Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
Typedeb
Namespacedebian
Namevirtualbox
Version7.2.6-dfsg-3.2
Qualifiers
distro sid
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version7.2.6-dfsg-4
Latest_non_vulnerable_version7.2.6-dfsg-4
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1133-ysak-37aq
vulnerability_id VCID-1133-ysak-37aq
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2909
reference_id
reference_type
scores
0
value 0.0045
scoring_system epss
scoring_elements 0.63669
published_at 2026-04-21T12:55:00Z
1
value 0.0045
scoring_system epss
scoring_elements 0.63619
published_at 2026-04-02T12:55:00Z
2
value 0.0045
scoring_system epss
scoring_elements 0.63676
published_at 2026-04-16T12:55:00Z
3
value 0.0045
scoring_system epss
scoring_elements 0.63686
published_at 2026-04-18T12:55:00Z
4
value 0.0045
scoring_system epss
scoring_elements 0.63559
published_at 2026-04-01T12:55:00Z
5
value 0.0045
scoring_system epss
scoring_elements 0.63645
published_at 2026-04-04T12:55:00Z
6
value 0.0045
scoring_system epss
scoring_elements 0.63604
published_at 2026-04-07T12:55:00Z
7
value 0.0045
scoring_system epss
scoring_elements 0.63656
published_at 2026-04-08T12:55:00Z
8
value 0.0045
scoring_system epss
scoring_elements 0.63672
published_at 2026-04-12T12:55:00Z
9
value 0.0045
scoring_system epss
scoring_elements 0.63687
published_at 2026-04-11T12:55:00Z
10
value 0.0045
scoring_system epss
scoring_elements 0.63639
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2909
1
reference_url http://www.securitytracker.com/id/1041887
reference_id 1041887
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:21Z/
url http://www.securitytracker.com/id/1041887
2
reference_url http://www.securityfocus.com/bid/105619
reference_id 105619
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:21Z/
url http://www.securityfocus.com/bid/105619
fixed_packages
0
url pkg:deb/debian/virtualbox@5.2.20-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.2.20-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.20-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2018-2909
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1133-ysak-37aq
1
url VCID-15ja-azw6-xkc3
vulnerability_id VCID-15ja-azw6-xkc3
summary Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization VirtualBox before 3.2.24, 4.0.26, 4.1.34, 4.2.26, and 4.3.14 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Core, a different vulnerability than CVE-2014-2487.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-4261
reference_id
reference_type
scores
0
value 0.00103
scoring_system epss
scoring_elements 0.28195
published_at 2026-04-21T12:55:00Z
1
value 0.00103
scoring_system epss
scoring_elements 0.28332
published_at 2026-04-01T12:55:00Z
2
value 0.00103
scoring_system epss
scoring_elements 0.28403
published_at 2026-04-02T12:55:00Z
3
value 0.00103
scoring_system epss
scoring_elements 0.28445
published_at 2026-04-04T12:55:00Z
4
value 0.00103
scoring_system epss
scoring_elements 0.28236
published_at 2026-04-07T12:55:00Z
5
value 0.00103
scoring_system epss
scoring_elements 0.28303
published_at 2026-04-08T12:55:00Z
6
value 0.00103
scoring_system epss
scoring_elements 0.28345
published_at 2026-04-09T12:55:00Z
7
value 0.00103
scoring_system epss
scoring_elements 0.2835
published_at 2026-04-11T12:55:00Z
8
value 0.00103
scoring_system epss
scoring_elements 0.28306
published_at 2026-04-12T12:55:00Z
9
value 0.00103
scoring_system epss
scoring_elements 0.28248
published_at 2026-04-13T12:55:00Z
10
value 0.00103
scoring_system epss
scoring_elements 0.2826
published_at 2026-04-16T12:55:00Z
11
value 0.00103
scoring_system epss
scoring_elements 0.28242
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-4261
1
reference_url http://seclists.org/fulldisclosure/2014/Dec/23
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2014/Dec/23
2
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/94612
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/94612
3
reference_url http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
4
reference_url http://www.securityfocus.com/archive/1/534161/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/534161/100/0/threaded
5
reference_url http://www.securityfocus.com/bid/68588
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/68588
6
reference_url http://www.vmware.com/security/advisories/VMSA-2014-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2014-0012.html
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:3.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.0:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:3.2.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.10:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:3.2.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.12:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:3.2.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.14:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:3.2.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.16:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:3.2.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.18:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:3.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.2:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:3.2.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.20:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:3.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.4:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:3.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.6:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:3.2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.8:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.10:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.12:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.0.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.14:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.16:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.0.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.18:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.2:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.0.