Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/app-emulation/libvirt@1.1.2-r3
Typeebuild
Namespaceapp-emulation
Namelibvirt
Version1.1.2-r3
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version1.2.9-r2
Latest_non_vulnerable_version204-r1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-84zq-fpr5-mbcz
vulnerability_id VCID-84zq-fpr5-mbcz
summary
A race condition in polkit could allow a local attacker to gain
    escalated privileges.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4324.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4324.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-4324
reference_id
reference_type
scores
0
value 0.00065
scoring_system epss
scoring_elements 0.20074
published_at 2026-04-01T12:55:00Z
1
value 0.00065
scoring_system epss
scoring_elements 0.20221
published_at 2026-04-02T12:55:00Z
2
value 0.00065
scoring_system epss
scoring_elements 0.20278
published_at 2026-04-04T12:55:00Z
3
value 0.00065
scoring_system epss
scoring_elements 0.20003
published_at 2026-04-07T12:55:00Z
4
value 0.00065
scoring_system epss
scoring_elements 0.20083
published_at 2026-04-08T12:55:00Z
5
value 0.00065
scoring_system epss
scoring_elements 0.2014
published_at 2026-04-09T12:55:00Z
6
value 0.00065
scoring_system epss
scoring_elements 0.20166
published_at 2026-04-11T12:55:00Z
7
value 0.00065
scoring_system epss
scoring_elements 0.20121
published_at 2026-04-12T12:55:00Z
8
value 0.00065
scoring_system epss
scoring_elements 0.20063
published_at 2026-04-13T12:55:00Z
9
value 0.00065
scoring_system epss
scoring_elements 0.20046
published_at 2026-04-16T12:55:00Z
10
value 0.00065
scoring_system epss
scoring_elements 0.2005
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-4324
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4324
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4324
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1006669
reference_id 1006669
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1006669
4
reference_url https://security.gentoo.org/glsa/201406-27
reference_id GLSA-201406-27
reference_type
scores
url https://security.gentoo.org/glsa/201406-27
5
reference_url https://access.redhat.com/errata/RHSA-2013:1273
reference_id RHSA-2013:1273
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1273
fixed_packages
0
url pkg:ebuild/app-emulation/libvirt@0.21
purl pkg:ebuild/app-emulation/libvirt@0.21
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/libvirt@0.21
1
url pkg:ebuild/app-emulation/libvirt@1.1.2-r3
purl pkg:ebuild/app-emulation/libvirt@1.1.2-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/libvirt@1.1.2-r3
2
url pkg:ebuild/app-emulation/libvirt@3.14.1
purl pkg:ebuild/app-emulation/libvirt@3.14.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/libvirt@3.14.1
3
url pkg:ebuild/app-emulation/libvirt@204-r1
purl pkg:ebuild/app-emulation/libvirt@204-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/libvirt@204-r1
aliases CVE-2013-4324
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-84zq-fpr5-mbcz
1
url VCID-97e5-xezy-wbf6
vulnerability_id VCID-97e5-xezy-wbf6
summary
A race condition in polkit could allow a local attacker to gain
    escalated privileges.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4288.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4288.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-4288
reference_id
reference_type
scores
0
value 0.00046
scoring_system epss
scoring_elements 0.13909
published_at 2026-04-18T12:55:00Z
1
value 0.00046
scoring_system epss
scoring_elements 0.14087
published_at 2026-04-01T12:55:00Z
2
value 0.00046
scoring_system epss
scoring_elements 0.14167
published_at 2026-04-02T12:55:00Z
3
value 0.00046
scoring_system epss
scoring_elements 0.14224
published_at 2026-04-04T12:55:00Z
4
value 0.00046
scoring_system epss
scoring_elements 0.14039
published_at 2026-04-07T12:55:00Z
5
value 0.00046
scoring_system epss
scoring_elements 0.1412
published_at 2026-04-08T12:55:00Z
6
value 0.00046
scoring_system epss
scoring_elements 0.14173
published_at 2026-04-09T12:55:00Z
7
value 0.00046
scoring_system epss
scoring_elements 0.14119
published_at 2026-04-11T12:55:00Z
8
value 0.00046
scoring_system epss
scoring_elements 0.14078
published_at 2026-04-12T12:55:00Z
9
value 0.00046
scoring_system epss
scoring_elements 0.14025
published_at 2026-04-13T12:55:00Z
10
value 0.00046
scoring_system epss
scoring_elements 0.13919
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-4288
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4288
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4288
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:C/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1002375
reference_id 1002375
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1002375
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=723717
reference_id 723717
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=723717
6
reference_url https://security.gentoo.org/glsa/201406-27
reference_id GLSA-201406-27
reference_type
scores
url https://security.gentoo.org/glsa/201406-27
7
reference_url https://access.redhat.com/errata/RHSA-2013:1270
