Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/libvirt@1.2.9-9
Typedeb
Namespacedebian
Namelibvirt
Version1.2.9-9
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version11.3.0-2~bpo12+1
Latest_non_vulnerable_version11.3.0-2~bpo12+1
Affected_by_vulnerabilities
0
url VCID-2ska-hmbg-kqdw
vulnerability_id VCID-2ska-hmbg-kqdw
summary Multiple vulnerabilities have been discovered in libvirt, the worst of which could lead to a denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2494.json
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2494.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-2494
reference_id
reference_type
scores
0
value 0.00026
scoring_system epss
scoring_elements 0.07188
published_at 2026-04-21T12:55:00Z
1
value 0.00026
scoring_system epss
scoring_elements 0.07082
published_at 2026-04-16T12:55:00Z
2
value 0.00026
scoring_system epss
scoring_elements 0.07136
published_at 2026-04-08T12:55:00Z
3
value 0.00026
scoring_system epss
scoring_elements 0.07168
published_at 2026-04-09T12:55:00Z
4
value 0.00026
scoring_system epss
scoring_elements 0.07165
published_at 2026-04-11T12:55:00Z
5
value 0.00026
scoring_system epss
scoring_elements 0.07155
published_at 2026-04-12T12:55:00Z
6
value 0.00026
scoring_system epss
scoring_elements 0.07146
published_at 2026-04-13T12:55:00Z
7
value 0.00026
scoring_system epss
scoring_elements 0.07058
published_at 2026-04-18T12:55:00Z
8
value 0.00028
scoring_system epss
scoring_elements 0.07851
published_at 2026-04-02T12:55:00Z
9
value 0.00028
scoring_system epss
scoring_elements 0.07899
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-2494
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2494
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1067461
reference_id 1067461
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1067461
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2270115
reference_id 2270115
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T15:14:30Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2270115
6
reference_url https://lists.libvirt.org/archives/list/devel@lists.libvirt.org/thread/BKRQXPLPC6B7FLHJXSBQYW7HNDEBW6RJ/
reference_id BKRQXPLPC6B7FLHJXSBQYW7HNDEBW6RJ
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T15:14:30Z/
url https://lists.libvirt.org/archives/list/devel@lists.libvirt.org/thread/BKRQXPLPC6B7FLHJXSBQYW7HNDEBW6RJ/
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_virtualization:8::el8
reference_id cpe:/a:redhat:advanced_virtualization:8::el8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_virtualization:8::el8
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
14
reference_url https://access.redhat.com/security/cve/CVE-2024-2494
reference_id CVE-2024-2494
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T15:14:30Z/
url https://access.redhat.com/security/cve/CVE-2024-2494
15
reference_url https://security.gentoo.org/glsa/202412-16
reference_id GLSA-202412-16
reference_type
scores
url https://security.gentoo.org/glsa/202412-16
16
reference_url https://access.redhat.com/errata/RHSA-2024:2560
reference_id RHSA-2024:2560
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T15:14:30Z/
url https://access.redhat.com/errata/RHSA-2024:2560
17
reference_url https://access.redhat.com/errata/RHSA-2024:3253
reference_id RHSA-2024:3253
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T15:14:30Z/
url https://access.redhat.com/errata/RHSA-2024:3253
18
reference_url https://usn.ubuntu.com/6734-1/
reference_id USN-6734-1
reference_type
scores
url https://usn.ubuntu.com/6734-1/
19
reference_url https://usn.ubuntu.com/6734-2/
reference_id USN-6734-2
reference_type
scores
url https://usn.ubuntu.com/6734-2/
fixed_packages
0
url pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3
purl pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ubdh-hdtv-akgt
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3
aliases CVE-2024-2494
risk_score 2.8
exploitability 0.5
weighted_severity 5.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2ska-hmbg-kqdw
1
url VCID-3xk5-72kc-5uhu
vulnerability_id VCID-3xk5-72kc-5uhu
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1064.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1064.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1064
reference_id
reference_type
scores
0
value 0.01419
scoring_system epss
scoring_elements 0.80523
published_at 2026-04-01T12:55:00Z
1
value 0.01419
scoring_system epss
scoring_elements 0.80529
published_at 2026-04-02T12:55:00Z
2
value 0.01419
scoring_system epss
scoring_elements 0.80552
published_at 2026-04-04T12:55:00Z
3
value 0.01419
scoring_system epss
scoring_elements 0.80543
published_at 2026-04-07T12:55:00Z
4
value 0.01419
scoring_system epss
scoring_elements 0.80572
published_at 2026-04-08T12:55:00Z
5
value 0.01419
scoring_system epss
scoring_elements 0.80582
published_at 2026-04-09T12:55:00Z
6
value 0.01419
scoring_system epss
scoring_elements 0.80599
published_at 2026-04-11T12:55:00Z
7
value 0.01419
scoring_system epss
scoring_elements 0.80586
published_at 2026-04-12T12:55:00Z
8
value 0.01419
scoring_system epss
scoring_elements 0.80578
published_at 2026-04-13T12:55:00Z
9
value 0.01419
scoring_system epss
scoring_elements 0.80606
published_at 2026-04-16T12:55:00Z
10
value 0.01419
scoring_system epss
scoring_elements 0.80608
published_at 2026-04-18T12:55:00Z
11
value 0.01419
scoring_system epss
scoring_elements 0.80612
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1064
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1064
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1550672
reference_id 1550672
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1550672
5
reference_url https://access.redhat.com/errata/RHSA-2018:1396
reference_id RHSA-2018:1396
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1396
6
reference_url https://access.redhat.com/errata/RHSA-2018:1929
reference_id RHSA-2018:1929
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1929
7
reference_url https://usn.ubuntu.com/3680-1/
reference_id USN-3680-1
reference_type
scores
url https://usn.ubuntu.com/3680-1/
fixed_packages
0
url pkg:deb/debian/libvirt@1.2.9-9%2Bdeb8u5
purl pkg:deb/debian/libvirt@1.2.9-9%2Bdeb8u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2ska-hmbg-kqdw
1
vulnerability VCID-3xk5-72kc-5uhu
2
vulnerability VCID-3zke-md7v-6be5
3
vulnerability VCID-425h-bz55-yfad
4
vulnerability VCID-4gha-yszs-x3hw
5
vulnerability VCID-5a7s-trej-63cj
6
vulnerability VCID-5pky-1svz-nqf6
7
vulnerability VCID-5ub6-8d2s-53hj
8
vulnerability VCID-8bqx-15w5-4kdm
9
vulnerability VCID-a5ed-jnjb-pybr
10
vulnerability VCID-b489-x5z3-pkfh
11
vulnerability VCID-bsjb-frkp-b3an
12
vulnerability VCID-c628-5r9h-37ad
13
vulnerability VCID-cue5-u48q-87ft
14
vulnerability VCID-e93r-zft5-33dk
15
vulnerability VCID-gc5z-hy4a-8uft
16
vulnerability VCID-gp93-s21f-8fh7
17
vulnerability VCID-hpgc-t8mr-qkan
18
vulnerability VCID-ju7x-j33y-8khv
19
vulnerability VCID-nfem-925f-bfdw
20
vulnerability VCID-nqd8-35a9-7bc5
21
vulnerability VCID-pqce-1qud-kbef
22
vulnerability VCID-r65y-py21-u3eu
23
vulnerability VCID-re7g-2nvj-j3dp
24
vulnerability VCID-smdn-m8vh-9bb8
25
vulnerability VCID-wf9y-4uwu-gkaz
26
vulnerability VCID-whhu-jy51-qkec
27
vulnerability VCID-wkrz-dcvc-5ugc
28
vulnerability VCID-ypmp-rsaw-s3hb
29
vulnerability VCID-yvkr-qhaj-bfcx
30
vulnerability VCID-zj24-rwt5-g3dg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@1.2.9-9%252Bdeb8u5
1
url pkg:deb/debian/libvirt@3.0.0-4%2Bdeb9u4
purl pkg:deb/debian/libvirt@3.0.0-4%2Bdeb9u4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2ska-hmbg-kqdw
1
vulnerability VCID-3xk5-72kc-5uhu
2
vulnerability VCID-425h-bz55-yfad
3
vulnerability VCID-5a7s-trej-63cj
4
vulnerability VCID-5pky-1svz-nqf6
5
vulnerability VCID-5ub6-8d2s-53hj
6
vulnerability VCID-a5ed-jnjb-pybr
7
vulnerability VCID-b489-x5z3-pkfh
8
vulnerability VCID-bsjb-frkp-b3an
9
vulnerability VCID-c628-5r9h-37ad
10
vulnerability VCID-cue5-u48q-87ft
11
vulnerability VCID-e93r-zft5-33dk
12
vulnerability VCID-gc5z-hy4a-8uft
13
vulnerability VCID-gp93-s21f-8fh7
14
vulnerability VCID-ju7x-j33y-8khv
15
vulnerability VCID-nfem-925f-bfdw
16
vulnerability VCID-nqd8-35a9-7bc5
17
vulnerability VCID-r65y-py21-u3eu
18
vulnerability VCID-re7g-2nvj-j3dp
19
vulnerability VCID-wf9y-4uwu-gkaz
20
vulnerability VCID-whhu-jy51-qkec
21
vulnerability VCID-wkrz-dcvc-5ugc
22
vulnerability VCID-ypmp-rsaw-s3hb
23
vulnerability VCID-yvkr-qhaj-bfcx
24
vulnerability VCID-zj24-rwt5-g3dg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@3.0.0-4%252Bdeb9u4
2
url pkg:deb/debian/libvirt@5.0.0-4%2Bdeb10u1
purl pkg:deb/debian/libvirt@5.0.0-4%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2ska-hmbg-kqdw
1
vulnerability VCID-5a7s-trej-63cj
2
vulnerability VCID-5pky-1svz-nqf6
3
vulnerability VCID-5ub6-8d2s-53hj
4
vulnerability VCID-bsjb-frkp-b3an
5
vulnerability VCID-c628-5r9h-37ad
6
vulnerability VCID-cue5-u48q-87ft
7
vulnerability VCID-ju7x-j33y-8khv
8
vulnerability VCID-nqd8-35a9-7bc5
9
vulnerability VCID-r65y-py21-u3eu
10
vulnerability VCID-wf9y-4uwu-gkaz
11
vulnerability VCID-wkrz-dcvc-5ugc
12
vulnerability VCID-ypmp-rsaw-s3hb
13
vulnerability VCID-zj24-rwt5-g3dg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@5.0.0-4%252Bdeb10u1
aliases CVE-2018-1064
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3xk5-72kc-5uhu
2
url VCID-3zke-md7v-6be5
vulnerability_id VCID-3zke-md7v-6be5
summary libvirt: Null pointer dereference when updating storage size on empty drives
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2635.json
reference_id
reference_type
scores
0
value 7.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2635.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-2635
reference_id
reference_type
scores
0
value 0.00322
scoring_system epss
scoring_elements 0.55145
published_at 2026-04-01T12:55:00Z
1
value 0.00322
scoring_system epss
scoring_elements 0.55246
published_at 2026-04-02T12:55:00Z
2
value 0.00322
scoring_system epss
scoring_elements 0.5527
published_at 2026-04-04T12:55:00Z
3
value 0.00322
scoring_system epss
scoring_elements 0.55249
published_at 2026-04-07T12:55:00Z
4
value 0.00322
scoring_system epss
scoring_elements 0.55299
published_at 2026-04-08T12:55:00Z
5
value 0.00322
scoring_system epss
scoring_elements 0.553
published_at 2026-04-09T12:55:00Z
6
value 0.00322
scoring_system epss
scoring_elements 0.55311
published_at 2026-04-16T12:55:00Z
7
value 0.00322
scoring_system epss
scoring_elements 0.55291
published_at 2026-04-12T12:55:00Z
8
value 0.00322
scoring_system epss
scoring_elements 0.55272
published_at 2026-04-13T12:55:00Z
9
value 0.00322
scoring_system epss
scoring_elements 0.55314
published_at 2026-04-18T12:55:00Z
10
value 0.00322
scoring_system epss
scoring_elements 0.55293
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-2635
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2635
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1427090
reference_id 1427090
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1427090
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=856313
reference_id 856313
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=856313
fixed_packages
0
url pkg:deb/debian/libvirt@3.0.0-4%2Bdeb9u2~bpo8%2B1
purl pkg:deb/debian/libvirt@3.0.0-4%2Bdeb9u2~bpo8%2B1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2ska-hmbg-kqdw
1
vulnerability VCID-3xk5-72kc-5uhu
2
vulnerability VCID-425h-bz55-yfad
3
vulnerability VCID-5a7s-trej-63cj
4
vulnerability VCID-5pky-1svz-nqf6
5
vulnerability VCID-5ub6-8d2s-53hj
6
vulnerability VCID-a5ed-jnjb-pybr
7
vulnerability VCID-b489-x5z3-pkfh
8
vulnerability VCID-bsjb-frkp-b3an
9
vulnerability VCID-c628-5r9h-37ad
10
vulnerability VCID-cue5-u48q-87ft
11
vulnerability VCID-e93r-zft5-33dk
12
vulnerability VCID-gc5z-hy4a-8uft
13
vulnerability VCID-gp93-s21f-8fh7
14
vulnerability VCID-ju7x-j33y-8khv
15
vulnerability VCID-nfem-925f-bfdw
16
vulnerability VCID-nqd8-35a9-7bc5
17
vulnerability VCID-r65y-py21-u3eu
18
vulnerability VCID-re7g-2nvj-j3dp
19
vulnerability VCID-wf9y-4uwu-gkaz
20
vulnerability VCID-whhu-jy51-qkec
21
vulnerability VCID-wkrz-dcvc-5ugc
22
vulnerability VCID-ypmp-rsaw-s3hb
23
vulnerability VCID-yvkr-qhaj-bfcx
24
vulnerability VCID-zj24-rwt5-g3dg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@3.0.0-4%252Bdeb9u2~bpo8%252B1
aliases CVE-2017-2635
risk_score 3.5
exploitability 0.5
weighted_severity 6.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3zke-md7v-6be5
3
url VCID-425h-bz55-yfad
vulnerability_id VCID-425h-bz55-yfad
summary libvirt: NULL pointer dereference after running qemuAgentCommand in qemuAgentGetInterfaces function
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00101.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00101.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00105.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00105.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3840.json
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3840.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-3840
reference_id
reference_type
scores
0
value 0.00709
scoring_system epss
scoring_elements 0.72161
published_at 2026-04-01T12:55:00Z
1
value 0.00709
scoring_system epss
scoring_elements 0.72246
published_at 2026-04-21T12:55:00Z
2
value 0.00709
scoring_system epss
scoring_elements 0.7222
published_at 2026-04-12T12:55:00Z
3
value 0.00709
scoring_system epss
scoring_elements 0.72206
published_at 2026-04-13T12:55:00Z
4
value 0.00709
scoring_system epss
scoring_elements 0.72249
published_at 2026-04-16T12:55:00Z
5
value 0.00709
scoring_system epss
scoring_elements 0.72259
published_at 2026-04-18T12:55:00Z
6
value 0.00709
scoring_system epss
scoring_elements 0.72167
published_at 2026-04-02T12:55:00Z
7
value 0.00709
scoring_system epss
scoring_elements 0.72187
published_at 2026-04-04T12:55:00Z
8
value 0.00709
scoring_system epss
scoring_elements 0.72164
published_at 2026-04-07T12:55:00Z
9
value 0.00709
scoring_system epss
scoring_elements 0.72201
published_at 2026-04-08T12:55:00Z
10
value 0.00709
scoring_system epss
scoring_elements 0.72213
published_at 2026-04-09T12:55:00Z
11
value 0.00709
scoring_system epss
scoring_elements 0.72236
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-3840
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1663051
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1663051
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3840
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3840
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3840
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3840
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TZRP2BRMI4RYFRPNFTTIAAUOGVN2ORP7/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TZRP2BRMI4RYFRPNFTTIAAUOGVN2ORP7/
9
reference_url https://www.redhat.com/archives/libvir-list/2019-January/msg00241.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/libvir-list/2019-January/msg00241.html
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1665228
reference_id 1665228
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1665228
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-3840
reference_id CVE-2019-3840
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:N/A:P
1
value 5.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:N/A:H
2
value 6.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-3840
15
reference_url https://access.redhat.com/errata/RHSA-2019:2294
reference_id RHSA-2019:2294
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2294
16
reference_url https://usn.ubuntu.com/3909-1/
reference_id USN-3909-1
reference_type
scores
url https://usn.ubuntu.com/3909-1/
fixed_packages
0
url pkg:deb/debian/libvirt@5.0.0-4%2Bdeb10u1
purl pkg:deb/debian/libvirt@5.0.0-4%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2ska-hmbg-kqdw
1
vulnerability VCID-5a7s-trej-63cj
2
vulnerability VCID-5pky-1svz-nqf6
3
vulnerability VCID-5ub6-8d2s-53hj
4
vulnerability VCID-bsjb-frkp-b3an
5
vulnerability VCID-c628-5r9h-37ad
6
vulnerability VCID-cue5-u48q-87ft
7
vulnerability VCID-ju7x-j33y-8khv
8
vulnerability VCID-nqd8-35a9-7bc5
9
vulnerability VCID-r65y-py21-u3eu
10
vulnerability VCID-wf9y-4uwu-gkaz
11
vulnerability VCID-wkrz-dcvc-5ugc
12
vulnerability VCID-ypmp-rsaw-s3hb
13
vulnerability VCID-zj24-rwt5-g3dg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@5.0.0-4%252Bdeb10u1
aliases CVE-2019-3840
risk_score 2.9
exploitability 0.5
weighted_severity 5.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-425h-bz55-yfad
4
url VCID-4gha-yszs-x3hw
vulnerability_id VCID-4gha-yszs-x3hw
summary
Libvirt is vulnerable to directory traversal when using Access
    Control Lists (ACL).