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.20:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.22:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.4:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.6:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.8:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.10:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.12:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.14:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.16:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.18:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.2:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.20:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.22:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.24:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.26:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.26:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.28:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.28:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.28:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.30:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.30:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.4:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.6:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.8:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.2.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.10:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.2.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.12:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.2.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.14:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.2.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.16:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.2.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.18:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.2:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.2.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.20:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.2.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.22:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.4:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.6:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.8:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.3.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.3.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.3.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.3.10:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.3.2:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.3.4:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.3.6:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.3.8:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-4261
reference_id CVE-2014-4261
reference_type
scores
0
value 6.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2014-4261
fixed_packages
0
url pkg:deb/debian/virtualbox@0?distro=sid
purl pkg:deb/debian/virtualbox@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@0%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2014-4261
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-15ja-azw6-xkc3
2
url VCID-1af4-tmj7-hycv
vulnerability_id VCID-1af4-tmj7-hycv
summary Multiple vulnerabilities have been discovered in Oracle Virtualbox, the worst of which could result in root privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35542
reference_id
reference_type
scores
0
value 0.00044
scoring_system epss
scoring_elements 0.13454
published_at 2026-04-18T12:55:00Z
1
value 0.00044
scoring_system epss
scoring_elements 0.13631
published_at 2026-04-11T12:55:00Z
2
value 0.00044
scoring_system epss
scoring_elements 0.13594
published_at 2026-04-12T12:55:00Z
3
value 0.00044
scoring_system epss
scoring_elements 0.13546
published_at 2026-04-13T12:55:00Z
4
value 0.00044
scoring_system epss
scoring_elements 0.13459
published_at 2026-04-16T12:55:00Z
5
value 0.00044
scoring_system epss
scoring_elements 0.13566
published_at 2026-04-01T12:55:00Z
6
value 0.00044
scoring_system epss
scoring_elements 0.13666
published_at 2026-04-02T12:55:00Z
7
value 0.00044
scoring_system epss
scoring_elements 0.13727
published_at 2026-04-04T12:55:00Z
8
value 0.00044
scoring_system epss
scoring_elements 0.13528
published_at 2026-04-21T12:55:00Z
9
value 0.00044
scoring_system epss
scoring_elements 0.13608
published_at 2026-04-08T12:55:00Z
10
value 0.00044
scoring_system epss
scoring_elements 0.1366
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35542
1
reference_url https://security.archlinux.org/ASA-202110-3
reference_id ASA-202110-3
reference_type
scores
url https://security.archlinux.org/ASA-202110-3
2
reference_url https://security.archlinux.org/AVG-2476
reference_id AVG-2476
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2476
3
reference_url https://security.gentoo.org/glsa/202208-36
reference_id GLSA-202208-36
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:04Z/
url https://security.gentoo.org/glsa/202208-36
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.28-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.28-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.28-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2021-35542
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1af4-tmj7-hycv
3
url VCID-1cq9-n8ju-wqay
vulnerability_id VCID-1cq9-n8ju-wqay
summary Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.12 and 7.2.2. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-62591
reference_id
reference_type
scores
0
value 0.00018
scoring_system epss
scoring_elements 0.04878
published_at 2026-04-21T12:55:00Z
1
value 0.00018
scoring_system epss
scoring_elements 0.04734
published_at 2026-04-18T12:55:00Z
2
value 0.00018
scoring_system epss
scoring_elements 0.04744
published_at 2026-04-02T12:55:00Z
3
value 0.00018
scoring_system epss
scoring_elements 0.04767
published_at 2026-04-04T12:55:00Z
4
value 0.00018
scoring_system epss
scoring_elements 0.04782
published_at 2026-04-07T12:55:00Z
5
value 0.00018
scoring_system epss
scoring_elements 0.04815
published_at 2026-04-08T12:55:00Z
6
value 0.00018
scoring_system epss
scoring_elements 0.04827
published_at 2026-04-09T12:55:00Z
7
value 0.00018
scoring_system epss
scoring_elements 0.04814
published_at 2026-04-11T12:55:00Z
8
value 0.00018
scoring_system epss
scoring_elements 0.04792
published_at 2026-04-12T12:55:00Z
9
value 0.00018
scoring_system epss
scoring_elements 0.04772
published_at 2026-04-13T12:55:00Z
10
value 0.00018
scoring_system epss
scoring_elements 0.04725
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-62591
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118542
reference_id 1118542