reference_id RHSA-2013:1270
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1270
8
reference_url https://usn.ubuntu.com/1953-1/
reference_id USN-1953-1
reference_type
scores
url https://usn.ubuntu.com/1953-1/
fixed_packages
0
url pkg:ebuild/app-emulation/libvirt@0.21
purl pkg:ebuild/app-emulation/libvirt@0.21
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/libvirt@0.21
1
url pkg:ebuild/app-emulation/libvirt@1.1.2-r3
purl pkg:ebuild/app-emulation/libvirt@1.1.2-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/libvirt@1.1.2-r3
2
url pkg:ebuild/app-emulation/libvirt@3.14.1
purl pkg:ebuild/app-emulation/libvirt@3.14.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/libvirt@3.14.1
3
url pkg:ebuild/app-emulation/libvirt@204-r1
purl pkg:ebuild/app-emulation/libvirt@204-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/libvirt@204-r1
aliases CVE-2013-4288
risk_score 1.8
exploitability 0.5
weighted_severity 3.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-97e5-xezy-wbf6
2
url VCID-dn4b-qf6b-j7aj
vulnerability_id VCID-dn4b-qf6b-j7aj
summary
A race condition in polkit could allow a local attacker to gain
    escalated privileges.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4327.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4327.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-4327
reference_id
reference_type
scores
0
value 0.00032
scoring_system epss
scoring_elements 0.09299
published_at 2026-04-01T12:55:00Z
1
value 0.00032
scoring_system epss
scoring_elements 0.09301
published_at 2026-04-02T12:55:00Z
2
value 0.00032
scoring_system epss
scoring_elements 0.09351
published_at 2026-04-04T12:55:00Z
3
value 0.00032
scoring_system epss
scoring_elements 0.09263
published_at 2026-04-07T12:55:00Z
4
value 0.00032
scoring_system epss
scoring_elements 0.0934
published_at 2026-04-08T12:55:00Z
5
value 0.00032
scoring_system epss
scoring_elements 0.09388
published_at 2026-04-09T12:55:00Z
6
value 0.00032
scoring_system epss
scoring_elements 0.094
published_at 2026-04-11T12:55:00Z
7
value 0.00032
scoring_system epss
scoring_elements 0.09371
published_at 2026-04-12T12:55:00Z
8
value 0.00032
scoring_system epss
scoring_elements 0.09356
published_at 2026-04-13T12:55:00Z
9
value 0.00032
scoring_system epss
scoring_elements 0.09249
published_at 2026-04-16T12:55:00Z
10
value 0.00032
scoring_system epss
scoring_elements 0.09247
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-4327
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4327
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4327
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4391
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4391
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4394
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4394
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1006680
reference_id 1006680
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1006680
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=723713
reference_id 723713
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=723713
7
reference_url https://security.gentoo.org/glsa/201406-27
reference_id GLSA-201406-27
reference_type
scores
url https://security.gentoo.org/glsa/201406-27
8
reference_url https://usn.ubuntu.com/1961-1/
reference_id USN-1961-1
reference_type
scores
url https://usn.ubuntu.com/1961-1/
fixed_packages
0
url pkg:ebuild/app-emulation/libvirt@0.21
purl pkg:ebuild/app-emulation/libvirt@0.21
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/libvirt@0.21
1
url pkg:ebuild/app-emulation/libvirt@1.1.2-r3
purl pkg:ebuild/app-emulation/libvirt@1.1.2-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/libvirt@1.1.2-r3
2
url pkg:ebuild/app-emulation/libvirt@3.14.1
purl pkg:ebuild/app-emulation/libvirt@3.14.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/libvirt@3.14.1
3
url pkg:ebuild/app-emulation/libvirt@204-r1
purl pkg:ebuild/app-emulation/libvirt@204-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/libvirt@204-r1
aliases CVE-2013-4327
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dn4b-qf6b-j7aj
3
url VCID-e7ce-ncn2-87dd
vulnerability_id VCID-e7ce-ncn2-87dd
summary
A race condition in polkit could allow a local attacker to gain
    escalated privileges.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4325.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4325.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-4325
reference_id
reference_type
scores
0
value 0.00065
scoring_system epss
scoring_elements 0.20143
published_at 2026-04-01T12:55:00Z
1
value 0.00065
scoring_system epss
scoring_elements 0.20291
published_at 2026-04-02T12:55:00Z
2
value 0.00065
scoring_system epss
scoring_elements 0.20348
published_at 2026-04-04T12:55:00Z
3
value 0.00065
scoring_system epss
scoring_elements 0.20072
published_at 2026-04-07T12:55:00Z
4
value 0.00065
scoring_system epss
scoring_elements 0.20153
published_at 2026-04-08T12:55:00Z
5
value 0.00065
scoring_system epss
scoring_elements 0.20211
published_at 2026-04-09T12:55:00Z
6
value 0.00065
scoring_system epss
scoring_elements 0.20236
published_at 2026-04-11T12:55:00Z
7
value 0.00065