references
0
reference_url http://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=034e47c338b13a95cf02106a3af912c1c5f818d7
reference_id
reference_type
scores
url http://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=034e47c338b13a95cf02106a3af912c1c5f818d7
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174404.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174404.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2016-2577.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-2577.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5313.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5313.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-5313
reference_id
reference_type
scores
0
value 0.00057
scoring_system epss
scoring_elements 0.17736
published_at 2026-04-21T12:55:00Z
1
value 0.00057
scoring_system epss
scoring_elements 0.17698
published_at 2026-04-18T12:55:00Z
2
value 0.00057
scoring_system epss
scoring_elements 0.17753
published_at 2026-04-01T12:55:00Z
3
value 0.00057
scoring_system epss
scoring_elements 0.17914
published_at 2026-04-02T12:55:00Z
4
value 0.00057
scoring_system epss
scoring_elements 0.17968
published_at 2026-04-04T12:55:00Z
5
value 0.00057
scoring_system epss
scoring_elements 0.17669
published_at 2026-04-07T12:55:00Z
6
value 0.00057
scoring_system epss
scoring_elements 0.17757
published_at 2026-04-08T12:55:00Z
7
value 0.00057
scoring_system epss
scoring_elements 0.17819
published_at 2026-04-09T12:55:00Z
8
value 0.00057
scoring_system epss
scoring_elements 0.17835
published_at 2026-04-11T12:55:00Z
9
value 0.00057
scoring_system epss
scoring_elements 0.17792
published_at 2026-04-12T12:55:00Z
10
value 0.00057
scoring_system epss
scoring_elements 0.17744
published_at 2026-04-13T12:55:00Z
11
value 0.00057
scoring_system epss
scoring_elements 0.17689
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-5313
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5313
6
reference_url http://security.libvirt.org/2015/0004.html
reference_id
reference_type
scores
url http://security.libvirt.org/2015/0004.html
7
reference_url https://www.redhat.com/archives/libvir-list/2015-December/msg00473.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/libvir-list/2015-December/msg00473.html
8
reference_url http://www.securityfocus.com/bid/90913
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/90913
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1277121
reference_id 1277121
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1277121
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=808273
reference_id 808273
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=808273
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:-:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-5313
reference_id CVE-2015-5313
reference_type
scores
0
value 1.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:P/A:N
1
value 2.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2015-5313
13
reference_url https://security.gentoo.org/glsa/201612-10
reference_id GLSA-201612-10
reference_type
scores
url https://security.gentoo.org/glsa/201612-10
14
reference_url https://access.redhat.com/errata/RHSA-2016:2577
reference_id RHSA-2016:2577
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2577
15
reference_url https://usn.ubuntu.com/2867-1/
reference_id USN-2867-1
reference_type
scores
url https://usn.ubuntu.com/2867-1/
fixed_packages
0
url pkg:deb/debian/libvirt@3.0.0-4%2Bdeb9u2~bpo8%2B1
purl pkg:deb/debian/libvirt@3.0.0-4%2Bdeb9u2~bpo8%2B1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2ska-hmbg-kqdw
1
vulnerability VCID-3xk5-72kc-5uhu
2
vulnerability VCID-425h-bz55-yfad
3
vulnerability VCID-5a7s-trej-63cj
4
vulnerability VCID-5pky-1svz-nqf6
5
vulnerability VCID-5ub6-8d2s-53hj
6
vulnerability VCID-a5ed-jnjb-pybr
7
vulnerability VCID-b489-x5z3-pkfh
8
vulnerability VCID-bsjb-frkp-b3an
9
vulnerability VCID-c628-5r9h-37ad
10
vulnerability VCID-cue5-u48q-87ft
11
vulnerability VCID-e93r-zft5-33dk
12
vulnerability VCID-gc5z-hy4a-8uft
13
vulnerability VCID-gp93-s21f-8fh7
14
vulnerability VCID-ju7x-j33y-8khv
15
vulnerability VCID-nfem-925f-bfdw
16
vulnerability VCID-nqd8-35a9-7bc5
17
vulnerability VCID-r65y-py21-u3eu
18
vulnerability VCID-re7g-2nvj-j3dp
19
vulnerability VCID-wf9y-4uwu-gkaz
20
vulnerability VCID-whhu-jy51-qkec
21
vulnerability VCID-wkrz-dcvc-5ugc
22
vulnerability VCID-ypmp-rsaw-s3hb
23
vulnerability VCID-yvkr-qhaj-bfcx
24
vulnerability VCID-zj24-rwt5-g3dg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@3.0.0-4%252Bdeb9u2~bpo8%252B1
aliases CVE-2015-5313
risk_score 1.1
exploitability 0.5
weighted_severity 2.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4gha-yszs-x3hw
5
url VCID-5a7s-trej-63cj
vulnerability_id VCID-5a7s-trej-63cj
summary libvirt: Potential DoS by holding a monitor job while querying QEMU guest-agent
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-20485.json
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-20485.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-20485
reference_id
reference_type
scores
0
value 0.00192
scoring_system epss
scoring_elements 0.41033
published_at 2026-04-01T12:55:00Z
1
value 0.00192
scoring_system epss
scoring_elements 0.41039
published_at 2026-04-21T12:55:00Z
2
value 0.00192
scoring_system epss
scoring_elements 0.41098
published_at 2026-04-13T12:55:00Z
3
value 0.00192
scoring_system epss
scoring_elements 0.41142
published_at 2026-04-16T12:55:00Z
4
value 0.00192
scoring_system epss
scoring_elements 0.41113
published_at 2026-04-18T12:55:00Z
5
value 0.00192
scoring_system epss
scoring_elements 0.41115
published_at 2026-04-12T12:55:00Z
6
value 0.00192
scoring_system epss
scoring_elements 0.41146
published_at 2026-04-04T12:55:00Z
7
value 0.00192
scoring_system epss
scoring_elements 0.41072
published_at 2026-04-07T12:55:00Z
8
value 0.00192
scoring_system epss
scoring_elements 0.41121
published_at 2026-04-08T12:55:00Z
9
value 0.00192
scoring_system epss
scoring_elements 0.41128
published_at 2026-04-09T12:55:00Z
10
value 0.00192
scoring_system epss
scoring_elements 0.41148
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-20485
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=953078
reference_id
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=953078
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20485
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20485
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=a663a860819287e041c3de672aad1d8543098ecc
reference_id
reference_type
scores
url https://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=a663a860819287e041c3de672aad1d8543098ecc
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D5GE6ISYUL3CIWO3FQRUGMKTKP2NYED2/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D5GE6ISYUL3CIWO3FQRUGMKTKP2NYED2/
7
reference_url https://security-tracker.debian.org/tracker/CVE-2019-20485
reference_id
reference_type
scores
url https://security-tracker.debian.org/tracker/CVE-2019-20485
8
reference_url https://www.mail-archive.com/debian-bugs-dist%40lists.debian.org/msg1730509.html
reference_id
reference_type
scores
url https://www.mail-archive.com/debian-bugs-dist%40lists.debian.org/msg1730509.html
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1809740
reference_id 1809740
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1809740
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-20485
reference_id CVE-2019-20485
reference_type
scores
0
value 2.7
scoring_system cvssv2
scoring_elements AV:A/AC:L/Au:S/C:N/I:N/A:P
1
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-20485
16
reference_url https://access.redhat.com/errata/RHSA-2020:4000
reference_id RHSA-2020:4000
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4000
17
reference_url https://access.redhat.com/errata/RHSA-2020:4676
reference_id RHSA-2020:4676
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4676
fixed_packages
0
url pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3
purl pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ubdh-hdtv-akgt
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3
aliases CVE-2019-20485
risk_score 2.6
exploitability 0.5
weighted_severity 5.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5a7s-trej-63cj
6
url VCID-5pky-1svz-nqf6
vulnerability_id VCID-5pky-1svz-nqf6
summary libvirt: guest agent timeout can be set under read-only mode leading to DoS
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10701.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10701.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-10701
reference_id
reference_type
scores
0
value 0.00242
scoring_system epss
scoring_elements 0.47419
published_at 2026-04-01T12:55:00Z
1
value 0.00242
scoring_system epss
scoring_elements 0.47453
published_at 2026-04-02T12:55:00Z
2
value 0.00242
scoring_system epss
scoring_elements 0.47474
published_at 2026-04-04T12:55:00Z
3
value 0.00242
scoring_system epss
scoring_elements 0.47423
published_at 2026-04-07T12:55:00Z
4
value 0.00242
scoring_system epss
scoring_elements 0.47478
published_at 2026-04-08T12:55:00Z
5
value 0.00242
scoring_system epss
scoring_elements 0.47475
published_at 2026-04-09T12:55:00Z
6
value 0.00242
scoring_system epss
scoring_elements 0.47497
published_at 2026-04-11T12:55:00Z
7
value 0.00242
scoring_system epss
scoring_elements 0.47473
published_at 2026-04-12T12:55:00Z
8
value 0.00242
scoring_system epss
scoring_elements 0.47479
published_at 2026-04-13T12:55:00Z
9
value 0.00242
scoring_system epss
scoring_elements 0.47539
published_at 2026-04-16T12:55:00Z
10
value 0.00242
scoring_system epss
scoring_elements 0.47531
published_at 2026-04-18T12:55:00Z
11
value 0.00242
scoring_system epss
scoring_elements 0.47483
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-10701
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10701
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10701
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1819163
reference_id 1819163
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1819163
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=955841
reference_id 955841
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=955841
fixed_packages
0
url pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3
purl pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ubdh-hdtv-akgt
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3
aliases CVE-2020-10701
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5pky-1svz-nqf6
7
url VCID-5ub6-8d2s-53hj
vulnerability_id VCID-5ub6-8d2s-53hj
summary libvirt: Potential denial of service via active pool without target path
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10703.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10703.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-10703
reference_id
reference_type
scores
0
value 0.00689
scoring_system epss
scoring_elements 0.71717
published_at 2026-04-01T12:55:00Z
1
value 0.00689
scoring_system epss
scoring_elements 0.71788
published_at 2026-04-21T12:55:00Z
2
value 0.00689
scoring_system epss
scoring_elements 0.718
published_at 2026-04-16T12:55:00Z
3
value 0.00689
scoring_system epss
scoring_elements 0.71806
published_at 2026-04-18T12:55:00Z
4
value 0.00689
scoring_system epss
scoring_elements 0.71725
published_at 2026-04-02T12:55:00Z
5
value 0.00689
scoring_system epss
scoring_elements 0.71743
published_at 2026-04-04T12:55:00Z
6
value 0.00689
scoring_system epss
scoring_elements 0.71718
published_at 2026-04-07T12:55:00Z
7
value 0.00689
scoring_system epss
scoring_elements 0.71756
published_at 2026-04-08T12:55:00Z
8
value 0.00689
scoring_system epss
scoring_elements 0.71768
published_at 2026-04-09T12:55:00Z
9
value 0.00689
scoring_system epss
scoring_elements 0.71792
published_at 2026-04-11T12:55:00Z
10
value 0.00689
scoring_system epss
scoring_elements 0.71775
published_at 2026-04-12T12:55:00Z
11
value 0.00689
scoring_system epss
scoring_elements 0.71757
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-10703
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10703
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10703
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1816650
reference_id 1816650
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1816650
5
reference_url https://security.archlinux.org/AVG-1174
reference_id AVG-1174
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1174
6
reference_url https://access.redhat.com/errata/RHSA-2020:4000
reference_id RHSA-2020:4000
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4000
7
reference_url https://access.redhat.com/errata/RHSA-2020:4676
reference_id RHSA-2020:4676
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4676
8
reference_url https://usn.ubuntu.com/4371-1/
reference_id USN-4371-1
reference_type
scores
url https://usn.ubuntu.com/4371-1/
fixed_packages
0
url pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3
purl pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ubdh-hdtv-akgt
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3
aliases CVE-2020-10703
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5ub6-8d2s-53hj
8
url VCID-8bqx-15w5-4kdm
vulnerability_id VCID-8bqx-15w5-4kdm
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2016-07/msg00054.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-07/msg00054.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2016-07/msg00055.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-07/msg00055.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2016-08/msg00024.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-08/msg00024.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2016-2577.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-2577.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5008.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5008.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5008
reference_id
reference_type
scores
0
value 0.02119
scoring_system epss
scoring_elements 0.84066
published_at 2026-04-01T12:55:00Z
1
value 0.02119
scoring_system epss
scoring_elements 0.84163
published_at 2026-04-21T12:55:00Z
2
value 0.02119
scoring_system epss
scoring_elements 0.84135
published_at 2026-04-13T12:55:00Z
3
value 0.02119
scoring_system epss
scoring_elements 0.84157
published_at 2026-04-16T12:55:00Z
4
value 0.02119
scoring_system epss
scoring_elements 0.84159
published_at 2026-04-18T12:55:00Z
5
value 0.02119
scoring_system epss
scoring_elements 0.84079
published_at 2026-04-02T12:55:00Z
6
value 0.02119
scoring_system epss
scoring_elements 0.84096
published_at 2026-04-04T12:55:00Z
7
value 0.02119
scoring_system epss
scoring_elements 0.84098
published_at 2026-04-07T12:55:00Z
8
value 0.02119
scoring_system epss
scoring_elements 0.84121
published_at 2026-04-08T12:55:00Z
9
value 0.02119
scoring_system epss
scoring_elements 0.84127
published_at 2026-04-09T12:55:00Z
10
value 0.02119
scoring_system epss
scoring_elements 0.84145
published_at 2026-04-11T12:55:00Z
11
value 0.02119
scoring_system epss
scoring_elements 0.84139
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5008
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1180092
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1180092
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5008
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5008
8
reference_url http://security.libvirt.org/2016/0001.html
reference_id
reference_type
scores
url http://security.libvirt.org/2016/0001.html
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DZZMOMRXNPALA34XDF5NK363KDLAYSTL/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DZZMOMRXNPALA34XDF5NK363KDLAYSTL/
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QTQF6LXKEEMJG4VOOCIAPJAD6ACBYP4W/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QTQF6LXKEEMJG4VOOCIAPJAD6ACBYP4W/
12
reference_url http://www.debian.org/security/2016/dsa-3613
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3613
13
reference_url http://www.securityfocus.com/bid/91562
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/91562
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1351514
reference_id 1351514
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1351514
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-5008
reference_id CVE-2016-5008
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-5008
18
reference_url https://access.redhat.com/errata/RHSA-2016:2577
reference_id RHSA-2016:2577
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2577
19
reference_url https://usn.ubuntu.com/3576-1/
reference_id USN-3576-1
reference_type
scores
url https://usn.ubuntu.com/3576-1/
fixed_packages
0
url pkg:deb/debian/libvirt@1.2.9-9%2Bdeb8u5
purl pkg:deb/debian/libvirt@1.2.9-9%2Bdeb8u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2ska-hmbg-kqdw
1
vulnerability VCID-3xk5-72kc-5uhu
2
vulnerability VCID-3zke-md7v-6be5
3
vulnerability VCID-425h-bz55-yfad
4
vulnerability VCID-4gha-yszs-x3hw
5
vulnerability VCID-5a7s-trej-63cj
6
vulnerability VCID-5pky-1svz-nqf6
7
vulnerability VCID-5ub6-8d2s-53hj
8
vulnerability VCID-8bqx-15w5-4kdm
9
vulnerability VCID-a5ed-jnjb-pybr
10
vulnerability VCID-b489-x5z3-pkfh
11
vulnerability VCID-bsjb-frkp-b3an
12
vulnerability VCID-c628-5r9h-37ad
13
vulnerability VCID-cue5-u48q-87ft
14
vulnerability VCID-e93r-zft5-33dk
15
vulnerability VCID-gc5z-hy4a-8uft
16
vulnerability VCID-gp93-s21f-8fh7
17
vulnerability VCID-hpgc-t8mr-qkan
18
vulnerability VCID-ju7x-j33y-8khv
19
vulnerability VCID-nfem-925f-bfdw
20
vulnerability VCID-nqd8-35a9-7bc5
21
vulnerability VCID-pqce-1qud-kbef
22
vulnerability VCID-r65y-py21-u3eu
23
vulnerability VCID-re7g-2nvj-j3dp
24
vulnerability VCID-smdn-m8vh-9bb8
25
vulnerability VCID-wf9y-4uwu-gkaz
26
vulnerability VCID-whhu-jy51-qkec
27
vulnerability VCID-wkrz-dcvc-5ugc
28
vulnerability VCID-ypmp-rsaw-s3hb
29
vulnerability VCID-yvkr-qhaj-bfcx
30
vulnerability VCID-zj24-rwt5-g3dg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@1.2.9-9%252Bdeb8u5
1
url pkg:deb/debian/libvirt@3.0.0-4%2Bdeb9u2~bpo8%2B1
purl pkg:deb/debian/libvirt@3.0.0-4%2Bdeb9u2~bpo8%2B1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2ska-hmbg-kqdw
1
vulnerability VCID-3xk5-72kc-5uhu
2
vulnerability VCID-425h-bz55-yfad
3
vulnerability VCID-5a7s-trej-63cj
4
vulnerability VCID-5pky-1svz-nqf6
5
vulnerability VCID-5ub6-8d2s-53hj
6
vulnerability VCID-a5ed-jnjb-pybr
7
vulnerability VCID-b489-x5z3-pkfh
8
vulnerability VCID-bsjb-frkp-b3an
9
vulnerability VCID-c628-5r9h-37ad
10
vulnerability VCID-cue5-u48q-87ft
11
vulnerability VCID-e93r-zft5-33dk
12
vulnerability VCID-gc5z-hy4a-8uft
13
vulnerability VCID-gp93-s21f-8fh7
14
vulnerability VCID-ju7x-j33y-8khv
15
vulnerability VCID-nfem-925f-bfdw
16
vulnerability VCID-nqd8-35a9-7bc5
17
vulnerability VCID-r65y-py21-u3eu
18
vulnerability VCID-re7g-2nvj-j3dp
19
vulnerability VCID-wf9y-4uwu-gkaz
20
vulnerability VCID-whhu-jy51-qkec
21
vulnerability VCID-wkrz-dcvc-5ugc
22
vulnerability VCID-ypmp-rsaw-s3hb
23
vulnerability VCID-yvkr-qhaj-bfcx
24
vulnerability VCID-zj24-rwt5-g3dg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@3.0.0-4%252Bdeb9u2~bpo8%252B1
aliases CVE-2016-5008
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8bqx-15w5-4kdm
9
url VCID-a5ed-jnjb-pybr
vulnerability_id VCID-a5ed-jnjb-pybr
summary
Multiple vulnerabilities have been discovered in libvirt, the worst
    of which may result in the execution of arbitrary commands.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10168.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10168.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-10168
reference_id
reference_type
scores
0
value 0.0023
scoring_system epss
scoring_elements 0.45677
published_at 2026-04-01T12:55:00Z
1
value 0.0023
scoring_system epss
scoring_elements 0.45742
published_at 2026-04-02T12:55:00Z
2
value 0.0023
scoring_system epss
scoring_elements 0.45765
published_at 2026-04-04T12:55:00Z
3
value 0.0023
scoring_system epss
scoring_elements 0.45714
published_at 2026-04-07T12:55:00Z
4
value 0.0023
scoring_system epss
scoring_elements 0.45771
published_at 2026-04-08T12:55:00Z
5
value 0.0023
scoring_system epss
scoring_elements 0.45768
published_at 2026-04-09T12:55:00Z
6
value 0.0023
scoring_system epss
scoring_elements 0.45791
published_at 2026-04-11T12:55:00Z
7
value 0.0023
scoring_system epss
scoring_elements 0.45761
published_at 2026-04-12T12:55:00Z
8
value 0.0023
scoring_system epss
scoring_elements 0.45766
published_at 2026-04-13T12:55:00Z
9
value 0.0023
scoring_system epss
scoring_elements 0.45816
published_at 2026-04-16T12:55:00Z
10
value 0.0023
scoring_system epss
scoring_elements 0.45811
published_at 2026-04-18T12:55:00Z
11
value 0.0023
scoring_system epss
scoring_elements 0.45757
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-10168
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10168
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10168
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1720118
reference_id 1720118
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1720118
5
reference_url https://security.gentoo.org/glsa/202003-18
reference_id GLSA-202003-18
reference_type
scores
url https://security.gentoo.org/glsa/202003-18
6
reference_url https://access.redhat.com/errata/RHSA-2019:1579
reference_id RHSA-2019:1579
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1579
7
reference_url https://access.redhat.com/errata/RHSA-2019:1580
reference_id RHSA-2019:1580
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1580
8
reference_url https://access.redhat.com/errata/RHSA-2019:1699
reference_id RHSA-2019:1699
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1699
9
reference_url https://access.redhat.com/errata/RHSA-2019:1762
reference_id RHSA-2019:1762
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1762
10
reference_url https://usn.ubuntu.com/4047-1/
reference_id USN-4047-1
reference_type
scores
url https://usn.ubuntu.com/4047-1/
fixed_packages
0
url pkg:deb/debian/libvirt@5.0.0-4%2Bdeb10u1
purl pkg:deb/debian/libvirt@5.0.0-4%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2ska-hmbg-kqdw
1
vulnerability VCID-5a7s-trej-63cj
2
vulnerability VCID-5pky-1svz-nqf6
3
vulnerability VCID-5ub6-8d2s-53hj
4
vulnerability VCID-bsjb-frkp-b3an
5
vulnerability VCID-c628-5r9h-37ad
6
vulnerability VCID-cue5-u48q-87ft
7
vulnerability VCID-ju7x-j33y-8khv
8
vulnerability VCID-nqd8-35a9-7bc5
9
vulnerability VCID-r65y-py21-u3eu
10
vulnerability VCID-wf9y-4uwu-gkaz
11
vulnerability VCID-wkrz-dcvc-5ugc
12
vulnerability VCID-ypmp-rsaw-s3hb
13
vulnerability VCID-zj24-rwt5-g3dg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@5.0.0-4%252Bdeb10u1
aliases CVE-2019-10168
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a5ed-jnjb-pybr
10
url VCID-b489-x5z3-pkfh
vulnerability_id VCID-b489-x5z3-pkfh
summary
Multiple vulnerabilities have been discovered in libvirt, the worst
    of which may result in the execution of arbitrary commands.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10166.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10166.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-10166
