785","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25777","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-28696"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28694","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28694"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28695","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28695"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28696","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28696"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28697","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28697"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28698","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28698"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28699","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28699"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28700","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28700"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28701","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28701"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.gentoo.org/glsa/202208-23","reference_id":"GLSA-202208-23","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-23"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-378.html","reference_id":"XSA-378","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-378.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2021-28696"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kcj6-ua4t-ybgj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4270?format=json","vulnerability_id":"VCID-knqd-zktw-cydm","summary":"Speculative Code Store Bypass","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-0089","reference_id":"","reference_type":"","scores":[{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.1765","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.1783","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17992","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.18046","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17746","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17834","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17896","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17912","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17867","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17818","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.1776","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.1777","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17808","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17717","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17694","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-0089"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0089","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0089"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26313","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26313"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28690","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28690"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28692","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28692"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.gentoo.org/glsa/202107-30","reference_id":"GLSA-202107-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-30"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-375.html","reference_id":"XSA-375","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-375.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037808?format=json","purl":"pkg:deb/debian/xen@4.11.4%2B107-gef32c7afa2-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1wgc-r96w-7kg9"},{"vulnerability":"VCID-1wtd-67ef-1qej"},{"vulnerability":"VCID-1x3w-n7ms-eqeh"},{"vulnerability":"VCID-28t2-hng7-tfe5"},{"vulnerability":"VCID-2n9p-6t7s-kqc5"},{"vulnerability":"VCID-2uap-2vm1-efcr"},{"vulnerability":"VCID-32w3-vmcb-wfd9"},{"vulnerability":"VCID-34gr-dtsz-1fab"},{"vulnerability":"VCID-34ng-ftbx-e3cm"},{"vulnerability":"VCID-39t8-p1q7-eyag"},{"vulnerability":"VCID-3d53-4qtr-myhm"},{"vulnerability":"VCID-3pxf-xndw-5fft"},{"vulnerability":"VCID-3whm-8fyv-zyhd"},{"vulnerability":"VCID-416b-93m6-jyby"},{"vulnerability":"VCID-42ma-8ash-j7c8"},{"vulnerability":"VCID-4429-qf2w-jqg3"},{"vulnerability":"VCID-4spa-usqt-93b2"},{"vulnerability":"VCID-5cw7-rv5f-jfaq"},{"vulnerability":"VCID-5dbd-kz24-6fc1"},{"vulnerability":"VCID-6kh6-edk7-xkcc"},{"vulnerability":"VCID-6xbp-t4qh-tbhv"},{"vulnerability":"VCID-77st-3475-5kdr"},{"vulnerability":"VCID-7d5b-66n7-zbe1"},{"vulnerability":"VCID-7ek3-weqx-9fhs"},{"vulnerability":"VCID-7etc-u5ya-zued"},{"vulnerability":"VCID-7t5h-jy8h-t3d4"},{"vulnerability":"VCID-7wyt-uh2c-a3ha"},{"vulnerability":"VCID-7ysh-usku-c3dz"},{"vulnerability":"VCID-7zpj-3par-s3b5"},{"vulnerability":"VCID-87tq-2me2-d3bb"},{"vulnerability":"VCID-8cb8-vq2c-q3e9"},{"vulnerability":"VCID-8r8y-8bq2-jufj"},{"vulnerability":"VCID-91hk-73kq-83g6"},{"vulnerability":"VCID-9hr5-p18q-7qb8"},{"vulnerability":"VCID-9s43-gewn-bycc"},{"vulnerability":"VCID-9zqd-3x84-43gc"},{"vulnerability":"VCID-az8d-xrb4-3ug4"},{"vulnerability":"VCID-b7tb-ns1t-fyaw"},{"vulnerability":"VCID-bc6f-wu8g-5yb4"},{"vulnerability":"VCID-bs56-1z79-uqbt"},{"vulnerability":"VCID-bxae-85uh-uyek"},{"vulnerability":"VCID-bxb7-7gpw-qybb"},{"vulnerability":"VCID-bzve-5gwu-8ydb"},{"vulnerability":"VCID-csy7-esn4-u3gq"},{"vulnerability":"VCID-d3ad-6tme-bfem"},{"vulnerability":"VCID-dfjm-gwzm-jqbt"},{"vulnerability":"VCID-dgm4-ye4m-1fcq"},{"vulnerability":"VCID-dj1v-h79p-9ydz"},{"vulnerability":"VCID-dqy9-zkvw-e3gk"},{"vulnerability":"VCID-drhd-ytb7-u3em"},{"vulnerability":"VCID-e96u-uwba-kfg5"},{"vulnerability":"VCID-eb8v-p31a-yuhu"},{"vulnerability":"VCID-eka3-u8e5-3uad"},{"vulnerability":"VCID-ep7n-um5m-ekgk"},{"vulnerability":"VCID-fekb-fbhz-y7g7"},{"vulnerability":"VCID-fhbs-3nvf-tbha"},{"vulnerability":"VCID-fqt9-2esb-ffan"},{"vulnerability":"VCID-g72t-7kx1-abcs"},{"vulnerability":"VCID-gdsj-4cbx-ufep"},{"vulnerability":"VCID-gj1u-mbaj-kyc5"},{"vulnerability":"VCID-h9c6-yw5r-v3ex"},{"vulnerability":"VCID-hg4z-ad3f-fbc2"},{"vulnerability":"VCID-hsau-swt9-kyf7"},{"vulnerability":"VCID-hx7j-eymk-4ygk"},{"vulnerability":"VCID-hyup-47wa-pfac"},{"vulnerability":"VCID-jwdv-qe4x-yfgw"},{"vulnerability":"VCID-k5j4-3xmv-a7bk"},{"vulnerability":"VCID-kcj6-ua4t-ybgj"},{"vulnerability":"VCID-knqd-zktw-cydm"},{"vulnerability":"VCID-mcs2-ndqd-tydv"},{"vulnerability":"VCID-mf8g-nbkw-f7gr"},{"vulnerability":"VCID-n3t2-m6br-ufb3"},{"vulnerability":"VCID-n7pg-b7kc-wkew"},{"vulnerability":"VCID-ndz3-372h-8fhk"},{"vulnerability":"VCID-p3uc-18e9-skb4"},{"vulnerability":"VCID-p7ug-wwk5-63gb"},{"vulnerability":"VCID-pb8n-hmsc-syfw"},{"vulnerability":"VCID-pphm-ygb7-q7g2"},{"vulnerability":"VCID-pzt3-abab-4kdd"},{"vulnerability":"VCID-qnew-xqte-kbej"},{"vulnerability":"VCID-qprv-989b-k3d3"},{"vulnerability":"VCID-s4nf-p69f-pue8"},{"vulnerability":"VCID-td6e-x2qb-syg3"},{"vulnerability":"VCID-uunr-69dt-q7fn"},{"vulnerability":"VCID-uvcp-ad38-2kcs"},{"vulnerability":"VCID-vb2u-yc2z-ayh5"},{"vulnerability":"VCID-vs9k-akwv-h3ak"},{"vulnerability":"VCID-w2ch-guy5-6ye9"},{"vulnerability":"VCID-wh75-sc4f-qqc1"},{"vulnerability":"VCID-xcvw-eex8-j3bf"},{"vulnerability":"VCID-xe4j-gg7f-wyfa"},{"vulnerability":"VCID-z3g4-1vhq-97dj"},{"vulnerability":"VCID-z3qj-cnxq-pkgq"},{"vulnerability":"VCID-z8zf-cqkb-guge"},{"vulnerability":"VCID-zkyv-h5at-xkgq"},{"vulnerability":"VCID-zrxf-3w1d-t3ba"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.4%252B107-gef32c7afa2-1"},{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2021-0089","XSA-375"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-knqd-zktw-cydm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4351?format=json","vulnerability_id":"VCID-mcs2-ndqd-tydv","summary":"x86: speculative vulnerability in 32bit SYSCALL path","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42331","reference_id":"","reference_type":"","scores":[{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14308","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14119","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14247","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.1757","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17523","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17471","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17413","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17423","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17458","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17371","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17348","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17281","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17497","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17557","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42331"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23824","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23824"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42331","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42331"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42332","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42332"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42333","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42333"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42334","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42334"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033297","reference_id":"1033297","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033297"},{"reference_url":"https://security.gentoo.org/glsa/202402-07","reference_id":"GLSA-202402-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-07"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-429.html","reference_id":"XSA-429","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-429.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2022-42331","XSA-429"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mcs2-ndqd-tydv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4276?format=json","vulnerability_id":"VCID-mf8g-nbkw-f7gr","summary":"grant table v2 status pages may remain accessible after de-allocation","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-28697","reference_id":"","reference_type":"","scores":[{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18233","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18458","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18603","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18658","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18367","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18449","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18502","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18503","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18455","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18404","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18348","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.1836","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18386","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18286","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18272","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-28697"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28694","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28694"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28695","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28695"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28696","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28696"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28697","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28697"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28698","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28698"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28699","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28699"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28700","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28700"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28701","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28701"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.gentoo.org/glsa/202208-23","reference_id":"GLSA-202208-23","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-23"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-379.html","reference_id":"XSA-379","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-379.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2021-28697","XSA-379"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mf8g-nbkw-f7gr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4251?format=json","vulnerability_id":"VCID-n3t2-m6br-ufb3","summary":"stack corruption from XSA-346 change","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-29040.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-29040.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-29040","reference_id":"","reference_type":"","scores":[{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20135","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20282","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.2034","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20064","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20145","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20202","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20227","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20182","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20124","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20117","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20121","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20004","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.19999","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.19969","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-29040"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29040","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29040"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1902766","reference_id":"1902766","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1902766"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=976109","reference_id":"976109","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=976109"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-355.html","reference_id":"XSA-355","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-355.