scoring_system epss
scoring_elements 0.2019
published_at 2026-04-12T12:55:00Z
8
value 0.00065
scoring_system epss
scoring_elements 0.20132
published_at 2026-04-13T12:55:00Z
9
value 0.00065
scoring_system epss
scoring_elements 0.20124
published_at 2026-04-16T12:55:00Z
10
value 0.00065
scoring_system epss
scoring_elements 0.20129
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-4325
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0200
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0200
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4325
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4325
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6402
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6402
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6427
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6427
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1006674
reference_id 1006674
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1006674
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=723716
reference_id 723716
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=723716
8
reference_url https://security.gentoo.org/glsa/201406-27
reference_id GLSA-201406-27
reference_type
scores
url https://security.gentoo.org/glsa/201406-27
9
reference_url https://access.redhat.com/errata/RHSA-2013:1274
reference_id RHSA-2013:1274
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1274
10
reference_url https://usn.ubuntu.com/1956-1/
reference_id USN-1956-1
reference_type
scores
url https://usn.ubuntu.com/1956-1/
fixed_packages
0
url pkg:ebuild/app-emulation/libvirt@0.21
purl pkg:ebuild/app-emulation/libvirt@0.21
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/libvirt@0.21
1
url pkg:ebuild/app-emulation/libvirt@1.1.2-r3
purl pkg:ebuild/app-emulation/libvirt@1.1.2-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/libvirt@1.1.2-r3
2
url pkg:ebuild/app-emulation/libvirt@3.14.1
purl pkg:ebuild/app-emulation/libvirt@3.14.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/libvirt@3.14.1
3
url pkg:ebuild/app-emulation/libvirt@204-r1
purl pkg:ebuild/app-emulation/libvirt@204-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/libvirt@204-r1
aliases CVE-2013-4325
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e7ce-ncn2-87dd
4
url VCID-efnj-ea3r-uyb2
vulnerability_id VCID-efnj-ea3r-uyb2
summary
A race condition in polkit could allow a local attacker to gain
    escalated privileges.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4311.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4311.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-4311
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06449
published_at 2026-04-01T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.06482
published_at 2026-04-02T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.0652
published_at 2026-04-04T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.06511
published_at 2026-04-07T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.06561
published_at 2026-04-08T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.06603
published_at 2026-04-09T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.06597
published_at 2026-04-11T12:55:00Z
7
value 0.00024
scoring_system epss
scoring_elements 0.06589
published_at 2026-04-12T12:55:00Z
8
value 0.00024
scoring_system epss
scoring_elements 0.0658
published_at 2026-04-13T12:55:00Z
9
value 0.00024
scoring_system epss
scoring_elements 0.06506
published_at 2026-04-16T12:55:00Z
10
value 0.00024
scoring_system epss
scoring_elements 0.06514
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-4311
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4311
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4311
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1005332
reference_id 1005332
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1005332
4
reference_url https://security.gentoo.org/glsa/201406-27
reference_id GLSA-201406-27
reference_type
scores
url https://security.gentoo.org/glsa/201406-27
5
reference_url https://access.redhat.com/errata/RHSA-2013:1272
reference_id RHSA-2013:1272
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1272
6
reference_url https://usn.ubuntu.com/1954-1/
reference_id USN-1954-1
reference_type
scores
url https://usn.ubuntu.com/1954-1/
fixed_packages
0
url pkg:ebuild/app-emulation/libvirt@0.21
purl pkg:ebuild/app-emulation/libvirt@0.21
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/libvirt@0.21
1
url pkg:ebuild/app-emulation/libvirt@1.1.2-r3
purl pkg:ebuild/app-emulation/libvirt@1.1.2-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/libvirt@1.1.2-r3
2
url pkg:ebuild/app-emulation/libvirt@3.14.1
purl pkg:ebuild/app-emulation/libvirt@3.14.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/libvirt@3.14.1
3
url pkg:ebuild/app-emulation/libvirt@204-r1
purl pkg:ebuild/app-emulation/libvirt@204-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/libvirt@204-r1
aliases CVE-2013-4311
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-efnj-ea3r-uyb2
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/libvirt@1.1.2-r3