reference_id
reference_type
scores
0
value 0.00142
scoring_system epss
scoring_elements 0.34157
published_at 2026-04-01T12:55:00Z
1
value 0.00142
scoring_system epss
scoring_elements 0.34496
published_at 2026-04-02T12:55:00Z
2
value 0.00142
scoring_system epss
scoring_elements 0.34524
published_at 2026-04-04T12:55:00Z
3
value 0.00142
scoring_system epss
scoring_elements 0.34391
published_at 2026-04-07T12:55:00Z
4
value 0.00142
scoring_system epss
scoring_elements 0.34433
published_at 2026-04-08T12:55:00Z
5
value 0.00142
scoring_system epss
scoring_elements 0.34463
published_at 2026-04-09T12:55:00Z
6
value 0.00142
scoring_system epss
scoring_elements 0.34464
published_at 2026-04-11T12:55:00Z
7
value 0.00142
scoring_system epss
scoring_elements 0.34426
published_at 2026-04-12T12:55:00Z
8
value 0.00142
scoring_system epss
scoring_elements 0.34402
published_at 2026-04-13T12:55:00Z
9
value 0.00142
scoring_system epss
scoring_elements 0.34436
published_at 2026-04-16T12:55:00Z
10
value 0.00142
scoring_system epss
scoring_elements 0.34423
published_at 2026-04-18T12:55:00Z
11
value 0.00142
scoring_system epss
scoring_elements 0.34382
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-10166
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10166
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1720114
reference_id 1720114
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1720114
5
reference_url https://security.gentoo.org/glsa/202003-18
reference_id GLSA-202003-18
reference_type
scores
url https://security.gentoo.org/glsa/202003-18
6
reference_url https://access.redhat.com/errata/RHSA-2019:1579
reference_id RHSA-2019:1579
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1579
7
reference_url https://access.redhat.com/errata/RHSA-2019:1580
reference_id RHSA-2019:1580
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1580
8
reference_url https://access.redhat.com/errata/RHSA-2019:1699
reference_id RHSA-2019:1699
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1699
9
reference_url https://access.redhat.com/errata/RHSA-2019:1762
reference_id RHSA-2019:1762
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1762
10
reference_url https://usn.ubuntu.com/4047-1/
reference_id USN-4047-1
reference_type
scores
url https://usn.ubuntu.com/4047-1/
fixed_packages
0
url pkg:deb/debian/libvirt@5.0.0-4%2Bdeb10u1
purl pkg:deb/debian/libvirt@5.0.0-4%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2ska-hmbg-kqdw
1
vulnerability VCID-5a7s-trej-63cj
2
vulnerability VCID-5pky-1svz-nqf6
3
vulnerability VCID-5ub6-8d2s-53hj
4
vulnerability VCID-bsjb-frkp-b3an
5
vulnerability VCID-c628-5r9h-37ad
6
vulnerability VCID-cue5-u48q-87ft
7
vulnerability VCID-ju7x-j33y-8khv
8
vulnerability VCID-nqd8-35a9-7bc5
9
vulnerability VCID-r65y-py21-u3eu
10
vulnerability VCID-wf9y-4uwu-gkaz
11
vulnerability VCID-wkrz-dcvc-5ugc
12
vulnerability VCID-ypmp-rsaw-s3hb
13
vulnerability VCID-zj24-rwt5-g3dg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@5.0.0-4%252Bdeb10u1
aliases CVE-2019-10166
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b489-x5z3-pkfh
11
url VCID-bsjb-frkp-b3an
vulnerability_id VCID-bsjb-frkp-b3an
summary libvirt: deadlock and crash in libxl driver
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4147.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4147.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-4147
reference_id
reference_type
scores
0
value 0.00078
scoring_system epss
scoring_elements 0.23184
published_at 2026-04-01T12:55:00Z
1
value 0.00078
scoring_system epss
scoring_elements 0.23361
published_at 2026-04-02T12:55:00Z
2
value 0.00078
scoring_system epss
scoring_elements 0.23401
published_at 2026-04-04T12:55:00Z
3
value 0.00078
scoring_system epss
scoring_elements 0.23189
published_at 2026-04-07T12:55:00Z
4
value 0.00078
scoring_system epss
scoring_elements 0.23262
published_at 2026-04-08T12:55:00Z
5
value 0.00078
scoring_system epss
scoring_elements 0.23312
published_at 2026-04-09T12:55:00Z
6
value 0.00078
scoring_system epss
scoring_elements 0.23333
published_at 2026-04-11T12:55:00Z
7
value 0.00078
scoring_system epss
scoring_elements 0.23295
published_at 2026-04-12T12:55:00Z
8
value 0.00078
scoring_system epss
scoring_elements 0.23238
published_at 2026-04-13T12:55:00Z
9
value 0.00078
scoring_system epss
scoring_elements 0.23254
published_at 2026-04-16T12:55:00Z
10
value 0.00078
scoring_system epss
scoring_elements 0.23248
published_at 2026-04-18T12:55:00Z
11
value 0.00078
scoring_system epss
scoring_elements 0.23228
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-4147
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4147
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1002535
reference_id 1002535
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1002535
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2034195
reference_id 2034195
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2034195
6
reference_url https://usn.ubuntu.com/5399-1/
reference_id USN-5399-1
reference_type
scores
url https://usn.ubuntu.com/5399-1/
fixed_packages
0
url pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3
purl pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ubdh-hdtv-akgt
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3
aliases CVE-2021-4147
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bsjb-frkp-b3an
12
url VCID-c628-5r9h-37ad
vulnerability_id VCID-c628-5r9h-37ad
summary libvirt: memory leak in domstats may allow read-only user to perform DoS attack
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12430.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12430.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-12430
reference_id
reference_type
scores
0
value 0.00859
scoring_system epss
scoring_elements 0.74964
published_at 2026-04-01T12:55:00Z
1
value 0.00859
scoring_system epss
scoring_elements 0.74968
published_at 2026-04-02T12:55:00Z
2
value 0.00859
scoring_system epss
scoring_elements 0.74997
published_at 2026-04-04T12:55:00Z
3
value 0.00859
scoring_system epss
scoring_elements 0.74973
published_at 2026-04-07T12:55:00Z
4
value 0.00859
scoring_system epss
scoring_elements 0.75007
published_at 2026-04-08T12:55:00Z
5
value 0.00859
scoring_system epss
scoring_elements 0.75018
published_at 2026-04-12T12:55:00Z
6
value 0.00859
scoring_system epss
scoring_elements 0.7504
published_at 2026-04-11T12:55:00Z
7
value 0.00859
scoring_system epss
scoring_elements 0.75008
published_at 2026-04-13T12:55:00Z
8
value 0.00859
scoring_system epss
scoring_elements 0.75044
published_at 2026-04-16T12:55:00Z
9
value 0.00859
scoring_system epss
scoring_elements 0.75052
published_at 2026-04-18T12:55:00Z
10
value 0.00859
scoring_system epss
scoring_elements 0.75041
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-12430
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12430
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12430
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1828190
reference_id 1828190
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1828190
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=959447
reference_id 959447
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=959447
6
reference_url https://usn.ubuntu.com/4371-1/
reference_id USN-4371-1
reference_type
scores
url https://usn.ubuntu.com/4371-1/
fixed_packages
0
url pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3
purl pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ubdh-hdtv-akgt
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3
aliases CVE-2020-12430
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c628-5r9h-37ad
13
url VCID-cue5-u48q-87ft
vulnerability_id VCID-cue5-u48q-87ft
summary Multiple vulnerabilities have been discovered in libvirt, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3667.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3667.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-3667
reference_id
reference_type
scores
0
value 0.00435
scoring_system epss
scoring_elements 0.62942
published_at 2026-04-21T12:55:00Z
1
value 0.00435
scoring_system epss
scoring_elements 0.62963
published_at 2026-04-18T12:55:00Z
2
value 0.00436
scoring_system epss
scoring_elements 0.62905
published_at 2026-04-01T12:55:00Z
3
value 0.00436
scoring_system epss
scoring_elements 0.62964
published_at 2026-04-02T12:55:00Z
4
value 0.00436
scoring_system epss
scoring_elements 0.62993
published_at 2026-04-04T12:55:00Z
5
value 0.00436
scoring_system epss
scoring_elements 0.62957
published_at 2026-04-07T12:55:00Z
6
value 0.00436
scoring_system epss
scoring_elements 0.63008
published_at 2026-04-08T12:55:00Z
7
value 0.00436
scoring_system epss
scoring_elements 0.63024
published_at 2026-04-09T12:55:00Z
8
value 0.00436
scoring_system epss
scoring_elements 0.63042
published_at 2026-04-16T12:55:00Z
9
value 0.00436
scoring_system epss
scoring_elements 0.63027
published_at 2026-04-12T12:55:00Z
10
value 0.00436
scoring_system epss
scoring_elements 0.63005
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-3667
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3667
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3667
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1986094
reference_id 1986094
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1986094
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991594
reference_id 991594
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991594
6
reference_url https://security.archlinux.org/AVG-2230
reference_id AVG-2230
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2230
7
reference_url https://security.gentoo.org/glsa/202210-06
reference_id GLSA-202210-06
reference_type
scores
url https://security.gentoo.org/glsa/202210-06
8
reference_url https://access.redhat.com/errata/RHSA-2021:3703
reference_id RHSA-2021:3703
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3703
9
reference_url https://access.redhat.com/errata/RHSA-2021:3704
reference_id RHSA-2021:3704
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3704
10
reference_url https://access.redhat.com/errata/RHSA-2021:4191
reference_id RHSA-2021:4191
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4191
11
reference_url https://usn.ubuntu.com/5399-1/
reference_id USN-5399-1
reference_type
scores
url https://usn.ubuntu.com/5399-1/
fixed_packages
0
url pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3
purl pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ubdh-hdtv-akgt
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3
aliases CVE-2021-3667
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cue5-u48q-87ft
14
url VCID-e93r-zft5-33dk
vulnerability_id VCID-e93r-zft5-33dk
summary libvirt: virsh domhostname command discloses guest hostname in readonly mode
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00105.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00105.html
1
reference_url https://access.redhat.com/errata/RHBA-2019:3723
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHBA-2019:3723
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3886.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3886.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-3886
reference_id
reference_type
scores
0
value 0.00463
scoring_system epss
scoring_elements 0.64184
published_at 2026-04-01T12:55:00Z
1
value 0.00463
scoring_system epss
scoring_elements 0.64315
published_at 2026-04-18T12:55:00Z
2
value 0.00463
scoring_system epss
scoring_elements 0.64308
published_at 2026-04-11T12:55:00Z
3
value 0.00463
scoring_system epss
scoring_elements 0.64297
published_at 2026-04-12T12:55:00Z
4
value 0.00463
scoring_system epss
scoring_elements 0.6427
published_at 2026-04-13T12:55:00Z
5
value 0.00463
scoring_system epss
scoring_elements 0.64304
published_at 2026-04-21T12:55:00Z
6
value 0.00463
scoring_system epss
scoring_elements 0.64242
published_at 2026-04-02T12:55:00Z
7
value 0.00463
scoring_system epss
scoring_elements 0.64269
published_at 2026-04-04T12:55:00Z
8
value 0.00463
scoring_system epss
scoring_elements 0.6423
published_at 2026-04-07T12:55:00Z
9
value 0.00463
scoring_system epss
scoring_elements 0.6428
published_at 2026-04-08T12:55:00Z
10
value 0.00463
scoring_system epss
scoring_elements 0.64295
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-3886
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3886
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3886
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3886
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3886
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CYMNKXAUBZCFBBPFH64FJPH5EJH4GSU2/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CYMNKXAUBZCFBBPFH64FJPH5EJH4GSU2/
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R5DHYIFECZ7BMVXK4EP4FDFZXK7I5MZH/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R5DHYIFECZ7BMVXK4EP4FDFZXK7I5MZH/
9
reference_url http://www.securityfocus.com/bid/107777
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/107777
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1694880
reference_id 1694880
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1694880
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926418
reference_id 926418
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926418
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-3886
reference_id CVE-2019-3886
reference_type
scores
0
value 4.8
scoring_system cvssv2
scoring_elements AV:A/AC:L/Au:N/C:P/I:N/A:P
1
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
2
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://nvd.nist.gov/vuln/detail/CVE-2019-3886
17
reference_url https://usn.ubuntu.com/4021-1/
reference_id USN-4021-1
reference_type
scores
url https://usn.ubuntu.com/4021-1/
fixed_packages
0
url pkg:deb/debian/libvirt@5.0.0-4%2Bdeb10u1
purl pkg:deb/debian/libvirt@5.0.0-4%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2ska-hmbg-kqdw
1
vulnerability VCID-5a7s-trej-63cj
2
vulnerability VCID-5pky-1svz-nqf6
3
vulnerability VCID-5ub6-8d2s-53hj
4
vulnerability VCID-bsjb-frkp-b3an
5
vulnerability VCID-c628-5r9h-37ad
6
vulnerability VCID-cue5-u48q-87ft
7
vulnerability VCID-ju7x-j33y-8khv
8
vulnerability VCID-nqd8-35a9-7bc5
9
vulnerability VCID-r65y-py21-u3eu
10
vulnerability VCID-wf9y-4uwu-gkaz
11
vulnerability VCID-wkrz-dcvc-5ugc
12
vulnerability VCID-ypmp-rsaw-s3hb
13
vulnerability VCID-zj24-rwt5-g3dg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@5.0.0-4%252Bdeb10u1
aliases CVE-2019-3886
risk_score 2.5
exploitability 0.5
weighted_severity 4.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e93r-zft5-33dk
15
url VCID-gc5z-hy4a-8uft
vulnerability_id VCID-gc5z-hy4a-8uft
summary libvirt: wrong permissions in systemd admin-sock due to missing SocketMode parameter
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10132.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10132.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-10132
reference_id
reference_type
scores
0
value 0.01333
scoring_system epss
scoring_elements 0.79916
published_at 2026-04-01T12:55:00Z
1
value 0.01333
scoring_system epss
scoring_elements 0.79923
published_at 2026-04-02T12:55:00Z
2
value 0.01333
scoring_system epss
scoring_elements 0.79944
published_at 2026-04-04T12:55:00Z
3
value 0.01333
scoring_system epss
scoring_elements 0.79932
published_at 2026-04-07T12:55:00Z
4
value 0.01333
scoring_system epss
scoring_elements 0.79961
published_at 2026-04-08T12:55:00Z
5
value 0.01333
scoring_system epss
scoring_elements 0.7997
published_at 2026-04-09T12:55:00Z
6
value 0.01333
scoring_system epss
scoring_elements 0.7999
published_at 2026-04-11T12:55:00Z
7
value 0.01333
scoring_system epss
scoring_elements 0.79973
published_at 2026-04-12T12:55:00Z
8
value 0.01333
scoring_system epss
scoring_elements 0.79965
published_at 2026-04-13T12:55:00Z
9
value 0.01333
scoring_system epss
scoring_elements 0.79993
published_at 2026-04-16T12:55:00Z
10
value 0.01333
scoring_system epss
scoring_elements 0.79994
published_at 2026-04-18T12:55:00Z
11
value 0.01333
scoring_system epss
scoring_elements 0.79996
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-10132
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10132
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10132
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1706067
reference_id 1706067
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1706067
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929334
reference_id 929334
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929334
6
reference_url https://access.redhat.com/errata/RHSA-2019:1264
reference_id RHSA-2019:1264
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1264
7
reference_url https://access.redhat.com/errata/RHSA-2019:1268
reference_id RHSA-2019:1268
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1268
8
reference_url https://access.redhat.com/errata/RHSA-2019:1455
reference_id RHSA-2019:1455
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1455
9
reference_url https://usn.ubuntu.com/4021-1/
reference_id USN-4021-1
reference_type
scores
url https://usn.ubuntu.com/4021-1/
fixed_packages
0
url pkg:deb/debian/libvirt@5.0.0-4%2Bdeb10u1
purl pkg:deb/debian/libvirt@5.0.0-4%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2ska-hmbg-kqdw
1
vulnerability VCID-5a7s-trej-63cj
2
vulnerability VCID-5pky-1svz-nqf6
3
vulnerability VCID-5ub6-8d2s-53hj
4
vulnerability VCID-bsjb-frkp-b3an
5
vulnerability VCID-c628-5r9h-37ad
6
vulnerability VCID-cue5-u48q-87ft
7
vulnerability VCID-ju7x-j33y-8khv
8
vulnerability VCID-nqd8-35a9-7bc5
9
vulnerability VCID-r65y-py21-u3eu
10
vulnerability VCID-wf9y-4uwu-gkaz
11
vulnerability VCID-wkrz-dcvc-5ugc
12
vulnerability VCID-ypmp-rsaw-s3hb
13
vulnerability VCID-zj24-rwt5-g3dg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@5.0.0-4%252Bdeb10u1
aliases CVE-2019-10132
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gc5z-hy4a-8uft
16
url VCID-gp93-s21f-8fh7
vulnerability_id VCID-gp93-s21f-8fh7
summary
Multiple vulnerabilities have been discovered in libvirt, the worst
    of which may result in the execution of arbitrary commands.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10161.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10161.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-10161
reference_id
reference_type
scores
0
value 0.00264
scoring_system epss
scoring_elements 0.49809
published_at 2026-04-01T12:55:00Z
1
value 0.00264
scoring_system epss
scoring_elements 0.49847
published_at 2026-04-02T12:55:00Z
2
value 0.00264
scoring_system epss
scoring_elements 0.49874
published_at 2026-04-04T12:55:00Z
3
value 0.00264
scoring_system epss
scoring_elements 0.49826
published_at 2026-04-07T12:55:00Z
4
value 0.00264
scoring_system epss
scoring_elements 0.49881
published_at 2026-04-08T12:55:00Z
5
value 0.00264
scoring_system epss
scoring_elements 0.49875
published_at 2026-04-09T12:55:00Z
6
value 0.00264
scoring_system epss
scoring_elements 0.49893
published_at 2026-04-11T12:55:00Z
7
value 0.00264
scoring_system epss
scoring_elements 0.49865
published_at 2026-04-12T12:55:00Z
8
value 0.00264
scoring_system epss
scoring_elements 0.49866
published_at 2026-04-13T12:55:00Z
9
value 0.00264
scoring_system epss
scoring_elements 0.49912
published_at 2026-04-16T12:55:00Z
10
value 0.00264
scoring_system epss
scoring_elements 0.49913
published_at 2026-04-18T12:55:00Z
11
value 0.00264
scoring_system epss
scoring_elements 0.49885
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-10161
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10161
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10161
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10167
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10167
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1720115
reference_id 1720115
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1720115
6
reference_url https://security.gentoo.org/glsa/202003-18
reference_id GLSA-202003-18
reference_type
scores
url https://security.gentoo.org/glsa/202003-18
7
reference_url https://access.redhat.com/errata/RHSA-2019:1578
reference_id RHSA-2019:1578
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1578
8
reference_url https://access.redhat.com/errata/RHSA-2019:1579
reference_id RHSA-2019:1579
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1579
9
reference_url https://access.redhat.com/errata/RHSA-2019:1580
reference_id RHSA-2019:1580
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1580
10
reference_url https://access.redhat.com/errata/RHSA-2019:1699
reference_id RHSA-2019:1699
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1699
11
reference_url https://access.redhat.com/errata/RHSA-2019:1762
reference_id RHSA-2019:1762
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1762
12
reference_url https://usn.ubuntu.com/4047-1/
reference_id USN-4047-1
reference_type
scores
url https://usn.ubuntu.com/4047-1/
13
reference_url https://usn.ubuntu.com/4047-2/
reference_id USN-4047-2
reference_type
scores
url https://usn.ubuntu.com/4047-2/
fixed_packages
0
url pkg:deb/debian/libvirt@3.0.0-4%2Bdeb9u4
purl pkg:deb/debian/libvirt@3.0.0-4%2Bdeb9u4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2ska-hmbg-kqdw
1
vulnerability VCID-3xk5-72kc-5uhu
2
vulnerability VCID-425h-bz55-yfad
3
vulnerability VCID-5a7s-trej-63cj
4
vulnerability VCID-5pky-1svz-nqf6
5
vulnerability VCID-5ub6-8d2s-53hj
6
vulnerability VCID-a5ed-jnjb-pybr
7
vulnerability VCID-b489-x5z3-pkfh
8
vulnerability VCID-bsjb-frkp-b3an
9
vulnerability VCID-c628-5r9h-37ad
10
vulnerability VCID-cue5-u48q-87ft
11
vulnerability VCID-e93r-zft5-33dk
12
vulnerability VCID-gc5z-hy4a-8uft
13
vulnerability VCID-gp93-s21f-8fh7
14
vulnerability VCID-ju7x-j33y-8khv
15
vulnerability VCID-nfem-925f-bfdw
16
vulnerability VCID-nqd8-35a9-7bc5
17
vulnerability VCID-r65y-py21-u3eu
18
vulnerability VCID-re7g-2nvj-j3dp
19
vulnerability VCID-wf9y-4uwu-gkaz
20
vulnerability VCID-whhu-jy51-qkec
21
vulnerability VCID-wkrz-dcvc-5ugc
22
vulnerability VCID-ypmp-rsaw-s3hb
23
vulnerability VCID-yvkr-qhaj-bfcx
24
vulnerability VCID-zj24-rwt5-g3dg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@3.0.0-4%252Bdeb9u4
1
url pkg:deb/debian/libvirt@5.0.0-4%2Bdeb10u1
purl pkg:deb/debian/libvirt@5.0.0-4%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2ska-hmbg-kqdw
1
vulnerability VCID-5a7s-trej-63cj
2
vulnerability VCID-5pky-1svz-nqf6
3
vulnerability VCID-5ub6-8d2s-53hj
4
vulnerability VCID-bsjb-frkp-b3an
5
vulnerability VCID-c628-5r9h-37ad
6
vulnerability VCID-cue5-u48q-87ft
7
vulnerability VCID-ju7x-j33y-8khv
8
vulnerability VCID-nqd8-35a9-7bc5
9
vulnerability VCID-r65y-py21-u3eu
10
vulnerability VCID-wf9y-4uwu-gkaz
11
vulnerability VCID-wkrz-dcvc-5ugc
12
vulnerability VCID-ypmp-rsaw-s3hb
13
vulnerability VCID-zj24-rwt5-g3dg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@5.0.0-4%252Bdeb10u1
aliases CVE-2019-10161
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gp93-s21f-8fh7
17