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2020-29040","XSA-355"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n3t2-m6br-ufb3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4268?format=json","vulnerability_id":"VCID-n7pg-b7kc-wkew","summary":"inappropriate x86 IOMMU timeout detection / handling","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-28692","reference_id":"","reference_type":"","scores":[{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10522","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10461","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10604","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10666","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.1053","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10603","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10662","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10675","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10643","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10619","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10484","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10502","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10627","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10576","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10575","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-28692"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0089","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0089"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26313","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26313"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28690","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28690"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28692","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28692"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.gentoo.org/glsa/202107-30","reference_id":"GLSA-202107-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-30"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-373.html","reference_id":"XSA-373","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-373.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037808?format=json","purl":"pkg:deb/debian/xen@4.11.4%2B107-gef32c7afa2-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1wgc-r96w-7kg9"},{"vulnerability":"VCID-1wtd-67ef-1qej"},{"vulnerability":"VCID-1x3w-n7ms-eqeh"},{"vulnerability":"VCID-28t2-hng7-tfe5"},{"vulnerability":"VCID-2n9p-6t7s-kqc5"},{"vulnerability":"VCID-2uap-2vm1-efcr"},{"vulnerability":"VCID-32w3-vmcb-wfd9"},{"vulnerability":"VCID-34gr-dtsz-1fab"},{"vulnerability":"VCID-34ng-ftbx-e3cm"},{"vulnerability":"VCID-39t8-p1q7-eyag"},{"vulnerability":"VCID-3d53-4qtr-myhm"},{"vulnerability":"VCID-3pxf-xndw-5fft"},{"vulnerability":"VCID-3whm-8fyv-zyhd"},{"vulnerability":"VCID-416b-93m6-jyby"},{"vulnerability":"VCID-42ma-8ash-j7c8"},{"vulnerability":"VCID-4429-qf2w-jqg3"},{"vulnerability":"VCID-4spa-usqt-93b2"},{"vulnerability":"VCID-5cw7-rv5f-jfaq"},{"vulnerability":"VCID-5dbd-kz24-6fc1"},{"vulnerability":"VCID-6kh6-edk7-xkcc"},{"vulnerability":"VCID-6xbp-t4qh-tbhv"},{"vulnerability":"VCID-77st-3475-5kdr"},{"vulnerability":"VCID-7d5b-66n7-zbe1"},{"vulnerability":"VCID-7ek3-weqx-9fhs"},{"vulnerability":"VCID-7etc-u5ya-zued"},{"vulnerability":"VCID-7t5h-jy8h-t3d4"},{"vulnerability":"VCID-7wyt-uh2c-a3ha"},{"vulnerability":"VCID-7ysh-usku-c3dz"},{"vulnerability":"VCID-7zpj-3par-s3b5"},{"vulnerability":"VCID-87tq-2me2-d3bb"},{"vulnerability":"VCID-8cb8-vq2c-q3e9"},{"vulnerability":"VCID-8r8y-8bq2-jufj"},{"vulnerability":"VCID-91hk-73kq-83g6"},{"vulnerability":"VCID-9hr5-p18q-7qb8"},{"vulnerability":"VCID-9s43-gewn-bycc"},{"vulnerability":"VCID-9zqd-3x84-43gc"},{"vulnerability":"VCID-az8d-xrb4-3ug4"},{"vulnerability":"VCID-b7tb-ns1t-fyaw"},{"vulnerability":"VCID-bc6f-wu8g-5yb4"},{"vulnerability":"VCID-bs56-1z79-uqbt"},{"vulnerability":"VCID-bxae-85uh-uyek"},{"vulnerability":"VCID-bxb7-7gpw-qybb"},{"vulnerability":"VCID-bzve-5gwu-8ydb"},{"vulnerability":"VCID-csy7-esn4-u3gq"},{"vulnerability":"VCID-d3ad-6tme-bfem"},{"vulnerability":"VCID-dfjm-gwzm-jqbt"},{"vulnerability":"VCID-dgm4-ye4m-1fcq"},{"vulnerability":"VCID-dj1v-h79p-9ydz"},{"vulnerability":"VCID-dqy9-zkvw-e3gk"},{"vulnerability":"VCID-drhd-ytb7-u3em"},{"vulnerability":"VCID-e96u-uwba-kfg5"},{"vulnerability":"VCID-eb8v-p31a-yuhu"},{"vulnerability":"VCID-eka3-u8e5-3uad"},{"vulnerability":"VCID-ep7n-um5m-ekgk"},{"vulnerability":"VCID-fekb-fbhz-y7g7"},{"vulnerability":"VCID-fhbs-3nvf-tbha"},{"vulnerability":"VCID-fqt9-2esb-ffan"},{"vulnerability":"VCID-g72t-7kx1-abcs"},{"vulnerability":"VCID-gdsj-4cbx-ufep"},{"vulnerability":"VCID-gj1u-mbaj-kyc5"},{"vulnerability":"VCID-h9c6-yw5r-v3ex"},{"vulnerability":"VCID-hg4z-ad3f-fbc2"},{"vulnerability":"VCID-hsau-swt9-kyf7"},{"vulnerability":"VCID-hx7j-eymk-4ygk"},{"vulnerability":"VCID-hyup-47wa-pfac"},{"vulnerability":"VCID-jwdv-qe4x-yfgw"},{"vulnerability":"VCID-k5j4-3xmv-a7bk"},{"vulnerability":"VCID-kcj6-ua4t-ybgj"},{"vulnerability":"VCID-knqd-zktw-cydm"},{"vulnerability":"VCID-mcs2-ndqd-tydv"},{"vulnerability":"VCID-mf8g-nbkw-f7gr"},{"vulnerability":"VCID-n3t2-m6br-ufb3"},{"vulnerability":"VCID-n7pg-b7kc-wkew"},{"vulnerability":"VCID-ndz3-372h-8fhk"},{"vulnerability":"VCID-p3uc-18e9-skb4"},{"vulnerability":"VCID-p7ug-wwk5-63gb"},{"vulnerability":"VCID-pb8n-hmsc-syfw"},{"vulnerability":"VCID-pphm-ygb7-q7g2"},{"vulnerability":"VCID-pzt3-abab-4kdd"},{"vulnerability":"VCID-qnew-xqte-kbej"},{"vulnerability":"VCID-qprv-989b-k3d3"},{"vulnerability":"VCID-s4nf-p69f-pue8"},{"vulnerability":"VCID-td6e-x2qb-syg3"},{"vulnerability":"VCID-uunr-69dt-q7fn"},{"vulnerability":"VCID-uvcp-ad38-2kcs"},{"vulnerability":"VCID-vb2u-yc2z-ayh5"},{"vulnerability":"VCID-vs9k-akwv-h3ak"},{"vulnerability":"VCID-w2ch-guy5-6ye9"},{"vulnerability":"VCID-wh75-sc4f-qqc1"},{"vulnerability":"VCID-xcvw-eex8-j3bf"},{"vulnerability":"VCID-xe4j-gg7f-wyfa"},{"vulnerability":"VCID-z3g4-1vhq-97dj"},{"vulnerability":"VCID-z3qj-cnxq-pkgq"},{"vulnerability":"VCID-z8zf-cqkb-guge"},{"vulnerability":"VCID-zkyv-h5at-xkgq"},{"vulnerability":"VCID-zrxf-3w1d-t3ba"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.4%252B107-gef32c7afa2-1"},{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2021-28692","XSA-373"],"risk_score":1.1,"exploitability":"0.5","weighted_severity":"2.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n7pg-b7kc-wkew"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4253?format=json","vulnerability_id":"VCID-ndz3-372h-8fhk","summary":"FIFO event channels control block related ordering","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-29570","reference_id":"","reference_type":"","scores":[{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18506","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18744","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.1888","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18933","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18656","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18736","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18789","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18794","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18747","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18697","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18646","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18657","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18676","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18568","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18546","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-29570"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29479","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29479"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29481","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29481"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29482","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29482"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29483","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29483"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29484","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29484"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29485","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29485"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29486","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29486"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29566","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29566"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29570","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29570"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29571","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29571"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.gentoo.org/glsa/202107-30","reference_id":"GLSA-202107-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-30"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-358.html","reference_id":"XSA-358","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-358.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037808?format=json","purl":"pkg:deb/debian/xen@4.11.4%2B107-gef32c7afa2-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1wgc-r96w-7kg9"},{"vulnerability":"VCID-1wtd-67ef-1qej"},{"vulnerability":"VCID-1x3w-n7ms-eqeh"},{"vulnerability":"VCID-28t2-hng7-tfe5"},{"vulnerability":"VCID-2n9p-6t7s-kqc5"},{"vulnerability":"VCID-2uap-2vm1-efcr"},{"vulnerability":"VCID-32w3-vmcb-wfd9"},{"vulnerability":"VCID-34gr-dtsz-1fab"},{"vulnerability":"VCID-34ng-ftbx-e3cm"},{"vulnerability":"VCID-39t8-p1q7-eyag"},{"vulnerability":"VCID-3d53-4qtr-myhm"},{"vulnerability":"VCID-3pxf-xndw-5fft"},{"vulnerability":"VCID-3whm-8fyv-zyhd"},{"vulnerability":"VCID-416b-93m6-jyby"},{"vulnerability":"VCID-42ma-8ash-j7c8"},{"vulnerability":"VCID-4429-qf2w-jqg3"},{"vulnerability":"VCID-4spa-usqt-93b2"},{"vulnerability":"VCID-5cw7-rv5f-jfaq"},{"vulnerability":"VCID-5dbd-kz24-6fc1"},{"vulnerability":"VCID-6kh6-edk7-xkcc"},{"vulnerability":"VCID-6xbp-t4qh-tbhv"},{"vulnerability":"VCID-77st-3475-5kdr"},{"vulnerability":"VCID-7d5b-66n7-zbe1"},{"vulnerability":"VCID-7ek3-weqx-9fhs"},{"vulnerability":"VCID-7etc-u5ya-zued"},{"vulnerability":"VCID-7t5h-jy8h-t3d4"},{"vulnerability":"VCID-7wyt-uh2c-a3ha"},{"vulnerability":"VCID-7ysh-usku-c3dz"},{"vulnerability":"VCID-7zpj-3par-s3b5"},{"vulnerability":"VCID-87tq-2me2-d3bb"},{"vulnerability":"VCID-8cb8-vq2c-q3e9"},{"vulnerability":"VCID-8r8y-8bq2-jufj"},{"vulnerability":"VCID-91hk-73kq-83g6"},{"vulnerability":"VCID-9hr5-p18q-7qb8"},{"vulnerability":"VCID-9s43-gewn-bycc"},{"vulnerability":"VCID-9zqd-3x84-43gc"},{"vulnerability":"VCID-az8d-xrb4-3ug4"},{"vulnerability":"VCID-b7tb-ns1t-fyaw"},{"vulnerability":"VCID-bc6f-wu8g-5yb4"},{"vulnerability":"VCID-bs56-1z79-uqbt"},{"vulnerability":"VCID-bxae-85uh-uyek"},{"vulnerability":"VCID-bxb7-7gpw-qybb"},{"vulnerability":"VCID-bzve-5gwu-8ydb"},{"vulnerability":"VCID-csy7-esn4-u3gq"},{"vulnerability":"VCID-d3ad-6tme-bfem"},{"vulnerability":"VCID-dfjm-gwzm-jqbt"},{"vulnerability":"VCID-dgm4-ye4m-1fcq"},{"vulnerability":"VCID-dj1v-h79p-9ydz"},{"vulnerability":"VCID-dqy9-zkvw-e3gk"},{"vulnerability":"VCID-drhd-ytb7-u3em"},{"vulnerability":"VCID-e96u-uwba-kfg5"},{"vulnerability":"VCID-eb8v-p31a-yuhu"},{"vulnerability":"VCID-eka3-u8e5-3uad"},{"vulnerability":"VCID-ep7n-um5m-ekgk"},{"vulnerability":"VCID-fekb-fbhz-y7g7"},{"vulnerability":"VCID-fhbs-3nvf-tbha"},{"vulnerability":"VCID-fqt9-2esb-ffan"},{"vulnerability":"VCID-g72t-7kx1-abcs"},{"vulnerability":"VCID-gdsj-4cbx-ufep"},{"vulnerability":"VCID-gj1u-mbaj-kyc5"},{"vulnerability":"VCID-h9c6-yw5r-v3ex"},{"vulnerability":"VCID-hg4z-ad3f-fbc2"},{"vulnerability":"VCID-hsau-swt9-kyf7"},{"vulnerability":"VCID-hx7j-eymk-4ygk"},{"vulnerability":"VCID-hyup-47wa-pfac"},{"vulnerability":"VCID-jwdv-qe4x-yfgw"},{"vulnerability":"VCID-k5j4-3xmv-a7bk"},{"vulnerability":"VCID-kcj6-ua4t-ybgj"},{"vulnerability":"VCID-knqd-zktw-cydm"},{"vulnerability":"VCID-mcs2-ndqd-tydv"},{"vulnerability":"VCID-mf8g-nbkw-f7gr"},{"vulnerability":"VCID-n3t2-m6br-ufb3"},{"vulnerability":"VCID-n7pg-b7kc-wkew"},{"vulnerability":"VCID-ndz3-372h-8fhk"},{"vulnerability":"VCID-p3uc-18e9-skb4"},{"vulnerability":"VCID-p7ug-wwk5-63gb"},{"vulnerability":"VCID-pb8n-hmsc-syfw"},{"vulnerability":"VCID-pphm-ygb7-q7g2"},{"vulnerability":"VCID-pzt3-abab-4kdd"},{"vulnerability":"VCID-qnew-xqte-kbej"},{"vulnerability":"VCID-qprv-989b-k3d3"},{"vulnerability":"VCID-s4nf-p69f-pue8"},{"vulnerability":"VCID-td6e-x2qb-syg3"},{"vulnerability":"VCID-uunr-69dt-q7fn"},{"vulnerability":"VCID-uvcp-ad38-2kcs"},{"vulnerability":"VCID-vb2u-yc2z-ayh5"},{"vulnerability":"VCID-vs9k-akwv-h3ak"},{"vulnerability":"VCID-w2ch-guy5-6ye9"},{"vulnerability":"VCID-wh75-sc4f-qqc1"},{"vulnerability":"VCID-xcvw-eex8-j3bf"},{"vulnerability":"VCID-xe4j-gg7f-wyfa"},{"vulnerability":"VCID-z3g4-1vhq-97dj"},{"vulnerability":"VCID-z3qj-cnxq-pkgq"},{"vulnerability":"VCID-z8zf-cqkb-guge"},{"vulnerability":"VCID-zkyv-h5at-xkgq"},{"vulnerability":"VCID-zrxf-3w1d-t3ba"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.4%252B107-gef32c7afa2-1"},{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2020-29570","XSA-358"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ndz3-372h-8fhk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3999?format=json","vulnerability_id":"VCID-p3uc-18e9-skb4","summary":"xenstore watch notifications lacking permission checks","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-29480","reference_id":"","reference_type":"","scores":[{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19246","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19381","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19432","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19149","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19229","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19281","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19286","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19239","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19185","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19145","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19155","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19164","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19055","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19044","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-29480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29479","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29479"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29481","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29481"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29482","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29482"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29483","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29483"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29484","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29484"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29485","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29485"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29486","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29486"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29566","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29566"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29570","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29570"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29571","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29571"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-115.html","reference_id":"XSA-115","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-115.