Lookup for vulnerable packages by Package URL.
| Purl | pkg:rpm/redhat/rhev-hypervisor@5.5-2.2.6.1?arch=el5_5rhev2_2 |
| Type | rpm |
| Namespace | redhat |
| Name | rhev-hypervisor |
| Version | 5.5-2.2.6.1 |
| Qualifiers |
|
| Subpath | |
| Is_vulnerable | true |
| Next_non_vulnerable_version | null |
| Latest_non_vulnerable_version | null |
| Affected_by_vulnerabilities |
| 0 |
| url |
VCID-a47a-xzem-7yg1 |
| vulnerability_id |
VCID-a47a-xzem-7yg1 |
| summary |
libspice: Insufficient guest provided pointers validation |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2010-0428 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.1589 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15965 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.16035 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.16096 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15889 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15974 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.16037 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.16014 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15976 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15908 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15833 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15846 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2010-0428 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2010-0428
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
5.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-a47a-xzem-7yg1 |
|
| 1 |
| url |
VCID-sdvn-1ttj-hfd5 |
| vulnerability_id |
VCID-sdvn-1ttj-hfd5 |
| summary |
kvm: vmx null pointer dereference |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2010-0435 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.16838 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.16845 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.17014 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.17068 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.1685 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.1694 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.16997 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.16972 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.16927 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.16868 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.16804 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.16806 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2010-0435 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
|
| aliases |
CVE-2010-0435
|
| risk_score |
2.0 |
| exploitability |
0.5 |
| weighted_severity |
4.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-sdvn-1ttj-hfd5 |
|
| 2 |
| url |
VCID-wpm7-4y7f-myhb |
| vulnerability_id |
VCID-wpm7-4y7f-myhb |
| summary |
qemu: Insufficient guest provided pointers validation |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2010-0431 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.1589 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15965 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.16035 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.16096 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15889 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15974 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.16037 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.16014 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15976 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15908 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15833 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15846 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2010-0431 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2010-0431
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
5.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wpm7-4y7f-myhb |
|
| 3 |
| url |
VCID-xena-ukw7-x7ab |
| vulnerability_id |
VCID-xena-ukw7-x7ab |
| summary |
vdsm: SSL accept() blocks on a non-blocking Connection |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2010-2811 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00334 |
| scoring_system |
epss |
| scoring_elements |
0.56119 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00334 |
| scoring_system |
epss |
| scoring_elements |
0.56229 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00334 |
| scoring_system |
epss |
| scoring_elements |
0.56249 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00334 |
| scoring_system |
epss |
| scoring_elements |
0.56281 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00334 |
| scoring_system |
epss |
| scoring_elements |
0.56286 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00334 |
| scoring_system |
epss |
| scoring_elements |
0.56297 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00543 |
| scoring_system |
epss |
| scoring_elements |
0.67748 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00543 |
| scoring_system |
epss |
| scoring_elements |
0.67752 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00543 |
| scoring_system |
epss |
| scoring_elements |
0.67719 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00543 |
| scoring_system |
epss |
| scoring_elements |
0.67755 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00543 |
| scoring_system |
epss |
| scoring_elements |
0.67767 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2010-2811 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2010-2811
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xena-ukw7-x7ab |
|
| 4 |
| url |
VCID-z6xx-p5ww-ebgk |
| vulnerability_id |
VCID-z6xx-p5ww-ebgk |
| summary |
qemu: insufficient constraints checking in exec.c:subpage_register() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2010-2784 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00048 |
| scoring_system |
epss |
| scoring_elements |
0.14844 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00048 |
| scoring_system |
epss |
| scoring_elements |
0.14944 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00048 |
| scoring_system |
epss |
| scoring_elements |
0.14991 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00048 |
| scoring_system |
epss |
| scoring_elements |
0.15068 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00048 |
| scoring_system |
epss |
| scoring_elements |
0.14872 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00048 |
| scoring_system |
epss |
| scoring_elements |
0.1496 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00048 |
| scoring_system |
epss |
| scoring_elements |
0.15011 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00048 |
| scoring_system |
epss |
| scoring_elements |
0.14976 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00048 |
| scoring_system |
epss |
| scoring_elements |
0.14938 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00048 |
| scoring_system |
epss |
| scoring_elements |
0.14881 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00048 |
| scoring_system |
epss |
| scoring_elements |
0.14779 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00048 |
| scoring_system |
epss |
| scoring_elements |
0.14786 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2010-2784 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2010-2784
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
5.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-z6xx-p5ww-ebgk |
|
| 5 |
| url |
VCID-z8bc-51qw-tues |
| vulnerability_id |
VCID-z8bc-51qw-tues |
| summary |
libspice: Relying on guest provided data structures to indicate memory allocation |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2010-0429 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.1589 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15965 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.16035 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.16096 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15889 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15974 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.16037 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.16014 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15976 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15908 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15833 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15846 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2010-0429 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2010-0429
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
5.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-z8bc-51qw-tues |
|
|
| Fixing_vulnerabilities |
|
| Risk_score | 3.0 |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rhev-hypervisor@5.5-2.2.6.1%3Farch=el5_5rhev2_2 |