url VCID-hpgc-t8mr-qkan
vulnerability_id VCID-hpgc-t8mr-qkan
summary libvirt: Ceph id/key leaked in the process list
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5160.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5160.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-5160
reference_id
reference_type
scores
0
value 0.00145
scoring_system epss
scoring_elements 0.34716
published_at 2026-04-01T12:55:00Z
1
value 0.00145
scoring_system epss
scoring_elements 0.34924
published_at 2026-04-02T12:55:00Z
2
value 0.00145
scoring_system epss
scoring_elements 0.3495
published_at 2026-04-04T12:55:00Z
3
value 0.00145
scoring_system epss
scoring_elements 0.3483
published_at 2026-04-07T12:55:00Z
4
value 0.00145
scoring_system epss
scoring_elements 0.34875
published_at 2026-04-08T12:55:00Z
5
value 0.00145
scoring_system epss
scoring_elements 0.34902
published_at 2026-04-09T12:55:00Z
6
value 0.00145
scoring_system epss
scoring_elements 0.34906
published_at 2026-04-11T12:55:00Z
7
value 0.00145
scoring_system epss
scoring_elements 0.34869
published_at 2026-04-12T12:55:00Z
8
value 0.00145
scoring_system epss
scoring_elements 0.34846
published_at 2026-04-13T12:55:00Z
9
value 0.00145
scoring_system epss
scoring_elements 0.34885
published_at 2026-04-16T12:55:00Z
10
value 0.00145
scoring_system epss
scoring_elements 0.34868
published_at 2026-04-18T12:55:00Z
11
value 0.00145
scoring_system epss
scoring_elements 0.34823
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-5160
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5160
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5160
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1245647
reference_id 1245647
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1245647
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=796111
reference_id 796111
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=796111
5
reference_url https://access.redhat.com/errata/RHSA-2016:2577
reference_id RHSA-2016:2577
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2577
fixed_packages
0
url pkg:deb/debian/libvirt@3.0.0-4%2Bdeb9u2~bpo8%2B1
purl pkg:deb/debian/libvirt@3.0.0-4%2Bdeb9u2~bpo8%2B1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2ska-hmbg-kqdw
1
vulnerability VCID-3xk5-72kc-5uhu
2
vulnerability VCID-425h-bz55-yfad
3
vulnerability VCID-5a7s-trej-63cj
4
vulnerability VCID-5pky-1svz-nqf6
5
vulnerability VCID-5ub6-8d2s-53hj
6
vulnerability VCID-a5ed-jnjb-pybr
7
vulnerability VCID-b489-x5z3-pkfh
8
vulnerability VCID-bsjb-frkp-b3an
9
vulnerability VCID-c628-5r9h-37ad
10
vulnerability VCID-cue5-u48q-87ft
11
vulnerability VCID-e93r-zft5-33dk
12
vulnerability VCID-gc5z-hy4a-8uft
13
vulnerability VCID-gp93-s21f-8fh7
14
vulnerability VCID-ju7x-j33y-8khv
15
vulnerability VCID-nfem-925f-bfdw
16
vulnerability VCID-nqd8-35a9-7bc5
17
vulnerability VCID-r65y-py21-u3eu
18
vulnerability VCID-re7g-2nvj-j3dp
19
vulnerability VCID-wf9y-4uwu-gkaz
20
vulnerability VCID-whhu-jy51-qkec
21
vulnerability VCID-wkrz-dcvc-5ugc
22
vulnerability VCID-ypmp-rsaw-s3hb
23
vulnerability VCID-yvkr-qhaj-bfcx
24
vulnerability VCID-zj24-rwt5-g3dg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@3.0.0-4%252Bdeb9u2~bpo8%252B1
aliases CVE-2015-5160
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hpgc-t8mr-qkan
18
url VCID-ju7x-j33y-8khv
vulnerability_id VCID-ju7x-j33y-8khv
summary Multiple vulnerabilities have been discovered in libvirt, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25637.json
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25637.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-25637
reference_id
reference_type
scores
0
value 0.0011
scoring_system epss
scoring_elements 0.29407
published_at 2026-04-12T12:55:00Z
1
value 0.0011
scoring_system epss
scoring_elements 0.29343
published_at 2026-04-07T12:55:00Z
2
value 0.0011
scoring_system epss
scoring_elements 0.29473
published_at 2026-04-02T12:55:00Z
3
value 0.0011
scoring_system epss
scoring_elements 0.29521
published_at 2026-04-04T12:55:00Z
4
value 0.0011
scoring_system epss
scoring_elements 0.29448
published_at 2026-04-09T12:55:00Z
5
value 0.0011
scoring_system epss
scoring_elements 0.29452
published_at 2026-04-11T12:55:00Z
6
value 0.0011
scoring_system epss
scoring_elements 0.29355
published_at 2026-04-13T12:55:00Z
7
value 0.00123
scoring_system epss
scoring_elements 0.3141
published_at 2026-04-18T12:55:00Z
8
value 0.00123
scoring_system epss
scoring_elements 0.31382
published_at 2026-04-21T12:55:00Z
9
value 0.00123
scoring_system epss
scoring_elements 0.31431
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-25637
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25637
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1881037
reference_id 1881037
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1881037
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=971555
reference_id 971555
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=971555
6
reference_url https://security.archlinux.org/ASA-202101-42
reference_id ASA-202101-42
reference_type
scores
url https://security.archlinux.org/ASA-202101-42
7
reference_url https://security.archlinux.org/AVG-1240
reference_id AVG-1240
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1240
8
reference_url https://security.gentoo.org/glsa/202210-06
reference_id GLSA-202210-06
reference_type
scores
url https://security.gentoo.org/glsa/202210-06
9
reference_url https://access.redhat.com/errata/RHSA-2020:5040
reference_id RHSA-2020:5040
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5040
10
reference_url https://access.redhat.com/errata/RHSA-2020:5111
reference_id RHSA-2020:5111
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5111
11
reference_url https://access.redhat.com/errata/RHSA-2021:1762
reference_id RHSA-2021:1762
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1762
12
reference_url https://usn.ubuntu.com/5399-1/
reference_id USN-5399-1
reference_type
scores
url https://usn.ubuntu.com/5399-1/
fixed_packages
0
url pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3
purl pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ubdh-hdtv-akgt
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3
aliases CVE-2020-25637
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ju7x-j33y-8khv
19
url VCID-nfem-925f-bfdw
vulnerability_id VCID-nfem-925f-bfdw
summary
Multiple vulnerabilities have been discovered in libvirt, the worst
    of which may result in the execution of arbitrary commands.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10167.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10167.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-10167
reference_id
reference_type
scores
0
value 0.00169
scoring_system epss
scoring_elements 0.37993
published_at 2026-04-01T12:55:00Z
1
value 0.00169
scoring_system epss
scoring_elements 0.38174
published_at 2026-04-02T12:55:00Z
2
value 0.00169
scoring_system epss
scoring_elements 0.38197
published_at 2026-04-04T12:55:00Z
3
value 0.00169
scoring_system epss
scoring_elements 0.38067
published_at 2026-04-07T12:55:00Z
4
value 0.00169
scoring_system epss
scoring_elements 0.38117
published_at 2026-04-08T12:55:00Z
5
value 0.00169
scoring_system epss
scoring_elements 0.38126
published_at 2026-04-09T12:55:00Z
6
value 0.00169
scoring_system epss
scoring_elements 0.38144
published_at 2026-04-11T12:55:00Z
7
value 0.00169
scoring_system epss
scoring_elements 0.38107
published_at 2026-04-12T12:55:00Z
8
value 0.00169
scoring_system epss
scoring_elements 0.38083
published_at 2026-04-13T12:55:00Z
9
value 0.00169
scoring_system epss
scoring_elements 0.38129
published_at 2026-04-16T12:55:00Z
10
value 0.00169
scoring_system epss
scoring_elements 0.3811
published_at 2026-04-18T12:55:00Z
11
value 0.00169
scoring_system epss
scoring_elements 0.38046
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-10167
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10161
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10161
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10167
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10167
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1720117
reference_id 1720117
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1720117
6
reference_url https://security.gentoo.org/glsa/202003-18
reference_id GLSA-202003-18
reference_type
scores
url https://security.gentoo.org/glsa/202003-18
7
reference_url https://access.redhat.com/errata/RHSA-2019:1579
reference_id RHSA-2019:1579
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1579
8
reference_url https://access.redhat.com/errata/RHSA-2019:1580
reference_id RHSA-2019:1580
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1580
9
reference_url https://access.redhat.com/errata/RHSA-2019:1699
reference_id RHSA-2019:1699
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1699
10
reference_url https://access.redhat.com/errata/RHSA-2019:1762
reference_id RHSA-2019:1762
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1762
11
reference_url https://usn.ubuntu.com/4047-1/
reference_id USN-4047-1
reference_type
scores
url https://usn.ubuntu.com/4047-1/
fixed_packages
0
url pkg:deb/debian/libvirt@3.0.0-4%2Bdeb9u4
purl pkg:deb/debian/libvirt@3.0.0-4%2Bdeb9u4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2ska-hmbg-kqdw
1
vulnerability VCID-3xk5-72kc-5uhu
2
vulnerability VCID-425h-bz55-yfad
3
vulnerability VCID-5a7s-trej-63cj
4
vulnerability VCID-5pky-1svz-nqf6
5
vulnerability VCID-5ub6-8d2s-53hj
6
vulnerability VCID-a5ed-jnjb-pybr
7
vulnerability VCID-b489-x5z3-pkfh
8
vulnerability VCID-bsjb-frkp-b3an
9
vulnerability VCID-c628-5r9h-37ad
10
vulnerability VCID-cue5-u48q-87ft
11
vulnerability VCID-e93r-zft5-33dk
12
vulnerability VCID-gc5z-hy4a-8uft
13
vulnerability VCID-gp93-s21f-8fh7
14
vulnerability VCID-ju7x-j33y-8khv
15
vulnerability VCID-nfem-925f-bfdw
16
vulnerability VCID-nqd8-35a9-7bc5
17
vulnerability VCID-r65y-py21-u3eu
18
vulnerability VCID-re7g-2nvj-j3dp
19
vulnerability VCID-wf9y-4uwu-gkaz
20
vulnerability VCID-whhu-jy51-qkec
21
vulnerability VCID-wkrz-dcvc-5ugc
22
vulnerability VCID-ypmp-rsaw-s3hb
23
vulnerability VCID-yvkr-qhaj-bfcx
24
vulnerability VCID-zj24-rwt5-g3dg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@3.0.0-4%252Bdeb9u4
1
url pkg:deb/debian/libvirt@5.0.0-4%2Bdeb10u1
purl pkg:deb/debian/libvirt@5.0.0-4%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2ska-hmbg-kqdw
1
vulnerability VCID-5a7s-trej-63cj
2
vulnerability VCID-5pky-1svz-nqf6
3
vulnerability VCID-5ub6-8d2s-53hj
4
vulnerability VCID-bsjb-frkp-b3an
5
vulnerability VCID-c628-5r9h-37ad
6
vulnerability VCID-cue5-u48q-87ft
7
vulnerability VCID-ju7x-j33y-8khv
8
vulnerability VCID-nqd8-35a9-7bc5
9
vulnerability VCID-r65y-py21-u3eu
10
vulnerability VCID-wf9y-4uwu-gkaz
11
vulnerability VCID-wkrz-dcvc-5ugc
12
vulnerability VCID-ypmp-rsaw-s3hb
13
vulnerability VCID-zj24-rwt5-g3dg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@5.0.0-4%252Bdeb10u1
aliases CVE-2019-10167
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nfem-925f-bfdw
20
url VCID-nqd8-35a9-7bc5
vulnerability_id VCID-nqd8-35a9-7bc5
summary libvirt: off-by-one error in udevListInterfacesByStatus()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-1441.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-1441.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-1441
reference_id
reference_type
scores
0
value 0.00056
scoring_system epss
scoring_elements 0.17565
published_at 2026-04-21T12:55:00Z
1
value 0.00056
scoring_system epss
scoring_elements 0.17676
published_at 2026-04-11T12:55:00Z
2
value 0.00056
scoring_system epss
scoring_elements 0.1763
published_at 2026-04-12T12:55:00Z
3
value 0.00056
scoring_system epss
scoring_elements 0.17577
published_at 2026-04-13T12:55:00Z
4
value 0.00056
scoring_system epss
scoring_elements 0.17523
published_at 2026-04-16T12:55:00Z
5
value 0.00056
scoring_system epss
scoring_elements 0.17531
published_at 2026-04-18T12:55:00Z
6
value 0.00056
scoring_system epss
scoring_elements 0.17508
published_at 2026-04-07T12:55:00Z
7
value 0.00056
scoring_system epss
scoring_elements 0.17597
published_at 2026-04-08T12:55:00Z
8
value 0.00056
scoring_system epss
scoring_elements 0.17658
published_at 2026-04-09T12:55:00Z
9
value 0.00061
scoring_system epss
scoring_elements 0.19217
published_at 2026-04-02T12:55:00Z
10
value 0.00061
scoring_system epss
scoring_elements 0.19269
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-1441
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1441
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1441
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1066058
reference_id 1066058
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1066058
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2263841
reference_id 2263841
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T17:29:32Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2263841
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_virtualization:8::el8
reference_id cpe:/a:redhat:advanced_virtualization:8::el8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_virtualization:8::el8
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
12
reference_url https://access.redhat.com/security/cve/CVE-2024-1441
reference_id CVE-2024-1441
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T17:29:32Z/
url https://access.redhat.com/security/cve/CVE-2024-1441
13
reference_url https://access.redhat.com/errata/RHSA-2024:2560
reference_id RHSA-2024:2560
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T17:29:32Z/
url https://access.redhat.com/errata/RHSA-2024:2560
14
reference_url https://usn.ubuntu.com/6734-1/
reference_id USN-6734-1
reference_type
scores
url https://usn.ubuntu.com/6734-1/
15
reference_url https://usn.ubuntu.com/6734-2/
reference_id USN-6734-2
reference_type
scores
url https://usn.ubuntu.com/6734-2/
fixed_packages
0
url pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3
purl pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ubdh-hdtv-akgt
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3
aliases CVE-2024-1441
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nqd8-35a9-7bc5
21
url VCID-pqce-1qud-kbef
vulnerability_id VCID-pqce-1qud-kbef
summary libvirt: libvirt-domain.c supports virDomainGetTime API calls with an RO connection instead of RW connection
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10746.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10746.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-10746
reference_id
reference_type
scores
0
value 0.00527
scoring_system epss
scoring_elements 0.67051
published_at 2026-04-01T12:55:00Z
1
value 0.00527
scoring_system epss
scoring_elements 0.67151
published_at 2026-04-21T12:55:00Z
2
value 0.00527
scoring_system epss
scoring_elements 0.67123
published_at 2026-04-13T12:55:00Z
3
value 0.00527
scoring_system epss
scoring_elements 0.67156
published_at 2026-04-16T12:55:00Z
4
value 0.00527
scoring_system epss
scoring_elements 0.6717
published_at 2026-04-18T12:55:00Z
5
value 0.00527
scoring_system epss
scoring_elements 0.67089
published_at 2026-04-02T12:55:00Z
6
value 0.00527
scoring_system epss
scoring_elements 0.67112
published_at 2026-04-04T12:55:00Z
7
value 0.00527
scoring_system epss
scoring_elements 0.67087
published_at 2026-04-07T12:55:00Z
8
value 0.00527
scoring_system epss
scoring_elements 0.67136
published_at 2026-04-08T12:55:00Z
9
value 0.00527
scoring_system epss
scoring_elements 0.67148
published_at 2026-04-09T12:55:00Z
10
value 0.00527
scoring_system epss
scoring_elements 0.67167
published_at 2026-04-11T12:55:00Z
11
value 0.00527
scoring_system epss
scoring_elements 0.67153
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-10746
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10746
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/libvirt/libvirt/commit/506e9d6c2d4baaf580d489fff0690c0ff2ff588f
reference_id
reference_type
scores
url https://github.com/libvirt/libvirt/commit/506e9d6c2d4baaf580d489fff0690c0ff2ff588f
5
reference_url https://github.com/libvirt/libvirt/compare/11288f5...8fd6867
reference_id
reference_type
scores
url https://github.com/libvirt/libvirt/compare/11288f5...8fd6867
6
reference_url https://lists.debian.org/debian-lts-announce/2019/04/msg00032.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/04/msg00032.html
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1705507
reference_id 1705507
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1705507
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-10746
reference_id CVE-2016-10746
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-10746
fixed_packages
0
url pkg:deb/debian/libvirt@3.0.0-4%2Bdeb9u2~bpo8%2B1
purl pkg:deb/debian/libvirt@3.0.0-4%2Bdeb9u2~bpo8%2B1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2ska-hmbg-kqdw
1
vulnerability VCID-3xk5-72kc-5uhu
2
vulnerability VCID-425h-bz55-yfad
3
vulnerability VCID-5a7s-trej-63cj
4
vulnerability VCID-5pky-1svz-nqf6
5
vulnerability VCID-5ub6-8d2s-53hj
6
vulnerability VCID-a5ed-jnjb-pybr
7
vulnerability VCID-b489-x5z3-pkfh
8
vulnerability VCID-bsjb-frkp-b3an
9
vulnerability VCID-c628-5r9h-37ad
10
vulnerability VCID-cue5-u48q-87ft
11
vulnerability VCID-e93r-zft5-33dk
12
vulnerability VCID-gc5z-hy4a-8uft
13
vulnerability VCID-gp93-s21f-8fh7
14
vulnerability VCID-ju7x-j33y-8khv
15
vulnerability VCID-nfem-925f-bfdw
16
vulnerability VCID-nqd8-35a9-7bc5
17
vulnerability VCID-r65y-py21-u3eu
18
vulnerability VCID-re7g-2nvj-j3dp
19
vulnerability VCID-wf9y-4uwu-gkaz
20
vulnerability VCID-whhu-jy51-qkec
21
vulnerability VCID-wkrz-dcvc-5ugc
22
vulnerability VCID-ypmp-rsaw-s3hb
23
vulnerability VCID-yvkr-qhaj-bfcx
24
vulnerability VCID-zj24-rwt5-g3dg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@3.0.0-4%252Bdeb9u2~bpo8%252B1
aliases CVE-2016-10746
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pqce-1qud-kbef
22
url VCID-r65y-py21-u3eu
vulnerability_id VCID-r65y-py21-u3eu
summary libvirt: segmentation fault during VM shutdown can lead to vdsm hang
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3975.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3975.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-3975
reference_id
reference_type
scores
0
value 0.00522
scoring_system epss
scoring_elements 0.66795
published_at 2026-04-01T12:55:00Z
1
value 0.00522
scoring_system epss
scoring_elements 0.66834
published_at 2026-04-02T12:55:00Z
2
value 0.00522
scoring_system epss
scoring_elements 0.6686
published_at 2026-04-04T12:55:00Z
3
value 0.00522
scoring_system epss
scoring_elements 0.66832
published_at 2026-04-07T12:55:00Z
4
value 0.00522
scoring_system epss
scoring_elements 0.66881
published_at 2026-04-08T12:55:00Z
5
value 0.00522
scoring_system epss
scoring_elements 0.66894
published_at 2026-04-09T12:55:00Z
6
value 0.00522
scoring_system epss
scoring_elements 0.66914
published_at 2026-04-11T12:55:00Z
7
value 0.00522
scoring_system epss
scoring_elements 0.669
published_at 2026-04-12T12:55:00Z
8
value 0.00522
scoring_system epss
scoring_elements 0.66868
published_at 2026-04-13T12:55:00Z
9
value 0.00522
scoring_system epss
scoring_elements 0.66901
published_at 2026-04-16T12:55:00Z
10
value 0.00522
scoring_system epss
scoring_elements 0.66915
published_at 2026-04-18T12:55:00Z
11
value 0.00522
scoring_system epss
scoring_elements 0.66898
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-3975
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3975
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2024326
reference_id 2024326
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2024326
5
reference_url https://access.redhat.com/errata/RHSA-2022:1759
reference_id RHSA-2022:1759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1759
6
reference_url https://usn.ubuntu.com/5399-1/
reference_id USN-5399-1
reference_type
scores
url https://usn.ubuntu.com/5399-1/
fixed_packages
0
url pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3
purl pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ubdh-hdtv-akgt
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3
aliases CVE-2021-3975
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r65y-py21-u3eu
23
url VCID-re7g-2nvj-j3dp
vulnerability_id VCID-re7g-2nvj-j3dp
summary
Multiple vulnerabilities have been discovered in libvirt, the worst
    of which may result in the execution of arbitrary commands.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5748.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5748.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-5748
reference_id
reference_type
scores
0
value 0.01494
scoring_system epss
scoring_elements 0.81013
published_at 2026-04-01T12:55:00Z
1
value 0.01494
scoring_system epss
scoring_elements 0.81022
published_at 2026-04-02T12:55:00Z
2
value 0.01494
scoring_system epss
scoring_elements 0.81045
published_at 2026-04-07T12:55:00Z
3
value 0.01494
scoring_system epss
scoring_elements 0.81073
published_at 2026-04-08T12:55:00Z
4
value 0.01494
scoring_system epss
scoring_elements 0.81079
published_at 2026-04-09T12:55:00Z
5
value 0.01494
scoring_system epss
scoring_elements 0.81097
published_at 2026-04-11T12:55:00Z
6
value 0.01494
scoring_system epss
scoring_elements 0.81083
published_at 2026-04-12T12:55:00Z
7
value 0.01494
scoring_system epss
scoring_elements 0.81076
published_at 2026-04-13T12:55:00Z
8
value 0.01494
scoring_system epss
scoring_elements 0.81113
published_at 2026-04-16T12:55:00Z
9
value 0.01494
scoring_system epss
scoring_elements 0.81115
published_at 2026-04-18T12:55:00Z
10
value 0.01494
scoring_system epss
scoring_elements 0.81112
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-5748
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5748
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1528396
reference_id 1528396
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1528396
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=887700
reference_id 887700
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=887700
6
reference_url https://security.gentoo.org/glsa/201804-07
reference_id GLSA-201804-07
reference_type
scores
url https://security.gentoo.org/glsa/201804-07
7
reference_url https://security.gentoo.org/glsa/201804-08
reference_id GLSA-201804-08
reference_type
scores
url https://security.gentoo.org/glsa/201804-08
8
reference_url https://access.redhat.com/errata/RHSA-2018:1396
reference_id RHSA-2018:1396
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1396
9
reference_url https://access.redhat.com/errata/RHSA-2018:1929
reference_id RHSA-2018:1929
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1929
10
reference_url https://usn.ubuntu.com/3576-1/
reference_id USN-3576-1
reference_type
scores
url https://usn.ubuntu.com/3576-1/
fixed_packages
0
url pkg:deb/debian/libvirt@5.0.0-4%2Bdeb10u1
purl pkg:deb/debian/libvirt@5.0.0-4%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2ska-hmbg-kqdw
1
vulnerability VCID-5a7s-trej-63cj
2
vulnerability VCID-5pky-1svz-nqf6
3
vulnerability VCID-5ub6-8d2s-53hj
4