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037808?format=json","purl":"pkg:deb/debian/xen@4.11.4%2B107-gef32c7afa2-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1wgc-r96w-7kg9"},{"vulnerability":"VCID-1wtd-67ef-1qej"},{"vulnerability":"VCID-1x3w-n7ms-eqeh"},{"vulnerability":"VCID-28t2-hng7-tfe5"},{"vulnerability":"VCID-2n9p-6t7s-kqc5"},{"vulnerability":"VCID-2uap-2vm1-efcr"},{"vulnerability":"VCID-32w3-vmcb-wfd9"},{"vulnerability":"VCID-34gr-dtsz-1fab"},{"vulnerability":"VCID-34ng-ftbx-e3cm"},{"vulnerability":"VCID-39t8-p1q7-eyag"},{"vulnerability":"VCID-3d53-4qtr-myhm"},{"vulnerability":"VCID-3pxf-xndw-5fft"},{"vulnerability":"VCID-3whm-8fyv-zyhd"},{"vulnerability":"VCID-416b-93m6-jyby"},{"vulnerability":"VCID-42ma-8ash-j7c8"},{"vulnerability":"VCID-4429-qf2w-jqg3"},{"vulnerability":"VCID-4spa-usqt-93b2"},{"vulnerability":"VCID-5cw7-rv5f-jfaq"},{"vulnerability":"VCID-5dbd-kz24-6fc1"},{"vulnerability":"VCID-6kh6-edk7-xkcc"},{"vulnerability":"VCID-6xbp-t4qh-tbhv"},{"vulnerability":"VCID-77st-3475-5kdr"},{"vulnerability":"VCID-7d5b-66n7-zbe1"},{"vulnerability":"VCID-7ek3-weqx-9fhs"},{"vulnerability":"VCID-7etc-u5ya-zued"},{"vulnerability":"VCID-7t5h-jy8h-t3d4"},{"vulnerability":"VCID-7wyt-uh2c-a3ha"},{"vulnerability":"VCID-7ysh-usku-c3dz"},{"vulnerability":"VCID-7zpj-3par-s3b5"},{"vulnerability":"VCID-87tq-2me2-d3bb"},{"vulnerability":"VCID-8cb8-vq2c-q3e9"},{"vulnerability":"VCID-8r8y-8bq2-jufj"},{"vulnerability":"VCID-91hk-73kq-83g6"},{"vulnerability":"VCID-9hr5-p18q-7qb8"},{"vulnerability":"VCID-9s43-gewn-bycc"},{"vulnerability":"VCID-9zqd-3x84-43gc"},{"vulnerability":"VCID-az8d-xrb4-3ug4"},{"vulnerability":"VCID-b7tb-ns1t-fyaw"},{"vulnerability":"VCID-bc6f-wu8g-5yb4"},{"vulnerability":"VCID-bs56-1z79-uqbt"},{"vulnerability":"VCID-bxae-85uh-uyek"},{"vulnerability":"VCID-bxb7-7gpw-qybb"},{"vulnerability":"VCID-bzve-5gwu-8ydb"},{"vulnerability":"VCID-csy7-esn4-u3gq"},{"vulnerability":"VCID-d3ad-6tme-bfem"},{"vulnerability":"VCID-dfjm-gwzm-jqbt"},{"vulnerability":"VCID-dgm4-ye4m-1fcq"},{"vulnerability":"VCID-dj1v-h79p-9ydz"},{"vulnerability":"VCID-dqy9-zkvw-e3gk"},{"vulnerability":"VCID-drhd-ytb7-u3em"},{"vulnerability":"VCID-e96u-uwba-kfg5"},{"vulnerability":"VCID-eb8v-p31a-yuhu"},{"vulnerability":"VCID-eka3-u8e5-3uad"},{"vulnerability":"VCID-ep7n-um5m-ekgk"},{"vulnerability":"VCID-fekb-fbhz-y7g7"},{"vulnerability":"VCID-fhbs-3nvf-tbha"},{"vulnerability":"VCID-fqt9-2esb-ffan"},{"vulnerability":"VCID-g72t-7kx1-abcs"},{"vulnerability":"VCID-gdsj-4cbx-ufep"},{"vulnerability":"VCID-gj1u-mbaj-kyc5"},{"vulnerability":"VCID-h9c6-yw5r-v3ex"},{"vulnerability":"VCID-hg4z-ad3f-fbc2"},{"vulnerability":"VCID-hsau-swt9-kyf7"},{"vulnerability":"VCID-hx7j-eymk-4ygk"},{"vulnerability":"VCID-hyup-47wa-pfac"},{"vulnerability":"VCID-jwdv-qe4x-yfgw"},{"vulnerability":"VCID-k5j4-3xmv-a7bk"},{"vulnerability":"VCID-kcj6-ua4t-ybgj"},{"vulnerability":"VCID-knqd-zktw-cydm"},{"vulnerability":"VCID-mcs2-ndqd-tydv"},{"vulnerability":"VCID-mf8g-nbkw-f7gr"},{"vulnerability":"VCID-n3t2-m6br-ufb3"},{"vulnerability":"VCID-n7pg-b7kc-wkew"},{"vulnerability":"VCID-ndz3-372h-8fhk"},{"vulnerability":"VCID-p3uc-18e9-skb4"},{"vulnerability":"VCID-p7ug-wwk5-63gb"},{"vulnerability":"VCID-pb8n-hmsc-syfw"},{"vulnerability":"VCID-pphm-ygb7-q7g2"},{"vulnerability":"VCID-pzt3-abab-4kdd"},{"vulnerability":"VCID-qnew-xqte-kbej"},{"vulnerability":"VCID-qprv-989b-k3d3"},{"vulnerability":"VCID-s4nf-p69f-pue8"},{"vulnerability":"VCID-td6e-x2qb-syg3"},{"vulnerability":"VCID-uunr-69dt-q7fn"},{"vulnerability":"VCID-uvcp-ad38-2kcs"},{"vulnerability":"VCID-vb2u-yc2z-ayh5"},{"vulnerability":"VCID-vs9k-akwv-h3ak"},{"vulnerability":"VCID-w2ch-guy5-6ye9"},{"vulnerability":"VCID-wh75-sc4f-qqc1"},{"vulnerability":"VCID-xcvw-eex8-j3bf"},{"vulnerability":"VCID-xe4j-gg7f-wyfa"},{"vulnerability":"VCID-z3g4-1vhq-97dj"},{"vulnerability":"VCID-z3qj-cnxq-pkgq"},{"vulnerability":"VCID-z8zf-cqkb-guge"},{"vulnerability":"VCID-zkyv-h5at-xkgq"},{"vulnerability":"VCID-zrxf-3w1d-t3ba"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.4%252B107-gef32c7afa2-1"},{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2020-29480","XSA-115"],"risk_score":0.9,"exploitability":"0.5","weighted_severity":"1.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p3uc-18e9-skb4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4238?format=json","vulnerability_id":"VCID-p7ug-wwk5-63gb","summary":"out of bounds event channels available to 32-bit x86 domains","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25600.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25600.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-25600","reference_id":"","reference_type":"","scores":[{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27816","published_at":"2026-04-01T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27866","published_at":"2026-04-02T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27906","published_at":"2026-04-04T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27698","published_at":"2026-04-07T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27766","published_at":"2026-04-08T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27808","published_at":"2026-04-09T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27814","published_at":"2026-04-11T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27772","published_at":"2026-04-12T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27715","published_at":"2026-04-13T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27723","published_at":"2026-04-16T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27697","published_at":"2026-04-18T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27658","published_at":"2026-04-21T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27605","published_at":"2026-04-24T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27498","published_at":"2026-04-26T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27426","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-25600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25595","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25595"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25596","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25596"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25602","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25602"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25603","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25603"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25604","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25604"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1880156","reference_id":"1880156","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1880156"},{"reference_url":"https://security.gentoo.org/glsa/202011-06","reference_id":"GLSA-202011-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202011-06"},{"reference_url":"https://usn.ubuntu.com/5617-1/","reference_id":"USN-5617-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5617-1/"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-342.html","reference_id":"XSA-342","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-342.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037808?format=json","purl":"pkg:deb/debian/xen@4.11.4%2B107-gef32c7afa2-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1wgc-r96w-7kg9"},{"vulnerability":"VCID-1wtd-67ef-1qej"},{"vulnerability":"VCID-1x3w-n7ms-eqeh"},{"vulnerability":"VCID-28t2-hng7-tfe5"},{"vulnerability":"VCID-2n9p-6t7s-kqc5"},{"vulnerability":"VCID-2uap-2vm1-efcr"},{"vulnerability":"VCID-32w3-vmcb-wfd9"},{"vulnerability":"VCID-34gr-dtsz-1fab"},{"vulnerability":"VCID-34ng-ftbx-e3cm"},{"vulnerability":"VCID-39t8-p1q7-eyag"},{"vulnerability":"VCID-3d53-4qtr-myhm"},{"vulnerability":"VCID-3pxf-xndw-5fft"},{"vulnerability":"VCID-3whm-8fyv-zyhd"},{"vulnerability":"VCID-416b-93m6-jyby"},{"vulnerability":"VCID-42ma-8ash-j7c8"},{"vulnerability":"VCID-4429-qf2w-jqg3"},{"vulnerability":"VCID-4spa-usqt-93b2"},{"vulnerability":"VCID-5cw7-rv5f-jfaq"},{"vulnerability":"VCID-5dbd-kz24-6fc1"},{"vulnerability":"VCID-6kh6-edk7-xkcc"},{"vulnerability":"VCID-6xbp-t4qh-tbhv"},{"vulnerability":"VCID-77st-3475-5kdr"},{"vulnerability":"VCID-7d5b-66n7-zbe1"},{"vulnerability":"VCID-7ek3-weqx-9fhs"},{"vulnerability":"VCID-7etc-u5ya-zued"},{"vulnerability":"VCID-7t5h-jy8h-t3d4"},{"vulnerability":"VCID-7wyt-uh2c-a3ha"},{"vulnerability":"VCID-7ysh-usku-c3dz"},{"vulnerability":"VCID-7zpj-3par-s3b5"},{"vulnerability":"VCID-87tq-2me2-d3bb"},{"vulnerability":"VCID-8cb8-vq2c-q3e9"},{"vulnerability":"VCID-8r8y-8bq2-jufj"},{"vulnerability":"VCID-91hk-73kq-83g6"},{"vulnerability":"VCID-9hr5-p18q-7qb8"},{"vulnerability":"VCID-9s43-gewn-bycc"},{"vulnerability":"VCID-9zqd-3x84-43gc"},{"vulnerability":"VCID-az8d-xrb4-3ug4"},{"vulnerability":"VCID-b7tb-ns1t-fyaw"},{"vulnerability":"VCID-bc6f-wu8g-5yb4"},{"vulnerability":"VCID-bs56-1z79-uqbt"},{"vulnerability":"VCID-bxae-85uh-uyek"},{"vulnerability":"VCID-bxb7-7gpw-qybb"},{"vulnerability":"VCID-bzve-5gwu-8ydb"},{"vulnerability":"VCID-csy7-esn4-u3gq"},{"vulnerability":"VCID-d3ad-6tme-bfem"},{"vulnerability":"VCID-dfjm-gwzm-jqbt"},{"vulnerability":"VCID-dgm4-ye4m-1fcq"},{"vulnerability":"VCID-dj1v-h79p-9ydz"},{"vulnerability":"VCID-dqy9-zkvw-e3gk"},{"vulnerability":"VCID-drhd-ytb7-u3em"},{"vulnerability":"VCID-e96u-uwba-kfg5"},{"vulnerability":"VCID-eb8v-p31a-yuhu"},{"vulnerability":"VCID-eka3-u8e5-3uad"},{"vulnerability":"VCID-ep7n-um5m-ekgk"},{"vulnerability":"VCID-fekb-fbhz-y7g7"},{"vulnerability":"VCID-fhbs-3nvf-tbha"},{"vulnerability":"VCID-fqt9-2esb-ffan"},{"vulnerability":"VCID-g72t-7kx1-abcs"},{"vulnerability":"VCID-gdsj-4cbx-ufep"},{"vulnerability":"VCID-gj1u-mbaj-kyc5"},{"vulnerability":"VCID-h9c6-yw5r-v3ex"},{"vulnerability":"VCID-hg4z-ad3f-fbc2"},{"vulnerability":"VCID-hsau-swt9-kyf7"},{"vulnerability":"VCID-hx7j-eymk-4ygk"},{"vulnerability":"VCID-hyup-47wa-pfac"},{"vulnerability":"VCID-jwdv-qe4x-yfgw"},{"vulnerability":"VCID-k5j4-3xmv-a7bk"},{"vulnerability":"VCID-kcj6-ua4t-ybgj"},{"vulnerability":"VCID-knqd-zktw-cydm"},{"vulnerability":"VCID-mcs2-ndqd-tydv"},{"vulnerability":"VCID-mf8g-nbkw-f7gr"},{"vulnerability":"VCID-n3t2-m6br-ufb3"},{"vulnerability":"VCID-n7pg-b7kc-wkew"},{"vulnerability":"VCID-ndz3-372h-8fhk"},{"vulnerability":"VCID-p3uc-18e9-skb4"},{"vulnerability":"VCID-p7ug-wwk5-63gb"},{"vulnerability":"VCID-pb8n-hmsc-syfw"},{"vulnerability":"VCID-pphm-ygb7-q7g2"},{"vulnerability":"VCID-pzt3-abab-4kdd"},{"vulnerability":"VCID-qnew-xqte-kbej"},{"vulnerability":"VCID-qprv-989b-k3d3"},{"vulnerability":"VCID-s4nf-p69f-pue8"},{"vulnerability":"VCID-td6e-x2qb-syg3"},{"vulnerability":"VCID-uunr-69dt-q7fn"},{"vulnerability":"VCID-uvcp-ad38-2kcs"},{"vulnerability":"VCID-vb2u-yc2z-ayh5"},{"vulnerability":"VCID-vs9k-akwv-h3ak"},{"vulnerability":"VCID-w2ch-guy5-6ye9"},{"vulnerability":"VCID-wh75-sc4f-qqc1"},{"vulnerability":"VCID-xcvw-eex8-j3bf"},{"vulnerability":"VCID-xe4j-gg7f-wyfa"},{"vulnerability":"VCID-z3g4-1vhq-97dj"},{"vulnerability":"VCID-z3qj-cnxq-pkgq"},{"vulnerability":"VCID-z8zf-cqkb-guge"},{"vulnerability":"VCID-zkyv-h5at-xkgq"},{"vulnerability":"VCID-zrxf-3w1d-t3ba"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.4%252B107-gef32c7afa2-1"},{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2020-25600","XSA-342"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p7ug-wwk5-63gb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4328?format=json","vulnerability_id":"VCID-pb8n-hmsc-syfw","summary":"P2M pool freeing may take excessively long","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-33746","reference_id":"","reference_type":"","scores":[{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11615","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11867","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11912","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11698","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11782","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11835","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11845","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11806","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11779","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11643","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11764","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11732","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11693","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-33746"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021668","reference_id":"1021668","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021668"},{"reference_url":"https://security.gentoo.org/glsa/202402-07","reference_id":"GLSA-202402-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-07"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-410.html","reference_id":"XSA-410","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-410.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2022-33746","XSA-410"],"risk_score":1.3,"exploitability":"0.5","weighted_severity":"2.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pb8n-hmsc-syfw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4337?format=json","vulnerability_id":"VCID-pphm-ygb7-q7g2","summary":"Xenstore: Cooperating guests can create arbitrary numbers of nodes","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42322","reference_id":"","reference_type":"","scores":[{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09802","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09727","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09776","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09681","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09752","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11254","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11455","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11422","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11393","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11255","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.11947","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12097","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12075","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12043","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42322"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.gentoo.org/glsa/202402-07","reference_id":"GLSA-202402-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-07"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-419.html","reference_id":"XSA-419","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-419.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2022-42322","XSA-419"],"risk_score":1.3,"exploitability":"0.5","weighted_severity":"2.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pphm-ygb7-q7g2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4172?format=json","vulnerability_id":"VCID-pzt3-abab-4kdd","summary":"x86 PV guest INVLPG-like flushes may leave stale TLB entries","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27674.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27674.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-27674","reference_id":"","reference_type":"","scores":[{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22151","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22309","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22352","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22137","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.2222","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22274","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22294","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22252","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22193","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22194","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22188","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22142","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22002","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21988","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21975","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-27674"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27670","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27670"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27671","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27671"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27672","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27672"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27674","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27674"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28368","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28368"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1891089","reference_id":"1891089","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1891089"},{"reference_url":"https://security.gentoo.org/glsa/202011-06","reference_id":"GLSA-202011-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202011-06"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-286.html","reference_id":"XSA-286","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-286.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037808?format=json","purl":"pkg:deb/debian/xen@4.11.4%2B107-gef32c7afa2-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1wgc-r96w-7kg9"},{"vulnerability":"VCID-1wtd-67ef-1qej"},{"vulnerability":"VCID-1x3w-n7ms-eqeh"},{"vulnerability":"VCID-28t2-hng7-tfe5"},{"vulnerability":"VCID-2n9p-6t7s-kqc5"},{"vulnerability":"VCID-2uap-2vm1-efcr"},{"vulnerability":"VCID-32w3-vmcb-wfd9"},{"vulnerability":"VCID-34gr-dtsz-1fab"},{"vulnerability":"VCID-34ng-ftbx-e3cm"},{"vulnerability":"VCID-39t8-p1q7-eyag"},{"vulnerability":"VCID-3d53-4qtr-myhm"},{"vulnerability":"VCID-3pxf-xndw-5fft"},{"vulnerability":"VCID-3whm-8fyv-zyhd"},{"vulnerability":"VCID-416b-93m6-jyby"},{"vulnerability":"VCID-42ma-8ash-j7c8"},{"vulnerability":"VCID-4429-qf2w-jqg3"},{"vulnerability":"VCID-4spa-usqt-93b2"},{"vulnerability":"VCID-5cw7-rv5f-jfaq"},{"vulnerability":"VCID-5dbd-kz24-6fc1"},{"vulnerability":"VCID-6kh6-edk7-xkcc"},{"vulnerability":"VCID-6xbp-t4qh-tbhv"},{"vulnerability":"VCID-77st-3475-5kdr"},{"vulnerability":"VCID-7d5b-66n7-zbe1"},{"vulnerability":"VCID-7ek3-weqx-9fhs"},{"vulnerability":"VCID-7etc-u5ya-zued"},{"vulnerability":"VCID-7t5h-jy8h-t3d4"},{"vulnerability":"VCID-7wyt-uh2c-a3ha"},{"vulnerability":"VCID-7ysh-usku-c3dz"},{"vulnerability":"VCID-7zpj-3par-s3b5"},{"vulnerability":"VCID-87tq-2me2-d3bb"},{"vulnerability":"VCID-8cb8-vq2c-q3e9"},{"vulnerability":"VCID-8r8y-8bq2-jufj"},{"vulnerability":"VCID-91hk-73kq-83g6"},{"vulnerability":"VCID-9hr5-p18q-7qb8"},{"vulnerability":"VCID-9s43-gewn-bycc"},{"vulnerability":"VCID-9zqd-3x84-43gc"},{"vulnerability":"VCID-az8d-xrb4-3ug4"},{"vulnerability":"VCID-b7tb-ns1t-fyaw"},{"vulnerability":"VCID-bc6f-wu8g-5yb4"},{"vulnerability":"VCID-bs56-1z79-uqbt"},{"vulnerability":"VCID-bxae-85uh-uyek"},{"vulnerability":"VCID-bxb7-7gpw-qybb"},{"vulnerability":"VCID-bzve-5gwu-8ydb"},{"vulnerability":"VCID-csy7-esn4-u3gq"},{"vulnerability":"VCID-d3ad-6tme-bfem"},{"vulnerability":"VCID-dfjm-gwzm-jqbt"},{"vulnerability":"VCID-dgm4-ye4m-1fcq"},{"vulnerability":"VCID-dj1v-h79p-9ydz"},{"vulnerability":"VCID-dqy9-zkvw-e3gk"},{"vulnerability":"VCID-drhd-ytb7-u3em"},{"vulnerability":"VCID-e96u-uwba-kfg5"},{"vulnerability":"VCID-eb8v-p31a-yuhu"},{"vulnerability":"VCID-eka3-u8e5-3uad"},{"vulnerability":"VCID-ep7n-um5m-ekgk"},{"vulnerability":"VCID-fekb-fbhz-y7g7"},{"vulnerability":"VCID-fhbs-3nvf-tbha"},{"vulnerability":"VCID-fqt9-2esb-ffan"},{"vulnerability":"VCID-g72t-7kx1-abcs"},{"vulnerability":"VCID-gdsj-4cbx-ufep"},{"vulnerability":"VCID-gj1u-mbaj-kyc5"},{"vulnerability":"VCID-h9c6-yw5r-v3ex"},{"vulnerability":"VCID-hg4z-ad3f-fbc2"},{"vulnerability":"VCID-hsau-swt9-kyf7"},{"vulnerability":"VCID-hx7j-eymk-4ygk"},{"vulnerability":"VCID-hyup-47wa-pfac"},{"vulnerability":"VCID-jwdv-qe4x-yfgw"},{"vulnerability":"VCID-k5j4-3xmv-a7bk"},{"vulnerability":"VCID-kcj6-ua4t-ybgj"},{"vulnerability":"VCID-knqd-zktw-cydm"},{"vulnerability":"VCID-mcs2-ndqd-tydv"},{"vulnerability":"VCID-mf8g-nbkw-f7gr"},{"vulnerability":"VCID-n3t2-m6br-ufb3"},{"vulnerability":"VCID-n7pg-b7kc-wkew"},{"vulnerability":"VCID-ndz3-372h-8fhk"},{"vulnerability":"VCID-p3uc-18e9-skb4"},{"vulnerability":"VCID-p7ug-wwk5-63gb"},{"vulnerability":"VCID-pb8n-hmsc-syfw"},{"vulnerability":"VCID-pphm-ygb7-q7g2"},{"vulnerability":"VCID-pzt3-abab-4kdd"},{"vulnerability":"VCID-qnew-xqte-kbej"},{"vulnerability":"VCID-qprv-989b-k3d3"},{"vulnerability":"VCID-s4nf-p69f-pue8"},{"vulnerability":"VCID-td6e-x2qb-syg3"},{"vulnerability":"VCID-uunr-69dt-q7fn"},{"vulnerability":"VCID-uvcp-ad38-2kcs"},{"vulnerability":"VCID-vb2u-yc2z-ayh5"},{"vulnerability":"VCID-vs9k-akwv-h3ak"},{"vulnerability":"VCID-w2ch-guy5-6ye9"},{"vulnerability":"VCID-wh75-sc4f-qqc1"},{"vulnerability":"VCID-xcvw-eex8-j3bf"},{"vulnerability":"VCID-xe4j-gg7f-wyfa"},{"vulnerability":"VCID-z3g4-1vhq-97dj"},{"vulnerability":"VCID-z3qj-cnxq-pkgq"},{"vulnerability":"VCID-z8zf-cqkb-guge"},{"vulnerability":"VCID-zkyv-h5at-xkgq"},{"vulnerability":"VCID-zrxf-3w1d-t3ba"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.4%252B107-gef32c7afa2-1"},{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2020-27674","XSA-286"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pzt3-abab-4kdd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4336?format=json","vulnerability_id":"VCID-qnew-xqte-kbej","summary":"Xenstore: Guests can crash xenstored via exhausting the stack","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42321","reference_id":"","reference_type":"","scores":[{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.084","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08345","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08398","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.0832","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08383","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09504","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09661","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09629","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09613","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09509","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10173","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10261","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10241","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10228","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42321"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.gentoo.org/glsa/202402-07","reference_id":"GLSA-202402-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-07"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-418.html","reference_id":"XSA-418","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-418.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2022-42321","XSA-418"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qnew-xqte-kbej"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4273?format=json","vulnerability_id":"VCID-qprv-989b-k3d3","summary":"IOMMU page mapping issues on x86","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-28694","reference_id":"","reference_type":"","scores":[{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33137","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.3338","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33516","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33549","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.3339","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33435","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33469","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33472","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33431","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33407","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33444","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33419","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33388","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33234","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33217","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-28694"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28694","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28694"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28695","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28695"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28696","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28696"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28697","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28697"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28698","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28698"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28699","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28699"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28700","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28700"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28701","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28701"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.gentoo.org/glsa/202208-23","reference_id":"GLSA-202208-23","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-23"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-378.html","reference_id":"XSA-378","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-378.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2021-28694","XSA-378"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qprv-989b-k3d3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4278?format=json","vulnerability_id":"VCID-s4nf-p69f-pue8","summary":"inadequate grant-v2 status frames array bounds check","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-28699","reference_id":"","reference_type":"","scores":[{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22244","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22396","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22563","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22606","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22393","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22475","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22529","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22548","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22507","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22452","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22468","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22465","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22415","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22263","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22249","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-28699"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28694","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28694"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28695","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28695"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28696","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28696"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28697","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28697"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28698","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28698"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28699","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28699"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28700","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28700"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28701","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28701"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.gentoo.org/glsa/202208-23","reference_id":"GLSA-202208-23","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-23"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-382.html","reference_id":"XSA-382","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-382.