vulnerability VCID-bsjb-frkp-b3an
5
vulnerability VCID-c628-5r9h-37ad
6
vulnerability VCID-cue5-u48q-87ft
7
vulnerability VCID-ju7x-j33y-8khv
8
vulnerability VCID-nqd8-35a9-7bc5
9
vulnerability VCID-r65y-py21-u3eu
10
vulnerability VCID-wf9y-4uwu-gkaz
11
vulnerability VCID-wkrz-dcvc-5ugc
12
vulnerability VCID-ypmp-rsaw-s3hb
13
vulnerability VCID-zj24-rwt5-g3dg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@5.0.0-4%252Bdeb10u1
aliases CVE-2018-5748
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-re7g-2nvj-j3dp
24
url VCID-smdn-m8vh-9bb8
vulnerability_id VCID-smdn-m8vh-9bb8
summary libvirt: denial of service when volume creation fails on NFS pool
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5247.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5247.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-5247
reference_id
reference_type
scores
0
value 0.00485
scoring_system epss
scoring_elements 0.65368
published_at 2026-04-21T12:55:00Z
1
value 0.00485
scoring_system epss
scoring_elements 0.65384
published_at 2026-04-18T12:55:00Z
2
value 0.00485
scoring_system epss
scoring_elements 0.65255
published_at 2026-04-01T12:55:00Z
3
value 0.00485
scoring_system epss
scoring_elements 0.65305
published_at 2026-04-02T12:55:00Z
4
value 0.00485
scoring_system epss
scoring_elements 0.6533
published_at 2026-04-04T12:55:00Z
5
value 0.00485
scoring_system epss
scoring_elements 0.65295
published_at 2026-04-07T12:55:00Z
6
value 0.00485
scoring_system epss
scoring_elements 0.65347
published_at 2026-04-08T12:55:00Z
7
value 0.00485
scoring_system epss
scoring_elements 0.65358
published_at 2026-04-09T12:55:00Z
8
value 0.00485
scoring_system epss
scoring_elements 0.65377
published_at 2026-04-11T12:55:00Z
9
value 0.00485
scoring_system epss
scoring_elements 0.65365
published_at 2026-04-12T12:55:00Z
10
value 0.00485
scoring_system epss
scoring_elements 0.65337
published_at 2026-04-13T12:55:00Z
11
value 0.00485
scoring_system epss
scoring_elements 0.65372
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-5247
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5247
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5247
3
reference_url http://security.libvirt.org/2015/0003.html
reference_id
reference_type
scores
url http://security.libvirt.org/2015/0003.html
4
reference_url http://www.ubuntu.com/usn/USN-2867-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2867-1
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1259350
reference_id 1259350
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1259350
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=799132
reference_id 799132
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=799132
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:1.2.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.14:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:1.2.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.15:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:1.2.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.16:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:1.2.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.17:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:1.2.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.18:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:1.2.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.19:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-5247
reference_id CVE-2015-5247
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2015-5247
18
reference_url https://usn.ubuntu.com/2867-1/
reference_id USN-2867-1
reference_type
scores
url https://usn.ubuntu.com/2867-1/
fixed_packages
0
url pkg:deb/debian/libvirt@3.0.0-4%2Bdeb9u2~bpo8%2B1
purl pkg:deb/debian/libvirt@3.0.0-4%2Bdeb9u2~bpo8%2B1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2ska-hmbg-kqdw
1
vulnerability VCID-3xk5-72kc-5uhu
2
vulnerability VCID-425h-bz55-yfad
3
vulnerability VCID-5a7s-trej-63cj
4
vulnerability VCID-5pky-1svz-nqf6
5
vulnerability VCID-5ub6-8d2s-53hj
6
vulnerability VCID-a5ed-jnjb-pybr
7
vulnerability VCID-b489-x5z3-pkfh
8
vulnerability VCID-bsjb-frkp-b3an
9
vulnerability VCID-c628-5r9h-37ad
10
vulnerability VCID-cue5-u48q-87ft
11
vulnerability VCID-e93r-zft5-33dk
12
vulnerability VCID-gc5z-hy4a-8uft
13
vulnerability VCID-gp93-s21f-8fh7
14
vulnerability VCID-ju7x-j33y-8khv
15
vulnerability VCID-nfem-925f-bfdw
16
vulnerability VCID-nqd8-35a9-7bc5
17
vulnerability VCID-r65y-py21-u3eu
18
vulnerability VCID-re7g-2nvj-j3dp
19
vulnerability VCID-wf9y-4uwu-gkaz
20
vulnerability VCID-whhu-jy51-qkec
21
vulnerability VCID-wkrz-dcvc-5ugc
22
vulnerability VCID-ypmp-rsaw-s3hb
23
vulnerability VCID-yvkr-qhaj-bfcx
24
vulnerability VCID-zj24-rwt5-g3dg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@3.0.0-4%252Bdeb9u2~bpo8%252B1
aliases CVE-2015-5247
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-smdn-m8vh-9bb8
25
url VCID-wf9y-4uwu-gkaz
vulnerability_id VCID-wf9y-4uwu-gkaz
summary A vulnerability in libvirt may allow root privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14339.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14339.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14339
reference_id
reference_type
scores
0
value 0.00076
scoring_system epss
scoring_elements 0.22741
published_at 2026-04-01T12:55:00Z
1
value 0.00076
scoring_system epss
scoring_elements 0.22773
published_at 2026-04-21T12:55:00Z
2
value 0.00076
scoring_system epss
scoring_elements 0.22819
published_at 2026-04-16T12:55:00Z
3
value 0.00076
scoring_system epss
scoring_elements 0.22813
published_at 2026-04-18T12:55:00Z
4
value 0.00076
scoring_system epss
scoring_elements 0.22914
published_at 2026-04-02T12:55:00Z
5
value 0.00076
scoring_system epss
scoring_elements 0.22957
published_at 2026-04-04T12:55:00Z
6
value 0.00076
scoring_system epss
scoring_elements 0.2275
published_at 2026-04-07T12:55:00Z
7
value 0.00076
scoring_system epss
scoring_elements 0.22826
published_at 2026-04-08T12:55:00Z
8
value 0.00076
scoring_system epss
scoring_elements 0.22879
published_at 2026-04-09T12:55:00Z
9
value 0.00076
scoring_system epss
scoring_elements 0.22899
published_at 2026-04-11T12:55:00Z
10
value 0.00076
scoring_system epss
scoring_elements 0.22861
published_at 2026-04-12T12:55:00Z
11
value 0.00076
scoring_system epss
scoring_elements 0.22805
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14339
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14339
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14339
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1860069
reference_id 1860069
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1860069
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=966563
reference_id 966563
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=966563
6
reference_url https://security.archlinux.org/ASA-202009-8
reference_id ASA-202009-8
reference_type
scores
url https://security.archlinux.org/ASA-202009-8
7
reference_url https://security.archlinux.org/AVG-1232
reference_id AVG-1232
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1232
8
reference_url https://security.gentoo.org/glsa/202101-22
reference_id GLSA-202101-22
reference_type
scores
url https://security.gentoo.org/glsa/202101-22
9
reference_url https://security.gentoo.org/glsa/202210-06
reference_id GLSA-202210-06
reference_type
scores
url https://security.gentoo.org/glsa/202210-06
10
reference_url https://access.redhat.com/errata/RHSA-2020:3586
reference_id RHSA-2020:3586
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3586
11
reference_url https://access.redhat.com/errata/RHSA-2020:4676
reference_id RHSA-2020:4676
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4676
fixed_packages
0
url pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3
purl pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ubdh-hdtv-akgt
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3
aliases CVE-2020-14339
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wf9y-4uwu-gkaz
26
url VCID-whhu-jy51-qkec
vulnerability_id VCID-whhu-jy51-qkec
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000256.json
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000256.json
1
reference_url https://access.redhat.com/security/cve/CVE-2017-1000256
reference_id
reference_type
scores
url https://access.redhat.com/security/cve/CVE-2017-1000256
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-1000256
reference_id
reference_type
scores
0
value 0.00778
scoring_system epss
scoring_elements 0.73592
published_at 2026-04-01T12:55:00Z
1
value 0.00904
scoring_system epss
scoring_elements 0.75744
published_at 2026-04-21T12:55:00Z
2
value 0.00904
scoring_system epss
scoring_elements 0.75755
published_at 2026-04-16T12:55:00Z
3
value 0.00904
scoring_system epss
scoring_elements 0.75758
published_at 2026-04-18T12:55:00Z
4
value 0.01015
scoring_system epss
scoring_elements 0.77097
published_at 2026-04-02T12:55:00Z
5
value 0.01015
scoring_system epss
scoring_elements 0.77108
published_at 2026-04-07T12:55:00Z
6
value 0.01015
scoring_system epss
scoring_elements 0.77141
published_at 2026-04-08T12:55:00Z
7
value 0.01015
scoring_system epss
scoring_elements 0.7715
published_at 2026-04-09T12:55:00Z
8
value 0.01015
scoring_system epss
scoring_elements 0.77178
published_at 2026-04-11T12:55:00Z
9
value 0.01015
scoring_system epss
scoring_elements 0.77156
published_at 2026-04-12T12:55:00Z
10
value 0.01015
scoring_system epss
scoring_elements 0.77152
published_at 2026-04-13T12:55:00Z
11
value 0.01015
scoring_system epss
scoring_elements 0.77126
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-1000256
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000256
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000256
4
reference_url https://www.mail-archive.com/debian-bugs-dist%40lists.debian.org/msg1556251.html
reference_id
reference_type
scores
url https://www.mail-archive.com/debian-bugs-dist%40lists.debian.org/msg1556251.html
5
reference_url https://www.redhat.com/archives/libvirt-announce/2017-October/msg00001.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/libvirt-announce/2017-October/msg00001.html
6
reference_url http://www.debian.org/security/2017/dsa-4003
reference_id
reference_type
scores
url http://www.debian.org/security/2017/dsa-4003
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1503658
reference_id 1503658
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1503658
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878799
reference_id 878799
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878799
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-1000256
reference_id CVE-2017-1000256
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-1000256
12
reference_url https://usn.ubuntu.com/3576-1/
reference_id USN-3576-1
reference_type
scores
url https://usn.ubuntu.com/3576-1/
fixed_packages
0
url pkg:deb/debian/libvirt@3.0.0-4%2Bdeb9u2~bpo8%2B1
purl pkg:deb/debian/libvirt@3.0.0-4%2Bdeb9u2~bpo8%2B1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2ska-hmbg-kqdw
1
vulnerability VCID-3xk5-72kc-5uhu
2
vulnerability VCID-425h-bz55-yfad
3
vulnerability VCID-5a7s-trej-63cj
4
vulnerability VCID-5pky-1svz-nqf6
5
vulnerability VCID-5ub6-8d2s-53hj
6
vulnerability VCID-a5ed-jnjb-pybr
7
vulnerability VCID-b489-x5z3-pkfh
8
vulnerability VCID-bsjb-frkp-b3an
9
vulnerability VCID-c628-5r9h-37ad
10
vulnerability VCID-cue5-u48q-87ft
11
vulnerability VCID-e93r-zft5-33dk
12
vulnerability VCID-gc5z-hy4a-8uft
13
vulnerability VCID-gp93-s21f-8fh7
14
vulnerability VCID-ju7x-j33y-8khv
15
vulnerability VCID-nfem-925f-bfdw
16
vulnerability VCID-nqd8-35a9-7bc5
17
vulnerability VCID-r65y-py21-u3eu
18
vulnerability VCID-re7g-2nvj-j3dp
19
vulnerability VCID-wf9y-4uwu-gkaz
20
vulnerability VCID-whhu-jy51-qkec
21
vulnerability VCID-wkrz-dcvc-5ugc
22
vulnerability VCID-ypmp-rsaw-s3hb
23
vulnerability VCID-yvkr-qhaj-bfcx
24
vulnerability VCID-zj24-rwt5-g3dg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@3.0.0-4%252Bdeb9u2~bpo8%252B1
1
url pkg:deb/debian/libvirt@5.0.0-4%2Bdeb10u1
purl pkg:deb/debian/libvirt@5.0.0-4%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2ska-hmbg-kqdw
1
vulnerability VCID-5a7s-trej-63cj
2
vulnerability VCID-5pky-1svz-nqf6
3
vulnerability VCID-5ub6-8d2s-53hj
4
vulnerability VCID-bsjb-frkp-b3an
5
vulnerability VCID-c628-5r9h-37ad
6
vulnerability VCID-cue5-u48q-87ft
7
vulnerability VCID-ju7x-j33y-8khv
8
vulnerability VCID-nqd8-35a9-7bc5
9
vulnerability VCID-r65y-py21-u3eu
10
vulnerability VCID-wf9y-4uwu-gkaz
11
vulnerability VCID-wkrz-dcvc-5ugc
12
vulnerability VCID-ypmp-rsaw-s3hb
13
vulnerability VCID-zj24-rwt5-g3dg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@5.0.0-4%252Bdeb10u1
aliases CVE-2017-1000256
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-whhu-jy51-qkec
27
url VCID-wkrz-dcvc-5ugc
vulnerability_id VCID-wkrz-dcvc-5ugc
summary libvirt: NULL pointer dereference in udevConnectListAllInterfaces()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2496.json
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2496.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-2496
reference_id
reference_type
scores
0
value 0.00037
scoring_system epss
scoring_elements 0.10938
published_at 2026-04-21T12:55:00Z
1
value 0.00037
scoring_system epss
scoring_elements 0.10994
published_at 2026-04-09T12:55:00Z
2
value 0.00037
scoring_system epss
scoring_elements 0.10996
published_at 2026-04-11T12:55:00Z
3
value 0.00037
scoring_system epss
scoring_elements 0.10963
published_at 2026-04-12T12:55:00Z
4
value 0.00037
scoring_system epss
scoring_elements 0.10805
published_at 2026-04-16T12:55:00Z
5
value 0.00037
scoring_system epss
scoring_elements 0.10818
published_at 2026-04-18T12:55:00Z
6
value 0.00037
scoring_system epss
scoring_elements 0.10865
published_at 2026-04-07T12:55:00Z
7
value 0.00037
scoring_system epss
scoring_elements 0.1094
published_at 2026-04-13T12:55:00Z
8
value 0.00059
scoring_system epss
scoring_elements 0.18628
published_at 2026-04-02T12:55:00Z
9
value 0.00059
scoring_system epss
scoring_elements 0.18683
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-2496
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2496
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2496
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2269672
reference_id 2269672
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T19:25:01Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2269672
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_virtualization:8::el8
reference_id cpe:/a:redhat:advanced_virtualization:8::el8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_virtualization:8::el8
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
11
reference_url https://access.redhat.com/security/cve/CVE-2024-2496
reference_id CVE-2024-2496
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T19:25:01Z/
url https://access.redhat.com/security/cve/CVE-2024-2496
12
reference_url https://access.redhat.com/errata/RHSA-2024:2236
reference_id RHSA-2024:2236
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T19:25:01Z/
url https://access.redhat.com/errata/RHSA-2024:2236
13
reference_url https://usn.ubuntu.com/6734-1/
reference_id USN-6734-1
reference_type
scores
url https://usn.ubuntu.com/6734-1/
fixed_packages
0
url pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3
purl pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ubdh-hdtv-akgt
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3
aliases CVE-2024-2496
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wkrz-dcvc-5ugc
28
url VCID-ypmp-rsaw-s3hb
vulnerability_id VCID-ypmp-rsaw-s3hb
summary Multiple vulnerabilities have been discovered in libvirt, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0897.json
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0897.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-0897
reference_id
reference_type
scores
0
value 0.00054
scoring_system epss
scoring_elements 0.16768
published_at 2026-04-01T12:55:00Z
1
value 0.00054
scoring_system epss
scoring_elements 0.16935
published_at 2026-04-02T12:55:00Z
2
value 0.00054
scoring_system epss
scoring_elements 0.16773
published_at 2026-04-07T12:55:00Z
3
value 0.00054
scoring_system epss
scoring_elements 0.16991
published_at 2026-04-04T12:55:00Z
4
value 0.00054
scoring_system epss
scoring_elements 0.16862
published_at 2026-04-08T12:55:00Z
5
value 0.00054
scoring_system epss
scoring_elements 0.16919
published_at 2026-04-09T12:55:00Z
6
value 0.00054
scoring_system epss
scoring_elements 0.16893
published_at 2026-04-11T12:55:00Z
7
value 0.00054
scoring_system epss
scoring_elements 0.16848
published_at 2026-04-12T12:55:00Z
8
value 0.00054
scoring_system epss
scoring_elements 0.16789
published_at 2026-04-13T12:55:00Z
9
value 0.00078
scoring_system epss
scoring_elements 0.23188
published_at 2026-04-18T12:55:00Z
10
value 0.00078
scoring_system epss
scoring_elements 0.23148
published_at 2026-04-21T12:55:00Z
11
value 0.00078
scoring_system epss
scoring_elements 0.23195
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-0897
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0897
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0897
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1009075
reference_id 1009075
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1009075
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2063883
reference_id 2063883
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-08T15:53:19Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2063883
6
reference_url https://security.gentoo.org/glsa/202210-06
reference_id GLSA-202210-06
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-08T15:53:19Z/
url https://security.gentoo.org/glsa/202210-06
7
reference_url https://lists.debian.org/debian-lts-announce/2024/04/msg00000.html
reference_id msg00000.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-08T15:53:19Z/
url https://lists.debian.org/debian-lts-announce/2024/04/msg00000.html
8
reference_url https://access.redhat.com/errata/RHSA-2022:7472
reference_id RHSA-2022:7472
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7472
9
reference_url https://access.redhat.com/errata/RHSA-2022:8003
reference_id RHSA-2022:8003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8003
10
reference_url https://usn.ubuntu.com/5399-1/
reference_id USN-5399-1
reference_type
scores
url https://usn.ubuntu.com/5399-1/
11
reference_url https://usn.ubuntu.com/6126-1/
reference_id USN-6126-1
reference_type
scores
url https://usn.ubuntu.com/6126-1/
fixed_packages
0
url pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3
purl pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ubdh-hdtv-akgt
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3
aliases CVE-2022-0897
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ypmp-rsaw-s3hb
29
url VCID-yvkr-qhaj-bfcx
vulnerability_id VCID-yvkr-qhaj-bfcx
summary
Multiple vulnerabilities have been discovered in libvirt, the worst
    of which may result in the execution of arbitrary commands.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6764.json
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6764.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-6764
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10649
published_at 2026-04-01T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10789
published_at 2026-04-02T12:55:00Z
2
value 0.00036
scoring_system epss
scoring_elements 0.10851
published_at 2026-04-04T12:55:00Z
3
value 0.00036
scoring_system epss
scoring_elements 0.10678
published_at 2026-04-07T12:55:00Z
4
value 0.00036
scoring_system epss
scoring_elements 0.10754
published_at 2026-04-08T12:55:00Z
5
value 0.00036
scoring_system epss
scoring_elements 0.10811
published_at 2026-04-09T12:55:00Z
6
value 0.00036
scoring_system epss
scoring_elements 0.10824
published_at 2026-04-11T12:55:00Z
7
value 0.00036
scoring_system epss
scoring_elements 0.10794
published_at 2026-04-12T12:55:00Z
8
value 0.00036
scoring_system epss
scoring_elements 0.10769
published_at 2026-04-13T12:55:00Z
9
value 0.00036
scoring_system epss
scoring_elements 0.1063
published_at 2026-04-16T12:55:00Z
10
value 0.00036
scoring_system epss
scoring_elements 0.10646
published_at 2026-04-18T12:55:00Z
11
value 0.00036
scoring_system epss
scoring_elements 0.10771
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-6764
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6764
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1541444
reference_id 1541444
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1541444
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=889839
reference_id 889839
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=889839
6
reference_url https://security.gentoo.org/glsa/201804-07
reference_id GLSA-201804-07
reference_type
scores
url https://security.gentoo.org/glsa/201804-07
7
reference_url https://access.redhat.com/errata/RHSA-2018:3113
reference_id RHSA-2018:3113
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3113
8
reference_url https://usn.ubuntu.com/3576-1/
reference_id USN-3576-1
reference_type
scores
url https://usn.ubuntu.com/3576-1/
fixed_packages
0
url pkg:deb/debian/libvirt@5.0.0-4%2Bdeb10u1
purl pkg:deb/debian/libvirt@5.0.0-4%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2ska-hmbg-kqdw
1
vulnerability VCID-5a7s-trej-63cj
2
vulnerability VCID-5pky-1svz-nqf6
3
vulnerability VCID-5ub6-8d2s-53hj
4
vulnerability VCID-bsjb-frkp-b3an
5
vulnerability VCID-c628-5r9h-37ad
6
vulnerability VCID-cue5-u48q-87ft
7
vulnerability VCID-ju7x-j33y-8khv
8
vulnerability VCID-nqd8-35a9-7bc5
9
vulnerability VCID-r65y-py21-u3eu
10
vulnerability VCID-wf9y-4uwu-gkaz
11
vulnerability VCID-wkrz-dcvc-5ugc
12
vulnerability VCID-ypmp-rsaw-s3hb
13
vulnerability VCID-zj24-rwt5-g3dg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@5.0.0-4%252Bdeb10u1
aliases CVE-2018-6764
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yvkr-qhaj-bfcx
30
url VCID-zj24-rwt5-g3dg
vulnerability_id VCID-zj24-rwt5-g3dg
summary Multiple vulnerabilities have been discovered in libvirt, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3631.json
reference_id
reference_type
scores
0
value 3.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3631.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-3631
reference_id
reference_type
scores
0
value 0.00067
scoring_system epss
scoring_elements 0.20867
published_at 2026-04-02T12:55:00Z
1
value 0.00067
scoring_system epss
scoring_elements 0.20634
published_at 2026-04-21T12:55:00Z
2
value 0.00067
scoring_system epss
scoring_elements 0.20724
published_at 2026-04-01T12:55:00Z
3
value 0.00067
scoring_system epss
scoring_elements 0.20639
published_at 2026-04-07T12:55:00Z
4
value 0.00067
scoring_system epss
scoring_elements 0.20716
published_at 2026-04-08T12:55:00Z
5
value 0.00067
scoring_system epss
scoring_elements 0.20776
published_at 2026-04-09T12:55:00Z
6
value 0.00067
scoring_system epss
scoring_elements 0.20794
published_at 2026-04-11T12:55:00Z
7