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2021-28699","XSA-382"],"risk_score":1.8,"exploitability":"0.5","weighted_severity":"3.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s4nf-p69f-pue8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4319?format=json","vulnerability_id":"VCID-td6e-x2qb-syg3","summary":"x86: MMIO Stale Data vulnerabilities","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21125.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21125.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21125","reference_id":"","reference_type":"","scores":[{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.47446","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.47447","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.47466","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.47443","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.47441","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.47391","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.47421","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00536","scoring_system":"epss","scoring_elements":"0.67511","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00536","scoring_system":"epss","scoring_elements":"0.6752","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00536","scoring_system":"epss","scoring_elements":"0.67518","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00536","scoring_system":"epss","scoring_elements":"0.67507","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00536","scoring_system":"epss","scoring_elements":"0.67488","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00536","scoring_system":"epss","scoring_elements":"0.67499","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21125"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21127","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21127"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21151","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21151"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2022/06/16/1","reference_id":"1","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/"}],"url":"http://www.openwall.com/lists/oss-security/2022/06/16/1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2090240","reference_id":"2090240","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2090240"},{"reference_url":"http://xenbits.xen.org/xsa/advisory-404.html","reference_id":"advisory-404.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/"}],"url":"http://xenbits.xen.org/xsa/advisory-404.html"},{"reference_url":"https://www.debian.org/security/2022/dsa-5173","reference_id":"dsa-5173","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/"}],"url":"https://www.debian.org/security/2022/dsa-5173"},{"reference_url":"https://www.debian.org/security/2022/dsa-5178","reference_id":"dsa-5178","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/"}],"url":"https://www.debian.org/security/2022/dsa-5178"},{"reference_url":"https://www.debian.org/security/2022/dsa-5184","reference_id":"dsa-5184","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/"}],"url":"https://www.debian.org/security/2022/dsa-5184"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV/","reference_id":"FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV/"},{"reference_url":"https://security.gentoo.org/glsa/202208-23","reference_id":"GLSA-202208-23","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/"}],"url":"https://security.gentoo.org/glsa/202208-23"},{"reference_url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html","reference_id":"intel-sa-00615.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/"}],"url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS/","reference_id":"MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220624-0008/","reference_id":"ntap-20220624-0008","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220624-0008/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5937","reference_id":"RHSA-2022:5937","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5937"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5939","reference_id":"RHSA-2022:5939","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5939"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6437","reference_id":"RHSA-2022:6437","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6437"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6460","reference_id":"RHSA-2022:6460","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6460"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6872","reference_id":"RHSA-2022:6872","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6872"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6983","reference_id":"RHSA-2022:6983","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6983"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6991","reference_id":"RHSA-2022:6991","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6991"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7279","reference_id":"RHSA-2022:7279","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7279"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7280","reference_id":"RHSA-2022:7280","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7280"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7933","reference_id":"RHSA-2022:7933","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7933"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8267","reference_id":"RHSA-2022:8267","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8267"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8973","reference_id":"RHSA-2022:8973","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8973"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8974","reference_id":"RHSA-2022:8974","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8974"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q/","reference_id":"RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA/","reference_id":"T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA/"},{"reference_url":"https://usn.ubuntu.com/5484-1/","reference_id":"USN-5484-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5484-1/"},{"reference_url":"https://usn.ubuntu.com/5485-1/","reference_id":"USN-5485-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5485-1/"},{"reference_url":"https://usn.ubuntu.com/5485-2/","reference_id":"USN-5485-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5485-2/"},{"reference_url":"https://usn.ubuntu.com/5505-1/","reference_id":"USN-5505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5505-1/"},{"reference_url":"https://usn.ubuntu.com/5513-1/","reference_id":"USN-5513-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5513-1/"},{"reference_url":"https://usn.ubuntu.com/5529-1/","reference_id":"USN-5529-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5529-1/"},{"reference_url":"https://usn.ubuntu.com/5535-1/","reference_id":"USN-5535-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5535-1/"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-404.html","reference_id":"XSA-404","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-404.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2022-21125"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-td6e-x2qb-syg3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4277?format=json","vulnerability_id":"VCID-uunr-69dt-q7fn","summary":"long running loops in grant table handling","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-28698","reference_id":"","reference_type":"","scores":[{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17302","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.175","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17663","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17709","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17429","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17522","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17582","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17596","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17549","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17497","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.1744","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17449","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17483","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17392","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17369","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-28698"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28694","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28694"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28695","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28695"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28696","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28696"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28697","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28697"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28698","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28698"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28699","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28699"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28700","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28700"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28701","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28701"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.gentoo.org/glsa/202208-23","reference_id":"GLSA-202208-23","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-23"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-380.html","reference_id":"XSA-380","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-380.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2021-28698","XSA-380"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uunr-69dt-q7fn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4213?format=json","vulnerability_id":"VCID-uvcp-ad38-2kcs","summary":"Xenstore: wrong path length check","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-29482","reference_id":"","reference_type":"","scores":[{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19777","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19953","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20099","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20157","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19886","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19965","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20019","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20038","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19993","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19936","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19919","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19923","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.1992","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19812","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19807","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-29482"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29479","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29479"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29481","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29481"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29482","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29482"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29483","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29483"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29484","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29484"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29485","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29485"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29486","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29486"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29566","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29566"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29570","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29570"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29571","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29571"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-323.html","reference_id":"XSA-323","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-323.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037808?format=json","purl":"pkg:deb/debian/xen@4.11.4%2B107-gef32c7afa2-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1wgc-r96w-7kg9"},{"vulnerability":"VCID-1wtd-67ef-1qej"},{"vulnerability":"VCID-1x3w-n7ms-eqeh"},{"vulnerability":"VCID-28t2-hng7-tfe5"},{"vulnerability":"VCID-2n9p-6t7s-kqc5"},{"vulnerability":"VCID-2uap-2vm1-efcr"},{"vulnerability":"VCID-32w3-vmcb-wfd9"},{"vulnerability":"VCID-34gr-dtsz-1fab"},{"vulnerability":"VCID-34ng-ftbx-e3cm"},{"vulnerability":"VCID-39t8-p1q7-eyag"},{"vulnerability":"VCID-3d53-4qtr-myhm"},{"vulnerability":"VCID-3pxf-xndw-5fft"},{"vulnerability":"VCID-3whm-8fyv-zyhd"},{"vulnerability":"VCID-416b-93m6-jyby"},{"vulnerability":"VCID-42ma-8ash-j7c8"},{"vulnerability":"VCID-4429-qf2w-jqg3"},{"vulnerability":"VCID-4spa-usqt-93b2"},{"vulnerability":"VCID-5cw7-rv5f-jfaq"},{"vulnerability":"VCID-5dbd-kz24-6fc1"},{"vulnerability":"VCID-6kh6-edk7-xkcc"},{"vulnerability":"VCID-6xbp-t4qh-tbhv"},{"vulnerability":"VCID-77st-3475-5kdr"},{"vulnerability":"VCID-7d5b-66n7-zbe1"},{"vulnerability":"VCID-7ek3-weqx-9fhs"},{"vulnerability":"VCID-7etc-u5ya-zued"},{"vulnerability":"VCID-7t5h-jy8h-t3d4"},{"vulnerability":"VCID-7wyt-uh2c-a3ha"},{"vulnerability":"VCID-7ysh-usku-c3dz"},{"vulnerability":"VCID-7zpj-3par-s3b5"},{"vulnerability":"VCID-87tq-2me2-d3bb"},{"vulnerability":"VCID-8cb8-vq2c-q3e9"},{"vulnerability":"VCID-8r8y-8bq2-jufj"},{"vulnerability":"VCID-91hk-73kq-83g6"},{"vulnerability":"VCID-9hr5-p18q-7qb8"},{"vulnerability":"VCID-9s43-gewn-bycc"},{"vulnerability":"VCID-9zqd-3x84-43gc"},{"vulnerability":"VCID-az8d-xrb4-3ug4"},{"vulnerability":"VCID-b7tb-ns1t-fyaw"},{"vulnerability":"VCID-bc6f-wu8g-5yb4"},{"vulnerability":"VCID-bs56-1z79-uqbt"},{"vulnerability":"VCID-bxae-85uh-uyek"},{"vulnerability":"VCID-bxb7-7gpw-qybb"},{"vulnerability":"VCID-bzve-5gwu-8ydb"},{"vulnerability":"VCID-csy7-esn4-u3gq"},{"vulnerability":"VCID-d3ad-6tme-bfem"},{"vulnerability":"VCID-dfjm-gwzm-jqbt"},{"vulnerability":"VCID-dgm4-ye4m-1fcq"},{"vulnerability":"VCID-dj1v-h79p-9ydz"},{"vulnerability":"VCID-dqy9-zkvw-e3gk"},{"vulnerability":"VCID-drhd-ytb7-u3em"},{"vulnerability":"VCID-e96u-uwba-kfg5"},{"vulnerability":"VCID-eb8v-p31a-yuhu"},{"vulnerability":"VCID-eka3-u8e5-3uad"},{"vulnerability":"VCID-ep7n-um5m-ekgk"},{"vulnerability":"VCID-fekb-fbhz-y7g7"},{"vulnerability":"VCID-fhbs-3nvf-tbha"},{"vulnerability":"VCID-fqt9-2esb-ffan"},{"vulnerability":"VCID-g72t-7kx1-abcs"},{"vulnerability":"VCID-gdsj-4cbx-ufep"},{"vulnerability":"VCID-gj1u-mbaj-kyc5"},{"vulnerability":"VCID-h9c6-yw5r-v3ex"},{"vulnerability":"VCID-hg4z-ad3f-fbc2"},{"vulnerability":"VCID-hsau-swt9-kyf7"},{"vulnerability":"VCID-hx7j-eymk-4ygk"},{"vulnerability":"VCID-hyup-47wa-pfac"},{"vulnerability":"VCID-jwdv-qe4x-yfgw"},{"vulnerability":"VCID-k5j4-3xmv-a7bk"},{"vulnerability":"VCID-kcj6-ua4t-ybgj"},{"vulnerability":"VCID-knqd-zktw-cydm"},{"vulnerability":"VCID-mcs2-ndqd-tydv"},{"vulnerability":"VCID-mf8g-nbkw-f7gr"},{"vulnerability":"VCID-n3t2-m6br-ufb3"},{"vulnerability":"VCID-n7pg-b7kc-wkew"},{"vulnerability":"VCID-ndz3-372h-8fhk"},{"vulnerability":"VCID-p3uc-18e9-skb4"},{"vulnerability":"VCID-p7ug-wwk5-63gb"},{"vulnerability":"VCID-pb8n-hmsc-syfw"},{"vulnerability":"VCID-pphm-ygb7-q7g2"},{"vulnerability":"VCID-pzt3-abab-4kdd"},{"vulnerability":"VCID-qnew-xqte-kbej"},{"vulnerability":"VCID-qprv-989b-k3d3"},{"vulnerability":"VCID-s4nf-p69f-pue8"},{"vulnerability":"VCID-td6e-x2qb-syg3"},{"vulnerability":"VCID-uunr-69dt-q7fn"},{"vulnerability":"VCID-uvcp-ad38-2kcs"},{"vulnerability":"VCID-vb2u-yc2z-ayh5"},{"vulnerability":"VCID-vs9k-akwv-h3ak"},{"vulnerability":"VCID-w2ch-guy5-6ye9"},{"vulnerability":"VCID-wh75-sc4f-qqc1"},{"vulnerability":"VCID-xcvw-eex8-j3bf"},{"vulnerability":"VCID-xe4j-gg7f-wyfa"},{"vulnerability":"VCID-z3g4-1vhq-97dj"},{"vulnerability":"VCID-z3qj-cnxq-pkgq"},{"vulnerability":"VCID-z8zf-cqkb-guge"},{"vulnerability":"VCID-zkyv-h5at-xkgq"},{"vulnerability":"VCID-zrxf-3w1d-t3ba"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.4%252B107-gef32c7afa2-1"},{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2020-29482","XSA-323"],"risk_score":0.9,"exploitability":"0.5","weighted_severity":"1.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uvcp-ad38-2kcs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4237?format=json","vulnerability_id":"VCID-vb2u-yc2z-ayh5","summary":"Missing memory barriers when accessing/allocating an event channel","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25603.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25603.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-25603","reference_id":"","reference_type":"","scores":[{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21923","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22085","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22135","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21911","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21992","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22047","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22062","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22021","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21961","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.2196","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21956","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21913","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21767","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21755","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21747","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-25603"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25595","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25595"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25596","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25596"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25602","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25602"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25603","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25603"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25604","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25604"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1877366","reference_id":"1877366","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1877366"},{"reference_url":"https://security.gentoo.org/glsa/202011-06","reference_id":"GLSA-202011-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202011-06"},{"reference_url":"https://usn.ubuntu.com/5617-1/","reference_id":"USN-5617-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5617-1/"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-340.html","reference_id":"XSA-340","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-340.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037808?format=json","purl":"pkg:deb/debian/xen@4.11.4%2B107-gef32c7afa2-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1wgc-r96w-7kg9"},{"vulnerability":"VCID-1wtd-67ef-1qej"},{"vulnerability":"VCID-1x3w-n7ms-eqeh"},{"vulnerability":"VCID-28t2-hng7-tfe5"},{"vulnerability":"VCID-2n9p-6t7s-kqc5"},{"vulnerability":"VCID-2uap-2vm1-efcr"},{"vulnerability":"VCID-32w3-vmcb-wfd9"},{"vulnerability":"VCID-34gr-dtsz-1fab"},{"vulnerability":"VCID-34ng-ftbx-e3cm"},{"vulnerability":"VCID-39t8-p1q7-eyag"},{"vulnerability":"VCID-3d53-4qtr-myhm"},{"vulnerability":"VCID-3pxf-xndw-5fft"},{"vulnerability":"VCID-3whm-8fyv-zyhd"},{"vulnerability":"VCID-416b-93m6-jyby"},{"vulnerability":"VCID-42ma-8ash-j7c8"},{"vulnerability":"VCID-4429-qf2w-jqg3"},{"vulnerability":"VCID-4spa-usqt-93b2"},{"vulnerability":"VCID-5cw7-rv5f-jfaq"},{"vulnerability":"VCID-5dbd-kz24-6fc1"},{"vulnerability":"VCID-6kh6-edk7-xkcc"},{"vulnerability":"VCID-6xbp-t4qh-tbhv"},{"vulnerability":"VCID-77st-3475-5kdr"},{"vulnerability":"VCID-7d5b-66n7-zbe1"},{"vulnerability":"VCID-7ek3-weqx-9fhs"},{"vulnerability":"VCID-7etc-u5ya-zued"},{"vulnerability":"VCID-7t5h-jy8h-t3d4"},{"vulnerability":"VCID-7wyt-uh2c-a3ha"},{"vulnerability":"VCID-7ysh-usku-c3dz"},{"vulnerability":"VCID-7zpj-3par-s3b5"},{"vulnerability":"VCID-87tq-2me2-d3bb"},{"vulnerability":"VCID-8cb8-vq2c-q3e9"},{"vulnerability":"VCID-8r8y-8bq2-jufj"},{"vulnerability":"VCID-91hk-73kq-83g6"},{"vulnerability":"VCID-9hr5-p18q-7qb8"},{"vulnerability":"VCID-9s43-gewn-bycc"},{"vulnerability":"VCID-9zqd-3x84-43gc"},{"vulnerability":"VCID-az8d-xrb4-3ug4"},{"vulnerability":"VCID-b7tb-ns1t-fyaw"},{"vulnerability":"VCID-bc6f-wu8g-5yb4"},{"vulnerability":"VCID-bs56-1z79-uqbt"},{"vulnerability":"VCID-bxae-85uh-uyek"},{"vulnerability":"VCID-bxb7-7gpw-qybb"},{"vulnerability":"VCID-bzve-5gwu-8ydb"},{"vulnerability":"VCID-csy7-esn4-u3gq"},{"vulnerability":"VCID-d3ad-6tme-bfem"},{"vulnerability":"VCID-dfjm-gwzm-jqbt"},{"vulnerability":"VCID-dgm4-ye4m-1fcq"},{"vulnerability":"VCID-dj1v-h79p-9ydz"},{"vulnerability":"VCID-dqy9-zkvw-e3gk"},{"vulnerability":"VCID-drhd-ytb7-u3em"},{"vulnerability":"VCID-e96u-uwba-kfg5"},{"vulnerability":"VCID-eb8v-p31a-yuhu"},{"vulnerability":"VCID-eka3-u8e5-3uad"},{"vulnerability":"VCID-ep7n-um5m-ekgk"},{"vulnerability":"VCID-fekb-fbhz-y7g7"},{"vulnerability":"VCID-fhbs-3nvf-tbha"},{"vulnerability":"VCID-fqt9-2esb-ffan"},{"vulnerability":"VCID-g72t-7kx1-abcs"},{"vulnerability":"VCID-gdsj-4cbx-ufep"},{"vulnerability":"VCID-gj1u-mbaj-kyc5"},{"vulnerability":"VCID-h9c6-yw5r-v3ex"},{"vulnerability":"VCID-hg4z-ad3f-fbc2"},{"vulnerability":"VCID-hsau-swt9-kyf7"},{"vulnerability":"VCID-hx7j-eymk-4ygk"},{"vulnerability":"VCID-hyup-47wa-pfac"},{"vulnerability":"VCID-jwdv-qe4x-yfgw"},{"vulnerability":"VCID-k5j4-3xmv-a7bk"},{"vulnerability":"VCID-kcj6-ua4t-ybgj"},{"vulnerability":"VCID-knqd-zktw-cydm"},{"vulnerability":"VCID-mcs2-ndqd-tydv"},{"vulnerability":"VCID-mf8g-nbkw-f7gr"},{"vulnerability":"VCID-n3t2-m6br-ufb3"},{"vulnerability":"VCID-n7pg-b7kc-wkew"},{"vulnerability":"VCID-ndz3-372h-8fhk"},{"vulnerability":"VCID-p3uc-18e9-skb4"},{"vulnerability":"VCID-p7ug-wwk5-63gb"},{"vulnerability":"VCID-pb8n-hmsc-syfw"},{"vulnerability":"VCID-pphm-ygb7-q7g2"},{"vulnerability":"VCID-pzt3-abab-4kdd"},{"vulnerability":"VCID-qnew-xqte-kbej"},{"vulnerability":"VCID-qprv-989b-k3d3"},{"vulnerability":"VCID-s4nf-p69f-pue8"},{"vulnerability":"VCID-td6e-x2qb-syg3"},{"vulnerability":"VCID-uunr-69dt-q7fn"},{"vulnerability":"VCID-uvcp-ad38-2kcs"},{"vulnerability":"VCID-vb2u-yc2z-ayh5"},{"vulnerability":"VCID-vs9k-akwv-h3ak"},{"vulnerability":"VCID-w2ch-guy5-6ye9"},{"vulnerability":"VCID-wh75-sc4f-qqc1"},{"vulnerability":"VCID-xcvw-eex8-j3bf"},{"vulnerability":"VCID-xe4j-gg7f-wyfa"},{"vulnerability":"VCID-z3g4-1vhq-97dj"},{"vulnerability":"VCID-z3qj-cnxq-pkgq"},{"vulnerability":"VCID-z8zf-cqkb-guge"},{"vulnerability":"VCID-zkyv-h5at-xkgq"},{"vulnerability":"VCID-zrxf-3w1d-t3ba"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.4%252B107-gef32c7afa2-1"},{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2020-25603","XSA-340"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vb2u-yc2z-ayh5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4296?format=json","vulnerability_id":"VCID-vs9k-akwv-h3ak","summary":"A PV guest could DoS Xen while unmapping a grant","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23034.json","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23034.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-23034","reference_id":"","reference_type":"","scores":[{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28729","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28776","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28584","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28649","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28689","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28691","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28647","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.286","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28619","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28594","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28545","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28429","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28317","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28241","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-23034"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23033","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23033"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23034","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23034"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23035","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23035"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26356","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26356"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26357","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26357"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26358","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26358"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26359","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26359"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26360","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26360"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26361","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26361"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2045041","reference_id":"2045041","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2045041"},{"reference_url":"https://security.gentoo.org/glsa/202208-23","reference_id":"GLSA-202208-23","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-23"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-394.html","reference_id":"XSA-394","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-394.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2022-23034","XSA-394"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vs9k-akwv-h3ak"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4297?format=json","vulnerability_id":"VCID-w2ch-guy5-6ye9","summary":"Insufficient cleanup of passed-through device IRQs","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23035.json","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23035.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-23035","reference_id":"","reference_type":"","scores":[{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30255","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30304","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.3012","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.3018","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30215","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30218","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30175","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30128","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30143","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30125","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30079","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30009","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.29894","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.29824","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-23035"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23033","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23033"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23034","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23034"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23035","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23035"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26356","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26356"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26357","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26357"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26358","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26358"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26359","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26359"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26360","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26360"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26361","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26361"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2045039","reference_id":"2045039","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2045039"},{"reference_url":"https://security.gentoo.org/glsa/202208-23","reference_id":"GLSA-202208-23","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-23"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-395.html","reference_id":"XSA-395","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-395.