value 0.00067
scoring_system epss
scoring_elements 0.20751
published_at 2026-04-12T12:55:00Z
8
value 0.00067
scoring_system epss
scoring_elements 0.20699
published_at 2026-04-13T12:55:00Z
9
value 0.00067
scoring_system epss
scoring_elements 0.20689
published_at 2026-04-16T12:55:00Z
10
value 0.00067
scoring_system epss
scoring_elements 0.20643
published_at 2026-04-18T12:55:00Z
11
value 0.00067
scoring_system epss
scoring_elements 0.20926
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-3631
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3631
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3631
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/libvirt/libvirt/-/commit/15073504dbb624d3f6c911e85557019d3620fdb2
reference_id 15073504dbb624d3f6c911e85557019d3620fdb2
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-19T19:33:05Z/
url https://gitlab.com/libvirt/libvirt/-/commit/15073504dbb624d3f6c911e85557019d3620fdb2
5
reference_url https://gitlab.com/libvirt/libvirt/-/issues/153
reference_id 153
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-19T19:33:05Z/
url https://gitlab.com/libvirt/libvirt/-/issues/153
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1977726
reference_id 1977726
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-19T19:33:05Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=1977726
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990709
reference_id 990709
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990709
8
reference_url https://security.archlinux.org/AVG-2124
reference_id AVG-2124
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2124
9
reference_url https://security.gentoo.org/glsa/202210-06
reference_id GLSA-202210-06
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-19T19:33:05Z/
url https://security.gentoo.org/glsa/202210-06
10
reference_url https://lists.debian.org/debian-lts-announce/2024/04/msg00000.html
reference_id msg00000.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-19T19:33:05Z/
url https://lists.debian.org/debian-lts-announce/2024/04/msg00000.html
11
reference_url https://security.netapp.com/advisory/ntap-20220331-0010/
reference_id ntap-20220331-0010
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-19T19:33:05Z/
url https://security.netapp.com/advisory/ntap-20220331-0010/
12
reference_url https://access.redhat.com/errata/RHSA-2021:3631
reference_id RHSA-2021:3631
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-19T19:33:05Z/
url https://access.redhat.com/errata/RHSA-2021:3631
13
reference_url https://access.redhat.com/errata/RHSA-2021:3703
reference_id RHSA-2021:3703
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3703
14
reference_url https://access.redhat.com/errata/RHSA-2021:3704
reference_id RHSA-2021:3704
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3704
15
reference_url https://access.redhat.com/errata/RHSA-2021:4191
reference_id RHSA-2021:4191
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4191
16
reference_url https://usn.ubuntu.com/5399-1/
reference_id USN-5399-1
reference_type
scores
url https://usn.ubuntu.com/5399-1/
fixed_packages
0
url pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3
purl pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ubdh-hdtv-akgt
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3
aliases CVE-2021-3631
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zj24-rwt5-g3dg
Fixing_vulnerabilities
0
url VCID-5wmb-1zue-tfh8
vulnerability_id VCID-5wmb-1zue-tfh8
summary
Multiple vulnerabilities have been found in libvirt, worst of which
    allows context-dependent attackers to cause Denial of Service.
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2015-01/msg00005.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-01/msg00005.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8131.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8131.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-8131
reference_id
reference_type
scores
0
value 0.00374
scoring_system epss
scoring_elements 0.59102
published_at 2026-04-21T12:55:00Z
1
value 0.00374
scoring_system epss
scoring_elements 0.58982
published_at 2026-04-01T12:55:00Z
2
value 0.00374
scoring_system epss
scoring_elements 0.59057
published_at 2026-04-02T12:55:00Z
3
value 0.00374
scoring_system epss
scoring_elements 0.5908
published_at 2026-04-04T12:55:00Z
4
value 0.00374
scoring_system epss
scoring_elements 0.59045
published_at 2026-04-07T12:55:00Z
5
value 0.00374
scoring_system epss
scoring_elements 0.59095
published_at 2026-04-08T12:55:00Z
6
value 0.00374
scoring_system epss
scoring_elements 0.591
published_at 2026-04-12T12:55:00Z
7
value 0.00374
scoring_system epss
scoring_elements 0.59119
published_at 2026-04-11T12:55:00Z
8
value 0.00374
scoring_system epss
scoring_elements 0.59081
published_at 2026-04-13T12:55:00Z
9
value 0.00374
scoring_system epss
scoring_elements 0.59118
published_at 2026-04-16T12:55:00Z
10
value 0.00374
scoring_system epss
scoring_elements 0.59122
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-8131
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8131
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8131
4
reference_url http://security.libvirt.org/2014/0008.html
reference_id
reference_type
scores
url http://security.libvirt.org/2014/0008.html
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1172569
reference_id 1172569
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1172569
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773858
reference_id 773858
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773858
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-8131
reference_id CVE-2014-8131
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-8131
9
reference_url https://security.gentoo.org/glsa/201412-36
reference_id GLSA-201412-36
reference_type
scores
url https://security.gentoo.org/glsa/201412-36
fixed_packages
0
url pkg:deb/debian/libvirt@1.2.9-9
purl pkg:deb/debian/libvirt@1.2.9-9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2ska-hmbg-kqdw
1
vulnerability VCID-3xk5-72kc-5uhu
2
vulnerability VCID-3zke-md7v-6be5
3
vulnerability VCID-425h-bz55-yfad
4
vulnerability VCID-4gha-yszs-x3hw
5
vulnerability VCID-5a7s-trej-63cj
6
vulnerability VCID-5pky-1svz-nqf6
7
vulnerability VCID-5ub6-8d2s-53hj
8
vulnerability VCID-8bqx-15w5-4kdm
9
vulnerability VCID-a5ed-jnjb-pybr
10
vulnerability VCID-b489-x5z3-pkfh
11
vulnerability VCID-bsjb-frkp-b3an
12
vulnerability VCID-c628-5r9h-37ad
13
vulnerability VCID-cue5-u48q-87ft
14
vulnerability VCID-e93r-zft5-33dk
15
vulnerability VCID-gc5z-hy4a-8uft
16
vulnerability VCID-gp93-s21f-8fh7
17
vulnerability VCID-hpgc-t8mr-qkan
18
vulnerability VCID-ju7x-j33y-8khv
19
vulnerability VCID-nfem-925f-bfdw
20
vulnerability VCID-nqd8-35a9-7bc5
21
vulnerability VCID-pqce-1qud-kbef
22
vulnerability VCID-r65y-py21-u3eu
23
vulnerability VCID-re7g-2nvj-j3dp
24
vulnerability VCID-smdn-m8vh-9bb8
25
vulnerability VCID-wf9y-4uwu-gkaz
26
vulnerability VCID-whhu-jy51-qkec
27
vulnerability VCID-wkrz-dcvc-5ugc
28
vulnerability VCID-ypmp-rsaw-s3hb
29
vulnerability VCID-yvkr-qhaj-bfcx
30
vulnerability VCID-zj24-rwt5-g3dg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@1.2.9-9
aliases CVE-2014-8131
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5wmb-1zue-tfh8
1
url VCID-bz31-74av-9kgf
vulnerability_id VCID-bz31-74av-9kgf
summary security update
references
0
reference_url http://libvirt.org/news.html
reference_id
reference_type
scores
url http://libvirt.org/news.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2014-05/msg00048.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-05/msg00048.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2014-05/msg00052.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-05/msg00052.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2014-0560.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-0560.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0179.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0179.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-0179
reference_id
reference_type
scores
0
value 0.00106
scoring_system epss
scoring_elements 0.28675
published_at 2026-04-21T12:55:00Z
1
value 0.00106
scoring_system epss
scoring_elements 0.28775
published_at 2026-04-01T12:55:00Z
2
value 0.00106
scoring_system epss
scoring_elements 0.28855
published_at 2026-04-02T12:55:00Z
3
value 0.00106
scoring_system epss
scoring_elements 0.28904
published_at 2026-04-04T12:55:00Z
4
value 0.00106
scoring_system epss
scoring_elements 0.28711
published_at 2026-04-07T12:55:00Z
5
value 0.00106
scoring_system epss
scoring_elements 0.28777
published_at 2026-04-08T12:55:00Z
6
value 0.00106
scoring_system epss
scoring_elements 0.28817
published_at 2026-04-09T12:55:00Z
7
value 0.00106
scoring_system epss
scoring_elements 0.2882
published_at 2026-04-11T12:55:00Z
8
value 0.00106
scoring_system epss
scoring_elements 0.28776
published_at 2026-04-12T12:55:00Z
9
value 0.00106
scoring_system epss
scoring_elements 0.28727
published_at 2026-04-13T12:55:00Z
10
value 0.00106
scoring_system epss
scoring_elements 0.28746
published_at 2026-04-16T12:55:00Z
11
value 0.00106
scoring_system epss
scoring_elements 0.28723
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-0179
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0179
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0179
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3633
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3633
8
reference_url http://secunia.com/advisories/60895
reference_id
reference_type
scores
url http://secunia.com/advisories/60895
9
reference_url http://security.gentoo.org/glsa/glsa-201412-04.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201412-04.xml
10
reference_url http://security.libvirt.org/2014/0003.html
reference_id
reference_type
scores
url http://security.libvirt.org/2014/0003.html
11
reference_url http://www.debian.org/security/2014/dsa-3038
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3038
12
reference_url http://www.ubuntu.com/usn/USN-2366-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2366-1
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1088290
reference_id 1088290
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1088290
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:enterprise_virtualization:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:enterprise_virtualization:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:enterprise_virtualization:3.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:0.10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:0.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.1:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:0.10.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.2:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:0.10.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.2.1:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:0.10.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.2.2:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:0.10.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.2.3:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:0.10.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.2.4:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:0.10.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.2.5:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:0.10.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.2.6:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:0.10.2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.2.7:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:0.10.2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.2.8:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:0.7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.5:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:0.7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.6:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:0.7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.7:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:0.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:0.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.1:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:0.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.2:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:0.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.3:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:0.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.4:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:0.8.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.5:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:0.8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.6:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:0.8.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.7:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:0.8.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.8:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:0.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:0.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:0.9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.10:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:0.9.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:0.9.11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11.1:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:0.9.11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11.2:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:0.9.11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11.3:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:0.9.11.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11.4:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:0.9.11.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11.5:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:0.9.11.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11.6:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:0.9.11.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11.7:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:0.9.11.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11.8:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:0.9.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.12:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:0.9.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.13:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:0.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.2:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:0.9.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.3:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:0.9.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.4:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:0.9.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.5:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:0.9.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.6:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:0.9.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.6.1:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:0.9.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.6.2:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:0.9.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.6.3:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:0.9.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.7:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:0.9.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.8:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:0.9.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.9:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:1.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.0:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.1:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.2:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:1.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.3:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:1.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.4:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:1.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:1.0.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.1:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:1.0.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.2:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:1.0.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.3:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:1.0.5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.4:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:1.0.5.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.5:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:1.0.5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.6:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:1.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.6:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:1.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.1.0:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.1.1:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:1.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.1.2:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:1.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.1.3:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:1.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.1.4:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:1.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.0:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:1.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.1:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:1.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.2:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:1.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.3:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:1.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.4:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-0179
reference_id CVE-2014-0179
reference_type
scores
0
value 1.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-0179
90
reference_url https://security.gentoo.org/glsa/201412-04
reference_id GLSA-201412-04
reference_type
scores
url https://security.gentoo.org/glsa/201412-04
91
reference_url https://access.redhat.com/errata/RHSA-2014:0560
reference_id RHSA-2014:0560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0560
92
reference_url https://access.redhat.com/errata/RHSA-2014:0914
reference_id RHSA-2014:0914
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0914
93
reference_url https://usn.ubuntu.com/2366-1/
reference_id USN-2366-1
reference_type
scores
url https://usn.ubuntu.com/2366-1/
fixed_packages
0
url pkg:deb/debian/libvirt@0.9.12.3-1%2Bdeb7u1
purl pkg:deb/debian/libvirt@0.9.12.3-1%2Bdeb7u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2ska-hmbg-kqdw
1
vulnerability VCID-3xk5-72kc-5uhu
2
vulnerability VCID-3zke-md7v-6be5
3
vulnerability VCID-425h-bz55-yfad
4
vulnerability VCID-46dt-sp3g-qyf1
5
vulnerability VCID-4gha-yszs-x3hw
6
vulnerability VCID-4kk3-gbve-ykgt
7
vulnerability VCID-4myf-kv7v-4bfw
8
vulnerability VCID-4wgx-cyja-4bbx
9
vulnerability VCID-5a7s-trej-63cj
10
vulnerability VCID-5pky-1svz-nqf6
11
vulnerability VCID-5ub6-8d2s-53hj
12
vulnerability VCID-5wmb-1zue-tfh8
13
vulnerability VCID-6a1z-xemq-43cq
14
vulnerability VCID-6j14-6esu-sqcp
15
vulnerability VCID-8bmv-jut6-mfdc
16
vulnerability VCID-8bqx-15w5-4kdm
17
vulnerability VCID-a5ed-jnjb-pybr
18
vulnerability VCID-b489-x5z3-pkfh
19
vulnerability VCID-bsjb-frkp-b3an
20
vulnerability VCID-bz31-74av-9kgf
21
vulnerability VCID-c628-5r9h-37ad
22
vulnerability VCID-cfgr-2prz-mkh3
23
vulnerability VCID-cue5-u48q-87ft
24
vulnerability VCID-e4vr-p8vg-y3bn
25
vulnerability VCID-e93r-zft5-33dk
26
vulnerability VCID-efnj-ea3r-uyb2
27
vulnerability VCID-fk4t-hh7x-77he
28
vulnerability VCID-gc5z-hy4a-8uft
29
vulnerability VCID-gp93-s21f-8fh7
30
vulnerability VCID-grvk-64s2-mbdc
31
vulnerability VCID-hpgc-t8mr-qkan
32
vulnerability VCID-jcqj-y7ve-dkf3
33
vulnerability VCID-ju7x-j33y-8khv
34
vulnerability VCID-kwfx-bbqy-1kdv
35
vulnerability VCID-nfem-925f-bfdw
36
vulnerability VCID-nqd8-35a9-7bc5
37
vulnerability VCID-p5zb-sdha-b7bu
38
vulnerability VCID-pqce-1qud-kbef
39
vulnerability VCID-pw95-vhme-ufdr
40
vulnerability VCID-pyrh-w789-8fbb
41
vulnerability VCID-q2ed-rmxa-m3hq
42
vulnerability VCID-r65y-py21-u3eu
43
vulnerability VCID-r6kr-1kw6-abet
44
vulnerability VCID-re7g-2nvj-j3dp
45
vulnerability VCID-smdn-m8vh-9bb8
46
vulnerability VCID-ttae-7135-n7ff
47
vulnerability VCID-ty73-ba9j-cyea
48
vulnerability VCID-unyh-d92r-8udp
49
vulnerability VCID-ure4-cjpz-r3b5
50
vulnerability VCID-vmnc-v6zq-dkhv
51
vulnerability VCID-wf9y-4uwu-gkaz
52
vulnerability VCID-whhu-jy51-qkec
53
vulnerability VCID-wkrz-dcvc-5ugc
54
vulnerability VCID-x76t-fcgm-3yf3
55
vulnerability VCID-xkwg-y7f7-pfac
56
vulnerability VCID-xp7b-461n-a3d2
57
vulnerability VCID-ypmp-rsaw-s3hb
58
vulnerability VCID-yvkr-qhaj-bfcx
59
vulnerability VCID-zd79-93nb-pye7
60
vulnerability VCID-zj24-rwt5-g3dg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@0.9.12.3-1%252Bdeb7u1
1
url pkg:deb/debian/libvirt@1.2.9-9
purl pkg:deb/debian/libvirt@1.2.9-9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2ska-hmbg-kqdw
1
vulnerability VCID-3xk5-72kc-5uhu
2
vulnerability VCID-3zke-md7v-6be5
3
vulnerability VCID-425h-bz55-yfad
4
vulnerability VCID-4gha-yszs-x3hw
5
vulnerability VCID-5a7s-trej-63cj
6
vulnerability VCID-5pky-1svz-nqf6
7
vulnerability VCID-5ub6-8d2s-53hj
8
vulnerability VCID-8bqx-15w5-4kdm
9
vulnerability VCID-a5ed-jnjb-pybr
10
vulnerability VCID-b489-x5z3-pkfh
11
vulnerability VCID-bsjb-frkp-b3an
12
vulnerability VCID-c628-5r9h-37ad
13
vulnerability VCID-cue5-u48q-87ft
14
vulnerability VCID-e93r-zft5-33dk
15
vulnerability VCID-gc5z-hy4a-8uft
16
vulnerability VCID-gp93-s21f-8fh7
17
vulnerability VCID-hpgc-t8mr-qkan
18
vulnerability VCID-ju7x-j33y-8khv
19
vulnerability VCID-nfem-925f-bfdw
20
vulnerability VCID-nqd8-35a9-7bc5
21
vulnerability VCID-pqce-1qud-kbef
22
vulnerability VCID-r65y-py21-u3eu
23
vulnerability VCID-re7g-2nvj-j3dp
24
vulnerability VCID-smdn-m8vh-9bb8
25
vulnerability VCID-wf9y-4uwu-gkaz
26
vulnerability VCID-whhu-jy51-qkec
27
vulnerability VCID-wkrz-dcvc-5ugc
28
vulnerability VCID-ypmp-rsaw-s3hb
29
vulnerability VCID-yvkr-qhaj-bfcx
30
vulnerability VCID-zj24-rwt5-g3dg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@1.2.9-9
aliases CVE-2014-0179
risk_score 0.8
exploitability 0.5
weighted_severity 1.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bz31-74av-9kgf
2
url VCID-jcqj-y7ve-dkf3
vulnerability_id VCID-jcqj-y7ve-dkf3
summary
Multiple vulnerabilities have been found in libvirt, worst of which
    allows context-dependent attackers to escalate privileges.