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2022-23035","XSA-395"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w2ch-guy5-6ye9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4340?format=json","vulnerability_id":"VCID-wh75-sc4f-qqc1","summary":"Xenstore: Guests can create arbitrary number of nodes via transactions","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42325","reference_id":"","reference_type":"","scores":[{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09802","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09727","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09776","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09681","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09752","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11254","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11455","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11422","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11393","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11255","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.11947","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12097","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12075","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12043","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42325"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.gentoo.org/glsa/202402-07","reference_id":"GLSA-202402-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-07"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-421.html","reference_id":"XSA-421","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-421.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2022-42325","XSA-421"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wh75-sc4f-qqc1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4285?format=json","vulnerability_id":"VCID-xcvw-eex8-j3bf","summary":"PoD operations on misaligned GFNs","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-28707","reference_id":"","reference_type":"","scores":[{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24599","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24807","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24885","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24925","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.247","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24767","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24813","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24827","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24787","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.2473","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24745","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24737","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24714","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24654","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24643","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-28707"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28702","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28702"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28704","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28704"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28705","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28705"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28706","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28706"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28707","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28707"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28708","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28708"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28709","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28709"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.gentoo.org/glsa/202402-07","reference_id":"GLSA-202402-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-07"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-388.html","reference_id":"XSA-388","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-388.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2021-28707"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xcvw-eex8-j3bf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4239?format=json","vulnerability_id":"VCID-xe4j-gg7f-wyfa","summary":"races with evtchn_reset()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25599.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25599.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-25599","reference_id":"","reference_type":"","scores":[{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22299","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22465","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.2251","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22381","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22436","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22457","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22416","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.2236","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22379","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22375","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22323","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22174","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22161","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22154","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-25599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25595","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25595"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25596","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25596"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25602","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25602"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25603","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25603"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25604","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25604"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1879567","reference_id":"1879567","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1879567"},{"reference_url":"https://security.gentoo.org/glsa/202011-06","reference_id":"GLSA-202011-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202011-06"},{"reference_url":"https://usn.ubuntu.com/5617-1/","reference_id":"USN-5617-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5617-1/"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-343.html","reference_id":"XSA-343","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-343.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037808?format=json","purl":"pkg:deb/debian/xen@4.11.4%2B107-gef32c7afa2-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1wgc-r96w-7kg9"},{"vulnerability":"VCID-1wtd-67ef-1qej"},{"vulnerability":"VCID-1x3w-n7ms-eqeh"},{"vulnerability":"VCID-28t2-hng7-tfe5"},{"vulnerability":"VCID-2n9p-6t7s-kqc5"},{"vulnerability":"VCID-2uap-2vm1-efcr"},{"vulnerability":"VCID-32w3-vmcb-wfd9"},{"vulnerability":"VCID-34gr-dtsz-1fab"},{"vulnerability":"VCID-34ng-ftbx-e3cm"},{"vulnerability":"VCID-39t8-p1q7-eyag"},{"vulnerability":"VCID-3d53-4qtr-myhm"},{"vulnerability":"VCID-3pxf-xndw-5fft"},{"vulnerability":"VCID-3whm-8fyv-zyhd"},{"vulnerability":"VCID-416b-93m6-jyby"},{"vulnerability":"VCID-42ma-8ash-j7c8"},{"vulnerability":"VCID-4429-qf2w-jqg3"},{"vulnerability":"VCID-4spa-usqt-93b2"},{"vulnerability":"VCID-5cw7-rv5f-jfaq"},{"vulnerability":"VCID-5dbd-kz24-6fc1"},{"vulnerability":"VCID-6kh6-edk7-xkcc"},{"vulnerability":"VCID-6xbp-t4qh-tbhv"},{"vulnerability":"VCID-77st-3475-5kdr"},{"vulnerability":"VCID-7d5b-66n7-zbe1"},{"vulnerability":"VCID-7ek3-weqx-9fhs"},{"vulnerability":"VCID-7etc-u5ya-zued"},{"vulnerability":"VCID-7t5h-jy8h-t3d4"},{"vulnerability":"VCID-7wyt-uh2c-a3ha"},{"vulnerability":"VCID-7ysh-usku-c3dz"},{"vulnerability":"VCID-7zpj-3par-s3b5"},{"vulnerability":"VCID-87tq-2me2-d3bb"},{"vulnerability":"VCID-8cb8-vq2c-q3e9"},{"vulnerability":"VCID-8r8y-8bq2-jufj"},{"vulnerability":"VCID-91hk-73kq-83g6"},{"vulnerability":"VCID-9hr5-p18q-7qb8"},{"vulnerability":"VCID-9s43-gewn-bycc"},{"vulnerability":"VCID-9zqd-3x84-43gc"},{"vulnerability":"VCID-az8d-xrb4-3ug4"},{"vulnerability":"VCID-b7tb-ns1t-fyaw"},{"vulnerability":"VCID-bc6f-wu8g-5yb4"},{"vulnerability":"VCID-bs56-1z79-uqbt"},{"vulnerability":"VCID-bxae-85uh-uyek"},{"vulnerability":"VCID-bxb7-7gpw-qybb"},{"vulnerability":"VCID-bzve-5gwu-8ydb"},{"vulnerability":"VCID-csy7-esn4-u3gq"},{"vulnerability":"VCID-d3ad-6tme-bfem"},{"vulnerability":"VCID-dfjm-gwzm-jqbt"},{"vulnerability":"VCID-dgm4-ye4m-1fcq"},{"vulnerability":"VCID-dj1v-h79p-9ydz"},{"vulnerability":"VCID-dqy9-zkvw-e3gk"},{"vulnerability":"VCID-drhd-ytb7-u3em"},{"vulnerability":"VCID-e96u-uwba-kfg5"},{"vulnerability":"VCID-eb8v-p31a-yuhu"},{"vulnerability":"VCID-eka3-u8e5-3uad"},{"vulnerability":"VCID-ep7n-um5m-ekgk"},{"vulnerability":"VCID-fekb-fbhz-y7g7"},{"vulnerability":"VCID-fhbs-3nvf-tbha"},{"vulnerability":"VCID-fqt9-2esb-ffan"},{"vulnerability":"VCID-g72t-7kx1-abcs"},{"vulnerability":"VCID-gdsj-4cbx-ufep"},{"vulnerability":"VCID-gj1u-mbaj-kyc5"},{"vulnerability":"VCID-h9c6-yw5r-v3ex"},{"vulnerability":"VCID-hg4z-ad3f-fbc2"},{"vulnerability":"VCID-hsau-swt9-kyf7"},{"vulnerability":"VCID-hx7j-eymk-4ygk"},{"vulnerability":"VCID-hyup-47wa-pfac"},{"vulnerability":"VCID-jwdv-qe4x-yfgw"},{"vulnerability":"VCID-k5j4-3xmv-a7bk"},{"vulnerability":"VCID-kcj6-ua4t-ybgj"},{"vulnerability":"VCID-knqd-zktw-cydm"},{"vulnerability":"VCID-mcs2-ndqd-tydv"},{"vulnerability":"VCID-mf8g-nbkw-f7gr"},{"vulnerability":"VCID-n3t2-m6br-ufb3"},{"vulnerability":"VCID-n7pg-b7kc-wkew"},{"vulnerability":"VCID-ndz3-372h-8fhk"},{"vulnerability":"VCID-p3uc-18e9-skb4"},{"vulnerability":"VCID-p7ug-wwk5-63gb"},{"vulnerability":"VCID-pb8n-hmsc-syfw"},{"vulnerability":"VCID-pphm-ygb7-q7g2"},{"vulnerability":"VCID-pzt3-abab-4kdd"},{"vulnerability":"VCID-qnew-xqte-kbej"},{"vulnerability":"VCID-qprv-989b-k3d3"},{"vulnerability":"VCID-s4nf-p69f-pue8"},{"vulnerability":"VCID-td6e-x2qb-syg3"},{"vulnerability":"VCID-uunr-69dt-q7fn"},{"vulnerability":"VCID-uvcp-ad38-2kcs"},{"vulnerability":"VCID-vb2u-yc2z-ayh5"},{"vulnerability":"VCID-vs9k-akwv-h3ak"},{"vulnerability":"VCID-w2ch-guy5-6ye9"},{"vulnerability":"VCID-wh75-sc4f-qqc1"},{"vulnerability":"VCID-xcvw-eex8-j3bf"},{"vulnerability":"VCID-xe4j-gg7f-wyfa"},{"vulnerability":"VCID-z3g4-1vhq-97dj"},{"vulnerability":"VCID-z3qj-cnxq-pkgq"},{"vulnerability":"VCID-z8zf-cqkb-guge"},{"vulnerability":"VCID-zkyv-h5at-xkgq"},{"vulnerability":"VCID-zrxf-3w1d-t3ba"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.4%252B107-gef32c7afa2-1"},{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2020-25599","XSA-343"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xe4j-gg7f-wyfa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4341?format=json","vulnerability_id":"VCID-z3g4-1vhq-97dj","summary":"Xenstore: Guests can create arbitrary number of nodes via transactions","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42326","reference_id":"","reference_type":"","scores":[{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09583","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09534","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09618","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.0957","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09496","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11257","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11071","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11062","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11198","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11224","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11792","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11663","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11746","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11824","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42326"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2022/11/01/11","reference_id":"11","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-05T15:05:04Z/"}],"url":"http://www.openwall.com/lists/oss-security/2022/11/01/11"},{"reference_url":"http://xenbits.xen.org/xsa/advisory-421.html","reference_id":"advisory-421.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-05T15:05:04Z/"}],"url":"http://xenbits.xen.org/xsa/advisory-421.html"},{"reference_url":"https://xenbits.xenproject.org/xsa/advisory-421.txt","reference_id":"advisory-421.txt","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-05T15:05:04Z/"}],"url":"https://xenbits.xenproject.org/xsa/advisory-421.txt"},{"reference_url":"https://www.debian.org/security/2022/dsa-5272","reference_id":"dsa-5272","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-05T15:05:04Z/"}],"url":"https://www.debian.org/security/2022/dsa-5272"},{"reference_url":"https://security.gentoo.org/glsa/202402-07","reference_id":"GLSA-202402-07","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-05T15:05:04Z/"}],"url":"https://security.gentoo.org/glsa/202402-07"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-421.html","reference_id":"XSA-421","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-421.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/","reference_id":"YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-05T15:05:04Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/","reference_id":"YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-05T15:05:04Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/","reference_id":"ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-05T15:05:04Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2022-42326"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-z3g4-1vhq-97dj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4281?format=json","vulnerability_id":"VCID-z3qj-cnxq-pkgq","summary":"guests may exceed their designated memory limit","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-28706","reference_id":"","reference_type":"","scores":[{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.35862","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.3616","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36355","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36388","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36222","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36271","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36294","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36299","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36262","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36238","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36282","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36266","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36214","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.35982","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.35949","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-28706"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28702","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28702"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28704","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28704"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28705","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28705"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28706","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28706"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28707","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28707"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28708","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28708"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28709","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28709"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.gentoo.org/glsa/202402-07","reference_id":"GLSA-202402-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-07"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-385.html","reference_id":"XSA-385","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-385.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2021-28706","XSA-385"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-z3qj-cnxq-pkgq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4309?format=json","vulnerability_id":"VCID-z8zf-cqkb-guge","summary":"IOMMU: RMRR (VT-d) and unity map (AMD-Vi) handling issues","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26360","reference_id":"","reference_type":"","scores":[{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31052","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31574","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31618","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31437","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.3149","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31519","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31523","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31481","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31444","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31479","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31457","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31426","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31257","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31132","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26360"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23033","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23033"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23034","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23034"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23035","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23035"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26356","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26356"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26357","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26357"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26358","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26358"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26359","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26359"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26360","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26360"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26361","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26361"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.gentoo.org/glsa/202402-07","reference_id":"GLSA-202402-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-07"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-400.html","reference_id":"XSA-400","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-400.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2022-26360","XSA-400"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-z8zf-cqkb-guge"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4324?format=json","vulnerability_id":"VCID-zkyv-h5at-xkgq","summary":"Retbleed - arbitrary speculative code execution with return instructions","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23825.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23825.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-23825","reference_id":"","reference_type":"","scores":[{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.3369","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33723","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33561","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33605","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33638","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33633","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33591","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33569","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33602","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33578","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33546","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33387","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33368","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33286","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-23825"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2103153","reference_id":"2103153","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2103153"},{"reference_url":"https://security.gentoo.org/glsa/202402-07","reference_id":"GLSA-202402-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7110","reference_id":"RHSA-2022:7110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7134","reference_id":"RHSA-2022:7134","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7134"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7337","reference_id":"RHSA-2022:7337","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7337"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7338","reference_id":"RHSA-2022:7338","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7338"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7933","reference_id":"RHSA-2022:7933","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7933"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8267","reference_id":"RHSA-2022:8267","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8267"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8973","reference_id":"RHSA-2022:8973","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8973"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8974","reference_id":"RHSA-2022:8974","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8974"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-407.html","reference_id":"XSA-407","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-407.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2022-23825","XSA-407"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zkyv-h5at-xkgq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4247?format=json","vulnerability_id":"VCID-zrxf-3w1d-t3ba","summary":"Information leak via power sidechannel","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-28368.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-28368.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-28368","reference_id":"","reference_type":"","scores":[{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20591","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20734","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20793","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20512","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20589","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20648","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20668","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20626","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20574","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20559","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20556","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20551","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20436","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20435","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20404","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-28368"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27670","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27670"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27671","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27671"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27672","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27672"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27674","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27674"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28368","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28368"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1897145","reference_id":"1897145","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1897145"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-351.html","reference_id":"XSA-351","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-351.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037808?format=json","purl":"pkg:deb/debian/xen@4.11.4%2B107-gef32c7afa2-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1wgc-r96w-7kg9"},{"vulnerability":"VCID-1wtd-67ef-1qej"},{"vulnerability":"VCID-1x3w-n7ms-eqeh"},{"vulnerability":"VCID-28t2-hng7-tfe5"},{"vulnerability":"VCID-2n9p-6t7s-kqc5"},{"vulnerability":"VCID-2uap-2vm1-efcr"},{"vulnerability":"VCID-32w3-vmcb-wfd9"},{"vulnerability":"VCID-34gr-dtsz-1fab"},{"vulnerability":"VCID-34ng-ftbx-e3cm"},{"vulnerability":"VCID-39t8-p1q7-eyag"},{"vulnerability":"VCID-3d53-4qtr-myhm"},{"vulnerability":"VCID-3pxf-xndw-5fft"},{"vulnerability":"VCID-3whm-8fyv-zyhd"},{"vulnerability":"VCID-416b-93m6-jyby"},{"vulnerability":"VCID-42ma-8ash-j7c8"},{"vulnerability":"VCID-4429-qf2w-jqg3"},{"vulnerability":"VCID-4spa-usqt-93b2"},{"vulnerability":"VCID-5cw7-rv5f-jfaq"},{"vulnerability":"VCID-5dbd-kz24-6fc1"},{"vulnerability":"VCID-6kh6-edk7-xkcc"},{"vulnerability":"VCID-6xbp-t4qh-tbhv"},{"vulnerability":"VCID-77st-3475-5kdr"},{"vulnerability":"VCID-7d5b-66n7-zbe1"},{"vulnerability":"VCID-7ek3-weqx-9fhs"},{"vulnerability":"VCID-7etc-u5ya-zued"},{"vulnerability":"VCID-7t5h-jy8h-t3d4"},{"vulnerability":"VCID-7wyt-uh2c-a3ha"},{"vulnerability":"VCID-7ysh-usku-c3dz"},{"vulnerability":"VCID-7zpj-3par-s3b5"},{"vulnerability":"VCID-87tq-2me2-d3bb"},{"vulnerability":"VCID-8cb8-vq2c-q3e9"},{"vulnerability":"VCID-8r8y-8bq2-jufj"},{"vulnerability":"VCID-91hk-73kq-83g6"},{"vulnerability":"VCID-9hr5-p18q-7qb8"},{"vulnerability":"VCID-9s43-gewn-bycc"},{"vulnerability":"VCID-9zqd-3x84-43gc"},{"vulnerability":"VCID-az8d-xrb4-3ug4"},{"vulnerability":"VCID-b7tb-ns1t-fyaw"},{"vulnerability":"VCID-bc6f-wu8g-5yb4"},{"vulnerability":"VCID-bs56-1z79-uqbt"},{"vulnerability":"VCID-bxae-85uh-uyek"},{"vulnerability":"VCID-bxb7-7gpw-qybb"},{"vulnerability":"VCID-bzve-5gwu-8ydb"},{"vulnerability":"VCID-csy7-esn4-u3gq"},{"vulnerability":"VCID-d3ad-6tme-bfem"},{"vulnerability":"VCID-dfjm-gwzm-jqbt"},{"vulnerability":"VCID-dgm4-ye4m-1fcq"},{"vulnerability":"VCID-dj1v-h79p-9ydz"},{"vulnerability":"VCID-dqy9-zkvw-e3gk"},{"vulnerability":"VCID-drhd-ytb7-u3em"},{"vulnerability":"VCID-e96u-uwba-kfg5"},{"vulnerability":"VCID-eb8v-p31a-yuhu"},{"vulnerability":"VCID-eka3-u8e5-3uad"},{"vulnerability":"VCID-ep7n-um5m-ekgk"},{"vulnerability":"VCID-fekb-fbhz-y7g7"},{"vulnerability":"VCID-fhbs-3nvf-tbha"},{"vulnerability":"VCID-fqt9-2esb-ffan"},{"vulnerability":"VCID-g72t-7kx1-abcs"},{"vulnerability":"VCID-gdsj-4cbx-ufep"},{"vulnerability":"VCID-gj1u-mbaj-kyc5"},{"vulnerability":"VCID-h9c6-yw5r-v3ex"},{"vulnerability":"VCID-hg4z-ad3f-fbc2"},{"vulnerability":"VCID-hsau-swt9-kyf7"},{"vulnerability":"VCID-hx7j-eymk-4ygk"},{"vulnerability":"VCID-hyup-47wa-pfac"},{"vulnerability":"VCID-jwdv-qe4x-yfgw"},{"vulnerability":"VCID-k5j4-3xmv-a7bk"},{"vulnerability":"VCID-kcj6-ua4t-ybgj"},{"vulnerability":"VCID-knqd-zktw-cydm"},{"vulnerability":"VCID-mcs2-ndqd-tydv"},{"vulnerability":"VCID-mf8g-nbkw-f7gr"},{"vulnerability":"VCID-n3t2-m6br-ufb3"},{"vulnerability":"VCID-n7pg-b7kc-wkew"},{"vulnerability":"VCID-ndz3-372h-8fhk"},{"vulnerability":"VCID-p3uc-18e9-skb4"},{"vulnerability":"VCID-p7ug-wwk5-63gb"},{"vulnerability":"VCID-pb8n-hmsc-syfw"},{"vulnerability":"VCID-pphm-ygb7-q7g2"},{"vulnerability":"VCID-pzt3-abab-4kdd"},{"vulnerability":"VCID-qnew-xqte-kbej"},{"vulnerability":"VCID-qprv-989b-k3d3"},{"vulnerability":"VCID-s4nf-p69f-pue8"},{"vulnerability":"VCID-td6e-x2qb-syg3"},{"vulnerability":"VCID-uunr-69dt-q7fn"},{"vulnerability":"VCID-uvcp-ad38-2kcs"},{"vulnerability":"VCID-vb2u-yc2z-ayh5"},{"vulnerability":"VCID-vs9k-akwv-h3ak"},{"vulnerability":"VCID-w2ch-guy5-6ye9"},{"vulnerability":"VCID-wh75-sc4f-qqc1"},{"vulnerability":"VCID-xcvw-eex8-j3bf"},{"vulnerability":"VCID-xe4j-gg7f-wyfa"},{"vulnerability":"VCID-z3g4-1vhq-97dj"},{"vulnerability":"VCID-z3qj-cnxq-pkgq"},{"vulnerability":"VCID-z8zf-cqkb-guge"},{"vulnerability":"VCID-zkyv-h5at-xkgq"},{"vulnerability":"VCID-zrxf-3w1d-t3ba"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.4%252B107-gef32c7afa2-1"},{"url":"http://public2.vulnerablecode.io/api/packages/994412?format=json","purl":"pkg:deb/debian/xen@4.14.6-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}],"aliases":["CVE-2020-28368","XSA-351"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zrxf-3w1d-t3ba"}],"risk_score":"3.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1"}