references
0
reference_url http://libvirt.org/news.html
reference_id
reference_type
scores
url http://libvirt.org/news.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2014-05/msg00048.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-05/msg00048.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2014-05/msg00052.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-05/msg00052.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2014-0560.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-0560.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5177.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5177.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-5177
reference_id
reference_type
scores
0
value 0.00114
scoring_system epss
scoring_elements 0.29929
published_at 2026-04-21T12:55:00Z
1
value 0.00114
scoring_system epss
scoring_elements 0.30075
published_at 2026-04-01T12:55:00Z
2
value 0.00114
scoring_system epss
scoring_elements 0.30112
published_at 2026-04-02T12:55:00Z
3
value 0.00114
scoring_system epss
scoring_elements 0.30161
published_at 2026-04-04T12:55:00Z
4
value 0.00114
scoring_system epss
scoring_elements 0.29974
published_at 2026-04-07T12:55:00Z
5
value 0.00114
scoring_system epss
scoring_elements 0.30034
published_at 2026-04-08T12:55:00Z
6
value 0.00114
scoring_system epss
scoring_elements 0.3007
published_at 2026-04-09T12:55:00Z
7
value 0.00114
scoring_system epss
scoring_elements 0.30074
published_at 2026-04-11T12:55:00Z
8
value 0.00114
scoring_system epss
scoring_elements 0.3003
published_at 2026-04-12T12:55:00Z
9
value 0.00114
scoring_system epss
scoring_elements 0.2998
published_at 2026-04-13T12:55:00Z
10
value 0.00114
scoring_system epss
scoring_elements 0.29995
published_at 2026-04-16T12:55:00Z
11
value 0.00114
scoring_system epss
scoring_elements 0.29975
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-5177
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5177
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5177
7
reference_url http://secunia.com/advisories/60895
reference_id
reference_type
scores
url http://secunia.com/advisories/60895
8
reference_url http://security.gentoo.org/glsa/glsa-201412-04.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201412-04.xml
9
reference_url http://security.libvirt.org/2014/0003.html
reference_id
reference_type
scores
url http://security.libvirt.org/2014/0003.html
10
reference_url http://www.ubuntu.com/usn/USN-2366-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2366-1
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1088290
reference_id 1088290
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1088290
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:enterprise_virtualization:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:enterprise_virtualization:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:enterprise_virtualization:3.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:1.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.1:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.2:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:1.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.3:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:1.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.4:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:1.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:1.0.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:1.0.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.2:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:1.0.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.3:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:1.0.5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.4:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:1.0.5.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.5:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:1.0.5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.6:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:1.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.6:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:1.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.1.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.1.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:1.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.1.2:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:1.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.1.3:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:1.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.1.4:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:1.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:1.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.1:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:1.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.2:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:1.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.3:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:1.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.4:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-5177
reference_id CVE-2014-5177
reference_type
scores
0
value 1.2
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2014-5177
40
reference_url https://security.gentoo.org/glsa/201412-04
reference_id GLSA-201412-04
reference_type
scores
url https://security.gentoo.org/glsa/201412-04
41
reference_url https://access.redhat.com/errata/RHSA-2014:0914
reference_id RHSA-2014:0914
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0914
42
reference_url https://usn.ubuntu.com/2366-1/
reference_id USN-2366-1
reference_type
scores
url https://usn.ubuntu.com/2366-1/
fixed_packages
0
url pkg:deb/debian/libvirt@1.2.9-9
purl pkg:deb/debian/libvirt@1.2.9-9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2ska-hmbg-kqdw
1
vulnerability VCID-3xk5-72kc-5uhu
2
vulnerability VCID-3zke-md7v-6be5
3
vulnerability VCID-425h-bz55-yfad
4
vulnerability VCID-4gha-yszs-x3hw
5
vulnerability VCID-5a7s-trej-63cj
6
vulnerability VCID-5pky-1svz-nqf6
7
vulnerability VCID-5ub6-8d2s-53hj
8
vulnerability VCID-8bqx-15w5-4kdm
9
vulnerability VCID-a5ed-jnjb-pybr
10
vulnerability VCID-b489-x5z3-pkfh
11
vulnerability VCID-bsjb-frkp-b3an
12
vulnerability VCID-c628-5r9h-37ad
13
vulnerability VCID-cue5-u48q-87ft
14
vulnerability VCID-e93r-zft5-33dk
15
vulnerability VCID-gc5z-hy4a-8uft
16
vulnerability VCID-gp93-s21f-8fh7
17
vulnerability VCID-hpgc-t8mr-qkan
18
vulnerability VCID-ju7x-j33y-8khv
19
vulnerability VCID-nfem-925f-bfdw
20
vulnerability VCID-nqd8-35a9-7bc5
21
vulnerability VCID-pqce-1qud-kbef
22
vulnerability VCID-r65y-py21-u3eu
23
vulnerability VCID-re7g-2nvj-j3dp
24
vulnerability VCID-smdn-m8vh-9bb8
25
vulnerability VCID-wf9y-4uwu-gkaz
26
vulnerability VCID-whhu-jy51-qkec
27
vulnerability VCID-wkrz-dcvc-5ugc
28
vulnerability VCID-ypmp-rsaw-s3hb
29
vulnerability VCID-yvkr-qhaj-bfcx
30
vulnerability VCID-zj24-rwt5-g3dg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@1.2.9-9
aliases CVE-2014-5177
risk_score 0.6
exploitability 0.5
weighted_severity 1.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jcqj-y7ve-dkf3
3
url VCID-kwfx-bbqy-1kdv
vulnerability_id VCID-kwfx-bbqy-1kdv
summary libvirt: missing ACL check for the VIR_DOMAIN_XML_SECURE flag in save images and snapshots objects
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0236.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0236.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0236
reference_id
reference_type
scores
0
value 0.0065
scoring_system epss
scoring_elements 0.70845
published_at 2026-04-21T12:55:00Z
1
value 0.0065
scoring_system epss
scoring_elements 0.70753
published_at 2026-04-01T12:55:00Z
2
value 0.0065
scoring_system epss
scoring_elements 0.70769
published_at 2026-04-02T12:55:00Z
3
value 0.0065
scoring_system epss
scoring_elements 0.70787
published_at 2026-04-04T12:55:00Z
4
value 0.0065
scoring_system epss
scoring_elements 0.70763
published_at 2026-04-07T12:55:00Z
5
value 0.0065
scoring_system epss
scoring_elements 0.70807
published_at 2026-04-08T12:55:00Z
6
value 0.0065
scoring_system epss
scoring_elements 0.70823
published_at 2026-04-09T12:55:00Z
7
value 0.0065
scoring_system epss
scoring_elements 0.70846
published_at 2026-04-11T12:55:00Z
8
value 0.0065
scoring_system epss
scoring_elements 0.7083
published_at 2026-04-12T12:55:00Z
9
value 0.0065
scoring_system epss
scoring_elements 0.70815
published_at 2026-04-13T12:55:00Z
10
value 0.0065
scoring_system epss
scoring_elements 0.7086
published_at 2026-04-16T12:55:00Z
11
value 0.0065
scoring_system epss
scoring_elements 0.70866
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0236
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0236
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0236
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:M/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1184431
reference_id 1184431
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1184431
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776065
reference_id 776065
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776065
6
reference_url https://access.redhat.com/errata/RHSA-2015:0323
reference_id RHSA-2015:0323
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0323
7
reference_url https://usn.ubuntu.com/2867-1/
reference_id USN-2867-1
reference_type
scores
url https://usn.ubuntu.com/2867-1/
fixed_packages
0
url pkg:deb/debian/libvirt@1.2.9-9
purl pkg:deb/debian/libvirt@1.2.9-9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2ska-hmbg-kqdw
1
vulnerability VCID-3xk5-72kc-5uhu
2
vulnerability VCID-3zke-md7v-6be5
3
vulnerability VCID-425h-bz55-yfad
4
vulnerability VCID-4gha-yszs-x3hw
5
vulnerability VCID-5a7s-trej-63cj
6
vulnerability VCID-5pky-1svz-nqf6
7
vulnerability VCID-5ub6-8d2s-53hj
8
vulnerability VCID-8bqx-15w5-4kdm
9
vulnerability VCID-a5ed-jnjb-pybr
10
vulnerability VCID-b489-x5z3-pkfh
11
vulnerability VCID-bsjb-frkp-b3an
12
vulnerability VCID-c628-5r9h-37ad
13
vulnerability VCID-cue5-u48q-87ft
14
vulnerability VCID-e93r-zft5-33dk
15
vulnerability VCID-gc5z-hy4a-8uft
16
vulnerability VCID-gp93-s21f-8fh7
17
vulnerability VCID-hpgc-t8mr-qkan
18
vulnerability VCID-ju7x-j33y-8khv
19
vulnerability VCID-nfem-925f-bfdw
20
vulnerability VCID-nqd8-35a9-7bc5
21
vulnerability VCID-pqce-1qud-kbef
22
vulnerability VCID-r65y-py21-u3eu
23
vulnerability VCID-re7g-2nvj-j3dp
24
vulnerability VCID-smdn-m8vh-9bb8
25
vulnerability VCID-wf9y-4uwu-gkaz
26
vulnerability VCID-whhu-jy51-qkec
27
vulnerability VCID-wkrz-dcvc-5ugc
28
vulnerability VCID-ypmp-rsaw-s3hb
29
vulnerability VCID-yvkr-qhaj-bfcx
30
vulnerability VCID-zj24-rwt5-g3dg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@1.2.9-9
aliases CVE-2015-0236
risk_score 1.0
exploitability 0.5
weighted_severity 2.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kwfx-bbqy-1kdv
4
url VCID-p5zb-sdha-b7bu
vulnerability_id VCID-p5zb-sdha-b7bu
summary libvirt: domain_conf: domain deadlock DoS
references
0
reference_url http://libvirt.org/git/?p=libvirt.git%3Ba=commitdiff%3Bh=fc22b2e74890873848b43fffae43025d22053669
reference_id
reference_type
scores
url http://libvirt.org/git/?p=libvirt.git%3Ba=commitdiff%3Bh=fc22b2e74890873848b43fffae43025d22053669
1
reference_url http://lists.opensuse.org/opensuse-updates/2014-10/msg00014.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-10/msg00014.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2014-10/msg00017.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-10/msg00017.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2014-1352.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1352.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3657.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3657.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-3657
reference_id
reference_type
scores
0
value 0.01284
scoring_system epss
scoring_elements 0.79637
published_at 2026-04-21T12:55:00Z
1
value 0.01284
scoring_system epss
scoring_elements 0.79556
published_at 2026-04-01T12:55:00Z
2
value 0.01284
scoring_system epss
scoring_elements 0.79562
published_at 2026-04-02T12:55:00Z
3
value 0.01284
scoring_system epss
scoring_elements 0.79585
published_at 2026-04-04T12:55:00Z
4
value 0.01284
scoring_system epss
scoring_elements 0.79572
published_at 2026-04-07T12:55:00Z
5
value 0.01284
scoring_system epss
scoring_elements 0.796
published_at 2026-04-08T12:55:00Z
6
value 0.01284
scoring_system epss
scoring_elements 0.79607
published_at 2026-04-09T12:55:00Z
7
value 0.01284
scoring_system epss
scoring_elements 0.79628
published_at 2026-04-11T12:55:00Z
8
value 0.01284
scoring_system epss
scoring_elements 0.79612
published_at 2026-04-12T12:55:00Z
9
value 0.01284
scoring_system epss
scoring_elements 0.79605
published_at 2026-04-13T12:55:00Z
10
value 0.01284
scoring_system epss
scoring_elements 0.79635
published_at 2026-04-16T12:55:00Z
11
value 0.01284
scoring_system epss
scoring_elements 0.79634
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-3657
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3657
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3657
7
reference_url http://secunia.com/advisories/60291
reference_id
reference_type
scores
url http://secunia.com/advisories/60291
8
reference_url http://secunia.com/advisories/62303
reference_id
reference_type
scores
url http://secunia.com/advisories/62303
9
reference_url http://security.libvirt.org/2014/0005.html
reference_id
reference_type
scores
url http://security.libvirt.org/2014/0005.html
10
reference_url http://www.ubuntu.com/usn/USN-2404-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2404-1
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1145667
reference_id 1145667
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1145667
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libvirt:libvirt:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libvirt:libvirt:1.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libvirt:libvirt:1.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.1:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libvirt:libvirt:1.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.2:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libvirt:libvirt:1.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.3:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libvirt:libvirt:1.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.4:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libvirt:libvirt:1.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.5:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libvirt:libvirt:1.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.6:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libvirt:libvirt:1.2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.7:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-3657
reference_id CVE-2014-3657
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-3657
22
reference_url https://access.redhat.com/errata/RHSA-2014:1352
reference_id RHSA-2014:1352
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1352
23
reference_url https://access.redhat.com/errata/RHSA-2014:1873
reference_id RHSA-2014:1873
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1873
24
reference_url https://usn.ubuntu.com/2404-1/
reference_id USN-2404-1
reference_type
scores
url https://usn.ubuntu.com/2404-1/
fixed_packages
0
url pkg:deb/debian/libvirt@1.2.9-9
purl pkg:deb/debian/libvirt@1.2.9-9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2ska-hmbg-kqdw
1
vulnerability VCID-3xk5-72kc-5uhu
2
vulnerability VCID-3zke-md7v-6be5
3
vulnerability VCID-425h-bz55-yfad
4
vulnerability VCID-4gha-yszs-x3hw
5
vulnerability VCID-5a7s-trej-63cj
6
vulnerability VCID-5pky-1svz-nqf6
7
vulnerability VCID-5ub6-8d2s-53hj
8
vulnerability VCID-8bqx-15w5-4kdm
9
vulnerability VCID-a5ed-jnjb-pybr
10
vulnerability VCID-b489-x5z3-pkfh
11
vulnerability VCID-bsjb-frkp-b3an
12
vulnerability VCID-c628-5r9h-37ad
13
vulnerability VCID-cue5-u48q-87ft
14
vulnerability VCID-e93r-zft5-33dk
15
vulnerability VCID-gc5z-hy4a-8uft
16
vulnerability VCID-gp93-s21f-8fh7
17
vulnerability VCID-hpgc-t8mr-qkan
18
vulnerability VCID-ju7x-j33y-8khv
19
vulnerability VCID-nfem-925f-bfdw
20
vulnerability VCID-nqd8-35a9-7bc5
21
vulnerability VCID-pqce-1qud-kbef
22
vulnerability VCID-r65y-py21-u3eu
23
vulnerability VCID-re7g-2nvj-j3dp
24
vulnerability VCID-smdn-m8vh-9bb8
25
vulnerability VCID-wf9y-4uwu-gkaz
26
vulnerability VCID-whhu-jy51-qkec
27
vulnerability VCID-wkrz-dcvc-5ugc
28
vulnerability VCID-ypmp-rsaw-s3hb
29
vulnerability VCID-yvkr-qhaj-bfcx
30
vulnerability VCID-zj24-rwt5-g3dg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@1.2.9-9
aliases CVE-2014-3657
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p5zb-sdha-b7bu
5
url VCID-pw95-vhme-ufdr
vulnerability_id VCID-pw95-vhme-ufdr
summary
Multiple vulnerabilities have been found in libvirt, worst of which
    allows context-dependent attackers to cause Denial of Service.
references
0
reference_url http://advisories.mageia.org/MGASA-2015-0002.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2015-0002.html
1
reference_url http://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=2bdcd29c713dfedd813c89f56ae98f6f3898313d
reference_id
reference_type
scores
url http://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=2bdcd29c713dfedd813c89f56ae98f6f3898313d
2
reference_url http://lists.opensuse.org/opensuse-updates/2015-01/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-01/msg00003.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2015-01/msg00005.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-01/msg00005.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2015-0323.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-0323.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8136.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8136.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-8136
reference_id
reference_type
scores
0
value 0.00075
scoring_system epss
scoring_elements 0.2258
published_at 2026-04-21T12:55:00Z
1
value 0.00075
scoring_system epss
scoring_elements 0.22561
published_at 2026-04-01T12:55:00Z
2
value 0.00075
scoring_system epss
scoring_elements 0.22734
published_at 2026-04-02T12:55:00Z
3
value 0.00075
scoring_system epss
scoring_elements 0.22778
published_at 2026-04-04T12:55:00Z
4
value 0.00075
scoring_system epss
scoring_elements 0.22568
published_at 2026-04-07T12:55:00Z
5
value 0.00075
scoring_system epss
scoring_elements 0.22644
published_at 2026-04-08T12:55:00Z
6
value 0.00075
scoring_system epss
scoring_elements 0.22695
published_at 2026-04-09T12:55:00Z
7
value 0.00075
scoring_system epss
scoring_elements 0.22713
published_at 2026-04-11T12:55:00Z
8
value 0.00075
scoring_system epss
scoring_elements 0.22674
published_at 2026-04-12T12:55:00Z
9
value 0.00075
scoring_system epss
scoring_elements 0.22616
published_at 2026-04-13T12:55:00Z
10
value 0.00075
scoring_system epss
scoring_elements 0.22632
published_at 2026-04-16T12:55:00Z
11
value 0.00075
scoring_system epss
scoring_elements 0.22628
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-8136
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8136
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8136
8
reference_url http://secunia.com/advisories/61111
reference_id
reference_type
scores
url http://secunia.com/advisories/61111
9
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2015:023
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2015:023
10
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2015:070
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2015:070
11
reference_url http://www.ubuntu.com/usn/USN-2867-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2867-1
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1176176
reference_id 1176176
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1176176
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773856
reference_id 773856
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773856
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:-:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia:mageia:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mageia:mageia:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia:mageia:4.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-8136
reference_id CVE-2014-8136
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-8136
27
reference_url https://security.gentoo.org/glsa/201412-36
reference_id GLSA-201412-36
reference_type
scores
url https://security.gentoo.org/glsa/201412-36
28
reference_url https://access.redhat.com/errata/RHSA-2015:0323
reference_id RHSA-2015:0323
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0323
29
reference_url https://usn.ubuntu.com/2867-1/
reference_id USN-2867-1
reference_type
scores
url https://usn.ubuntu.com/2867-1/
fixed_packages
0
url pkg:deb/debian/libvirt@1.2.9-9
purl pkg:deb/debian/libvirt@1.2.9-9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2ska-hmbg-kqdw
1
vulnerability VCID-3xk5-72kc-5uhu
2
vulnerability VCID-3zke-md7v-6be5
3
vulnerability VCID-425h-bz55-yfad
4
vulnerability VCID-4gha-yszs-x3hw
5
vulnerability VCID-5a7s-trej-63cj
6
vulnerability VCID-5pky-1svz-nqf6
7
vulnerability VCID-5ub6-8d2s-53hj
8
vulnerability VCID-8bqx-15w5-4kdm
9
vulnerability VCID-a5ed-jnjb-pybr
10
vulnerability VCID-b489-x5z3-pkfh
11
vulnerability VCID-bsjb-frkp-b3an
12
vulnerability VCID-c628-5r9h-37ad
13
vulnerability VCID-cue5-u48q-87ft
14
vulnerability VCID-e93r-zft5-33dk
15
vulnerability VCID-gc5z-hy4a-8uft
16
vulnerability VCID-gp93-s21f-8fh7
17
vulnerability VCID-hpgc-t8mr-qkan
18
vulnerability VCID-ju7x-j33y-8khv
19
vulnerability VCID-nfem-925f-bfdw
20
vulnerability VCID-nqd8-35a9-7bc5
21
vulnerability VCID-pqce-1qud-kbef
22
vulnerability VCID-r65y-py21-u3eu
23
vulnerability VCID-re7g-2nvj-j3dp
24
vulnerability VCID-smdn-m8vh-9bb8
25
vulnerability VCID-wf9y-4uwu-gkaz
26
vulnerability VCID-whhu-jy51-qkec
27
vulnerability VCID-wkrz-dcvc-5ugc
28
vulnerability VCID-ypmp-rsaw-s3hb
29
vulnerability VCID-yvkr-qhaj-bfcx
30
vulnerability VCID-zj24-rwt5-g3dg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@1.2.9-9
aliases CVE-2014-8136
risk_score 0.9
exploitability 0.5
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pw95-vhme-ufdr
6
url VCID-unyh-d92r-8udp
vulnerability_id VCID-unyh-d92r-8udp
summary security update
references
0
reference_url http://libvirt.org/git/?p=libvirt.git%3Ba=commitdiff%3Bh=3e745e8f775dfe6f64f18b5c2fe4791b35d3546b
reference_id
reference_type
scores
url http://libvirt.org/git/?p=libvirt.git%3Ba=commitdiff%3Bh=3e745e8f775dfe6f64f18b5c2fe4791b35d3546b
1
reference_url http://lists.opensuse.org/opensuse-updates/2014-10/msg00014.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-10/msg00014.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2014-10/msg00017.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-10/msg00017.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2014-1352.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1352.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3633.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3633.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-3633
reference_id
reference_type
scores
0
value 0.0292
scoring_system epss
scoring_elements 0.86406
published_at 2026-04-21T12:55:00Z
1
value 0.0292
scoring_system epss
scoring_elements 0.86327
published_at 2026-04-01T12:55:00Z
2
value 0.0292
scoring_system epss
scoring_elements 0.86337
published_at 2026-04-02T12:55:00Z
3
value 0.0292
scoring_system epss
scoring_elements 0.86356
published_at 2026-04-04T12:55:00Z
4
value 0.0292
scoring_system epss
scoring_elements 0.86357
published_at 2026-04-07T12:55:00Z
5
value 0.0292
scoring_system epss
scoring_elements 0.86375
published_at 2026-04-08T12:55:00Z
6
value 0.0292
scoring_system epss
scoring_elements 0.86385
published_at 2026-04-09T12:55:00Z
7
value 0.0292
scoring_system epss
scoring_elements 0.86398
published_at 2026-04-11T12:55:00Z
8
value 0.0292
scoring_system epss
scoring_elements 0.86397
published_at 2026-04-12T12:55:00Z
9
value 0.0292
scoring_system epss
scoring_elements 0.86391
published_at 2026-04-13T12:55:00Z
10
value 0.0292
scoring_system epss
scoring_elements 0.86408
published_at 2026-04-16T12:55:00Z
11
value 0.0292
scoring_system epss
scoring_elements 0.86413
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-3633
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0179
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0179
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3633
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3633
8
reference_url http://secunia.com/advisories/60291
reference_id
reference_type
scores
url http://secunia.com/advisories/60291
9
reference_url http://secunia.com/advisories/60895
reference_id
reference_type
scores
url http://secunia.com/advisories/60895
10
reference_url http://security.gentoo.org/glsa/glsa-201412-04.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201412-04.xml
11
reference_url http://security.libvirt.org/2014/0004.html
reference_id
reference_type
scores
url http://security.libvirt.org/2014/0004.html
12
reference_url http://www.debian.org/security/2014/dsa-3038
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3038
13
reference_url http://www.ubuntu.com/usn/USN-2366-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2366-1
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1141131
reference_id 1141131
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1141131
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=762203
reference_id 762203
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=762203
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libvirt:libvirt:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libvirt:libvirt:1.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libvirt:libvirt:1.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.1:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libvirt:libvirt:1.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.2:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libvirt:libvirt:1.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.3:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libvirt:libvirt:1.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.4:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libvirt:libvirt:1.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.5:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libvirt:libvirt:1.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.6:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libvirt:libvirt:1.2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.7:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:lts:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:lts:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:lts:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:lts:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:lts:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:lts:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-3633
reference_id CVE-2014-3633
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-3633
29
reference_url https://security.gentoo.org/glsa/201412-04
reference_id GLSA-201412-04
reference_type
scores
url https://security.gentoo.org/glsa/201412-04
30
reference_url https://access.redhat.com/errata/RHSA-2014:1352
reference_id RHSA-2014:1352
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1352
31
reference_url https://access.redhat.com/errata/RHSA-2014:1873
reference_id RHSA-2014:1873
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1873
32
reference_url https://usn.ubuntu.com/2366-1/
reference_id USN-2366-1
reference_type
scores
url https://usn.ubuntu.com/2366-1/
fixed_packages
0
url pkg:deb/debian/libvirt@0.9.12.3-1%2Bdeb7u1
purl pkg:deb/debian/libvirt@0.9.12.3-1%2Bdeb7u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2ska-hmbg-kqdw
1
vulnerability VCID-3xk5-72kc-5uhu
2
vulnerability VCID-3zke-md7v-6be5
3
vulnerability VCID-425h-bz55-yfad
4
vulnerability VCID-46dt-sp3g-qyf1
5
vulnerability VCID-4gha-yszs-x3hw
6
vulnerability VCID-4kk3-gbve-ykgt
7
vulnerability VCID-4myf-kv7v-4bfw
8
vulnerability VCID-4wgx-cyja-4bbx
9
vulnerability VCID-5a7s-trej-63cj
10
vulnerability VCID-5pky-1svz-nqf6
11
vulnerability VCID-5ub6-8d2s-53hj
12
vulnerability VCID-5wmb-1zue-tfh8
13
vulnerability VCID-6a1z-xemq-43cq
14
vulnerability VCID-6j14-6esu-sqcp
15
vulnerability VCID-8bmv-jut6-mfdc
16
vulnerability VCID-8bqx-15w5-4kdm
17
vulnerability VCID-a5ed-jnjb-pybr
18
vulnerability VCID-b489-x5z3-pkfh
19
vulnerability VCID-bsjb-frkp-b3an
20
vulnerability VCID-bz31-74av-9kgf
21
vulnerability VCID-c628-5r9h-37ad
22
vulnerability VCID-cfgr-2prz-mkh3
23
vulnerability VCID-cue5-u48q-87ft
24
vulnerability VCID-e4vr-p8vg-y3bn
25
vulnerability VCID-e93r-zft5-33dk
26
vulnerability VCID-efnj-ea3r-uyb2
27
vulnerability VCID-fk4t-hh7x-77he
28
vulnerability VCID-gc5z-hy4a-8uft
29
vulnerability VCID-gp93-s21f-8fh7
30
vulnerability VCID-grvk-64s2-mbdc
31
vulnerability VCID-hpgc-t8mr-qkan
32
vulnerability VCID-jcqj-y7ve-dkf3
33
vulnerability VCID-ju7x-j33y-8khv
34
vulnerability VCID-kwfx-bbqy-1kdv
35
vulnerability VCID-nfem-925f-bfdw
36
vulnerability VCID-nqd8-35a9-7bc5
37
vulnerability VCID-p5zb-sdha-b7bu
38
vulnerability VCID-pqce-1qud-kbef
39
vulnerability VCID-pw95-vhme-ufdr
40
vulnerability VCID-pyrh-w789-8fbb
41
vulnerability VCID-q2ed-rmxa-m3hq
42
vulnerability VCID-r65y-py21-u3eu
43
vulnerability VCID-r6kr-1kw6-abet
44
vulnerability VCID-re7g-2nvj-j3dp
45
vulnerability VCID-smdn-m8vh-9bb8
46
vulnerability VCID-ttae-7135-n7ff
47
vulnerability VCID-ty73-ba9j-cyea
48
vulnerability VCID-unyh-d92r-8udp
49
vulnerability VCID-ure4-cjpz-r3b5
50
vulnerability VCID-vmnc-v6zq-dkhv
51
vulnerability VCID-wf9y-4uwu-gkaz
52
vulnerability VCID-whhu-jy51-qkec
53
vulnerability VCID-wkrz-dcvc-5ugc
54
vulnerability VCID-x76t-fcgm-3yf3
55
vulnerability VCID-xkwg-y7f7-pfac
56
vulnerability VCID-xp7b-461n-a3d2
57
vulnerability VCID-ypmp-rsaw-s3hb
58
vulnerability VCID-yvkr-qhaj-bfcx
59
vulnerability VCID-zd79-93nb-pye7
60
vulnerability VCID-zj24-rwt5-g3dg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@0.9.12.3-1%252Bdeb7u1
1
url pkg:deb/debian/libvirt@1.2.9-9
purl pkg:deb/debian/libvirt@1.2.9-9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2ska-hmbg-kqdw
1
vulnerability VCID-3xk5-72kc-5uhu
2
vulnerability VCID-3zke-md7v-6be5
3
vulnerability VCID-425h-bz55-yfad
4
vulnerability VCID-4gha-yszs-x3hw
5
vulnerability VCID-5a7s-trej-63cj
6
vulnerability VCID-5pky-1svz-nqf6
7
vulnerability VCID-5ub6-8d2s-53hj
8
vulnerability VCID-8bqx-15w5-4kdm
9
vulnerability VCID-a5ed-jnjb-pybr
10
vulnerability VCID-b489-x5z3-pkfh
11
vulnerability VCID-bsjb-frkp-b3an
12
vulnerability VCID-c628-5r9h-37ad
13
vulnerability VCID-cue5-u48q-87ft
14
vulnerability VCID-e93r-zft5-33dk
15
vulnerability VCID-gc5z-hy4a-8uft
16
vulnerability VCID-gp93-s21f-8fh7
17
vulnerability VCID-hpgc-t8mr-qkan
18
vulnerability VCID-ju7x-j33y-8khv
19
vulnerability VCID-nfem-925f-bfdw
20
vulnerability VCID-nqd8-35a9-7bc5
21
vulnerability VCID-pqce-1qud-kbef
22
vulnerability VCID-r65y-py21-u3eu
23
vulnerability VCID-re7g-2nvj-j3dp
24
vulnerability VCID-smdn-m8vh-9bb8
25
vulnerability VCID-wf9y-4uwu-gkaz
26
vulnerability VCID-whhu-jy51-qkec
27
vulnerability VCID-wkrz-dcvc-5ugc
28
vulnerability VCID-ypmp-rsaw-s3hb
29
vulnerability VCID-yvkr-qhaj-bfcx
30
vulnerability VCID-zj24-rwt5-g3dg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@1.2.9-9
aliases CVE-2014-3633
risk_score 2.6
exploitability 0.5
weighted_severity 5.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-unyh-d92r-8udp
7
url VCID-ure4-cjpz-r3b5
vulnerability_id VCID-ure4-cjpz-r3b5
summary
Multiple vulnerabilities have been found in libvirt, worst of which
    allows context-dependent attackers to escalate privileges.
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2014-11/msg00083.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-11/msg00083.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-7823.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-7823.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-7823
reference_id
reference_type
scores
0
value 0.00531
scoring_system epss
scoring_elements 0.67273
published_at 2026-04-21T12:55:00Z
1
value 0.00531
scoring_system epss
scoring_elements 0.67174
published_at 2026-04-01T12:55:00Z
2
value 0.00531
scoring_system epss
scoring_elements 0.67211
published_at 2026-04-07T12:55:00Z
3
value 0.00531
scoring_system epss
scoring_elements 0.67235
published_at 2026-04-04T12:55:00Z
4
value 0.00531
scoring_system epss
scoring_elements 0.67262
published_at 2026-04-08T12:55:00Z
5
value 0.00531
scoring_system epss
scoring_elements 0.67276
published_at 2026-04-09T12:55:00Z
6
value 0.00531
scoring_system epss
scoring_elements 0.67296
published_at 2026-04-11T12:55:00Z
7
value 0.00531
scoring_system epss
scoring_elements 0.67282
published_at 2026-04-12T12:55:00Z
8
value 0.00531
scoring_system epss
scoring_elements 0.67247
published_at 2026-04-13T12:55:00Z
9
value 0.00531
scoring_system epss
scoring_elements 0.67281
published_at 2026-04-16T12:55:00Z
10
value 0.00531
scoring_system epss
scoring_elements 0.67294
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-7823
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7823
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7823
4
reference_url http://secunia.com/advisories/60010
reference_id
reference_type
scores
url http://secunia.com/advisories/60010
5
reference_url http://secunia.com/advisories/60895
reference_id
reference_type
scores
url http://secunia.com/advisories/60895
6
reference_url http://secunia.com/advisories/62058
reference_id
reference_type
scores
url http://secunia.com/advisories/62058
7
reference_url http://secunia.com/advisories/62303
reference_id
reference_type
scores
url http://secunia.com/advisories/62303
8
reference_url http://security.gentoo.org/glsa/glsa-201412-04.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201412-04.xml
9
reference_url http://security.libvirt.org/2014/0007.html
reference_id
reference_type
scores
url http://security.libvirt.org/2014/0007.html
10
reference_url http://www.ubuntu.com/usn/USN-2404-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2404-1
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1160817
reference_id 1160817
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1160817
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=769149
reference_id 769149
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=769149
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:1.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:1.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.1:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:1.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.2:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:1.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.3:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:1.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.4:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:1.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.5:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:1.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.6:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:1.2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.7:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:1.2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.8:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:1.2.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.9:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-7823
reference_id CVE-2014-7823
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2014-7823
25
reference_url https://security.gentoo.org/glsa/201412-04
reference_id GLSA-201412-04
reference_type
scores
url https://security.gentoo.org/glsa/201412-04
26
reference_url https://access.redhat.com/errata/RHSA-2014:1873
reference_id RHSA-2014:1873
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1873
27
reference_url https://access.redhat.com/errata/RHSA-2015:0008
reference_id RHSA-2015:0008
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0008
28
reference_url https://usn.ubuntu.com/2404-1/
reference_id USN-2404-1
reference_type
scores
url https://usn.ubuntu.com/2404-1/
fixed_packages
0
url pkg:deb/debian/libvirt@1.2.9-9
purl pkg:deb/debian/libvirt@1.2.9-9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2ska-hmbg-kqdw
1
vulnerability VCID-3xk5-72kc-5uhu
2
vulnerability VCID-3zke-md7v-6be5
3
vulnerability VCID-425h-bz55-yfad
4
vulnerability VCID-4gha-yszs-x3hw
5
vulnerability VCID-5a7s-trej-63cj
6
vulnerability VCID-5pky-1svz-nqf6
7
vulnerability VCID-5ub6-8d2s-53hj
8
vulnerability VCID-8bqx-15w5-4kdm
9
vulnerability VCID-a5ed-jnjb-pybr
10
vulnerability VCID-b489-x5z3-pkfh
11
vulnerability VCID-bsjb-frkp-b3an
12
vulnerability VCID-c628-5r9h-37ad
13
vulnerability VCID-cue5-u48q-87ft
14
vulnerability VCID-e93r-zft5-33dk
15
vulnerability VCID-gc5z-hy4a-8uft
16
vulnerability VCID-gp93-s21f-8fh7
17
vulnerability VCID-hpgc-t8mr-qkan
18
vulnerability VCID-ju7x-j33y-8khv
19
vulnerability VCID-nfem-925f-bfdw
20
vulnerability VCID-nqd8-35a9-7bc5
21
vulnerability VCID-pqce-1qud-kbef
22
vulnerability VCID-r65y-py21-u3eu
23
vulnerability VCID-re7g-2nvj-j3dp
24
vulnerability VCID-smdn-m8vh-9bb8
25
vulnerability VCID-wf9y-4uwu-gkaz
26
vulnerability VCID-whhu-jy51-qkec
27
vulnerability VCID-wkrz-dcvc-5ugc
28
vulnerability VCID-ypmp-rsaw-s3hb
29
vulnerability VCID-yvkr-qhaj-bfcx
30
vulnerability VCID-zj24-rwt5-g3dg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@1.2.9-9
aliases CVE-2014-7823
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ure4-cjpz-r3b5
8
url VCID-vmnc-v6zq-dkhv
vulnerability_id VCID-vmnc-v6zq-dkhv
summary
Multiple vulnerabilities have been found in libvirt, worst of which
    allows context-dependent attackers to cause Denial of Service.
references
0
reference_url http://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=87b9437f8951f9d24f9a85c6bbfff0e54df8c984
reference_id
reference_type
scores
url http://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=87b9437f8951f9d24f9a85c6bbfff0e54df8c984
1
reference_url http://lists.opensuse.org/opensuse-updates/2015-01/msg00005.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-01/msg00005.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8135.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8135.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-8135
reference_id
reference_type
scores
0
value 0.00067
scoring_system epss
scoring_elements 0.20723
published_at 2026-04-21T12:55:00Z
1
value 0.00067
scoring_system epss
scoring_elements 0.20769
published_at 2026-04-01T12:55:00Z
2
value 0.00067
scoring_system epss
scoring_elements 0.20921
published_at 2026-04-02T12:55:00Z
3
value 0.00067
scoring_system epss
scoring_elements 0.2098
published_at 2026-04-04T12:55:00Z
4
value 0.00067
scoring_system epss
scoring_elements 0.20694
published_at 2026-04-07T12:55:00Z
5
value 0.00067
scoring_system epss
scoring_elements 0.20771
published_at 2026-04-08T12:55:00Z
6
value 0.00067
scoring_system epss
scoring_elements 0.20832
published_at 2026-04-09T12:55:00Z
7
value 0.00067
scoring_system epss
scoring_elements 0.20848
published_at 2026-04-11T12:55:00Z
8
value 0.00067
scoring_system epss
scoring_elements 0.20805
published_at 2026-04-12T12:55:00Z
9
value 0.00067
scoring_system epss
scoring_elements 0.20753
published_at 2026-04-13T12:55:00Z
10
value 0.00067
scoring_system epss
scoring_elements 0.20744
published_at 2026-04-16T12:55:00Z
11
value 0.00067
scoring_system epss
scoring_elements 0.20736
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-8135
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1087104
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1087104
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8135
6
reference_url http://secunia.com/advisories/61111
reference_id
reference_type
scores
url http://secunia.com/advisories/61111
7
reference_url http://security.libvirt.org/2014/0009.html
reference_id
reference_type
scores
url http://security.libvirt.org/2014/0009.html
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1176182
reference_id 1176182
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1176182
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773855
reference_id 773855
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773855
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:libvirt:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:-:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-8135
reference_id CVE-2014-8135
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-8135
12
reference_url https://security.gentoo.org/glsa/201412-36
reference_id GLSA-201412-36
reference_type
scores
url https://security.gentoo.org/glsa/201412-36
fixed_packages
0
url pkg:deb/debian/libvirt@1.2.9-9
purl pkg:deb/debian/libvirt@1.2.9-9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2ska-hmbg-kqdw
1
vulnerability VCID-3xk5-72kc-5uhu
2
vulnerability VCID-3zke-md7v-6be5
3
vulnerability VCID-425h-bz55-yfad
4
vulnerability VCID-4gha-yszs-x3hw
5
vulnerability VCID-5a7s-trej-63cj
6
vulnerability VCID-5pky-1svz-nqf6
7
vulnerability VCID-5ub6-8d2s-53hj
8
vulnerability VCID-8bqx-15w5-4kdm
9
vulnerability VCID-a5ed-jnjb-pybr
10
vulnerability VCID-b489-x5z3-pkfh
11
vulnerability VCID-bsjb-frkp-b3an
12
vulnerability VCID-c628-5r9h-37ad
13
vulnerability VCID-cue5-u48q-87ft
14
vulnerability VCID-e93r-zft5-33dk
15
vulnerability VCID-gc5z-hy4a-8uft
16
vulnerability VCID-gp93-s21f-8fh7
17
vulnerability VCID-hpgc-t8mr-qkan
18
vulnerability VCID-ju7x-j33y-8khv
19
vulnerability VCID-nfem-925f-bfdw
20
vulnerability VCID-nqd8-35a9-7bc5
21
vulnerability VCID-pqce-1qud-kbef
22
vulnerability VCID-r65y-py21-u3eu
23
vulnerability VCID-re7g-2nvj-j3dp
24
vulnerability VCID-smdn-m8vh-9bb8
25
vulnerability VCID-wf9y-4uwu-gkaz
26
vulnerability VCID-whhu-jy51-qkec
27
vulnerability VCID-wkrz-dcvc-5ugc
28
vulnerability VCID-ypmp-rsaw-s3hb
29
vulnerability VCID-yvkr-qhaj-bfcx
30
vulnerability VCID-zj24-rwt5-g3dg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@1.2.9-9
aliases CVE-2014-8135
risk_score 0.9
exploitability 0.5
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vmnc-v6zq-dkhv
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@1.2.9-9