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118542
2
reference_url https://www.oracle.com/security-alerts/cpuoct2025.html
reference_id cpuoct2025.html
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-21T20:22:47Z/
url https://www.oracle.com/security-alerts/cpuoct2025.html
fixed_packages
0
url pkg:deb/debian/virtualbox@7.2.4-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.2.4-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.4-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2025-62591
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1cq9-n8ju-wqay
4
url VCID-1epw-6qek-6qgn
vulnerability_id VCID-1epw-6qek-6qgn
summary Multiple vulnerabilities have been discovered in Oracle VirtualBox, the worst of which could lead to privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22098
reference_id
reference_type
scores
0
value 0.0337
scoring_system epss
scoring_elements 0.87376
published_at 2026-04-21T12:55:00Z
1
value 0.03669
scoring_system epss
scoring_elements 0.87857
published_at 2026-04-02T12:55:00Z
2
value 0.03669
scoring_system epss
scoring_elements 0.87869
published_at 2026-04-04T12:55:00Z
3
value 0.03669
scoring_system epss
scoring_elements 0.87873
published_at 2026-04-07T12:55:00Z
4
value 0.03669
scoring_system epss
scoring_elements 0.87895
published_at 2026-04-08T12:55:00Z
5
value 0.03669
scoring_system epss
scoring_elements 0.87901
published_at 2026-04-09T12:55:00Z
6
value 0.03669
scoring_system epss
scoring_elements 0.87905
published_at 2026-04-12T12:55:00Z
7
value 0.03669
scoring_system epss
scoring_elements 0.87904
published_at 2026-04-13T12:55:00Z
8
value 0.03669
scoring_system epss
scoring_elements 0.87918
published_at 2026-04-16T12:55:00Z
9
value 0.03669
scoring_system epss
scoring_elements 0.87917
published_at 2026-04-18T12:55:00Z
10
value 0.03669
scoring_system epss
scoring_elements 0.87913
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22098
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://security.gentoo.org/glsa/202409-11
reference_id GLSA-202409-11
reference_type
scores
url https://security.gentoo.org/glsa/202409-11
fixed_packages
0
url pkg:deb/debian/virtualbox@7.0.12-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.0.12-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.0.12-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2023-22098
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1epw-6qek-6qgn
5
url VCID-1f3h-ez88-fudr
vulnerability_id VCID-1f3h-ez88-fudr
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could result in privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2074
reference_id
reference_type
scores
0
value 0.00166
scoring_system epss
scoring_elements 0.3759
published_at 2026-04-21T12:55:00Z
1
value 0.00166
scoring_system epss
scoring_elements 0.37652
published_at 2026-04-12T12:55:00Z
2
value 0.00166
scoring_system epss
scoring_elements 0.37624
published_at 2026-04-13T12:55:00Z
3
value 0.00166
scoring_system epss
scoring_elements 0.37671
published_at 2026-04-16T12:55:00Z
4
value 0.00166
scoring_system epss
scoring_elements 0.37653
published_at 2026-04-18T12:55:00Z
5
value 0.00166
scoring_system epss
scoring_elements 0.37522
published_at 2026-04-01T12:55:00Z
6
value 0.00166
scoring_system epss
scoring_elements 0.37704
published_at 2026-04-02T12:55:00Z
7
value 0.00166
scoring_system epss
scoring_elements 0.37729
published_at 2026-04-04T12:55:00Z
8
value 0.00166
scoring_system epss
scoring_elements 0.37608
published_at 2026-04-07T12:55:00Z
9
value 0.00166
scoring_system epss
scoring_elements 0.37659
published_at 2026-04-08T12:55:00Z
10
value 0.00166
scoring_system epss
scoring_elements 0.37673
published_at 2026-04-09T12:55:00Z
11
value 0.00166
scoring_system epss
scoring_elements 0.37687
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2074
1
reference_url https://security.archlinux.org/ASA-202101-37
reference_id ASA-202101-37
reference_type
scores
url https://security.archlinux.org/ASA-202101-37
2
reference_url https://security.archlinux.org/AVG-1483
reference_id AVG-1483
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1483
3
reference_url https://security.gentoo.org/glsa/202101-15
reference_id GLSA-202101-15
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T18:11:44Z/
url https://security.gentoo.org/glsa/202101-15
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.18-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.18-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.18-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2021-2074
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1f3h-ez88-fudr
6
url VCID-1g1c-khsq-vqfr
vulnerability_id VCID-1g1c-khsq-vqfr
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-3292
reference_id
reference_type
scores
0
value 0.0045
scoring_system epss
scoring_elements 0.63619
published_at 2026-04-02T12:55:00Z
1
value 0.0045
scoring_system epss
scoring_elements 0.63669
published_at 2026-04-21T12:55:00Z
2
value 0.0045
scoring_system epss
scoring_elements 0.63676
published_at 2026-04-16T12:55:00Z
3
value 0.0045
scoring_system epss
scoring_elements 0.63686
published_at 2026-04-18T12:55:00Z
4
value 0.0045
scoring_system epss
scoring_elements 0.63559
published_at 2026-04-01T12:55:00Z
5
value 0.0045
scoring_system epss
scoring_elements 0.63645
published_at 2026-04-04T12:55:00Z
6
value 0.0045
scoring_system epss
scoring_elements 0.63604
published_at 2026-04-07T12:55:00Z
7
value 0.0045
scoring_system epss
scoring_elements 0.63656
published_at 2026-04-08T12:55:00Z
8
value 0.0045
scoring_system epss
scoring_elements 0.63672
published_at 2026-04-12T12:55:00Z
9
value 0.0045
scoring_system epss
scoring_elements 0.63687
published_at 2026-04-11T12:55:00Z
10
value 0.0045
scoring_system epss
scoring_elements 0.63639
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-3292
1
reference_url http://www.securitytracker.com/id/1041887
reference_id 1041887
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:15:57Z/
url http://www.securitytracker.com/id/1041887
2
reference_url http://www.securityfocus.com/bid/105619
reference_id 105619
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:15:57Z/
url http://www.securityfocus.com/bid/105619
fixed_packages
0
url pkg:deb/debian/virtualbox@5.2.20-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.2.20-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.20-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2018-3292
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1g1c-khsq-vqfr
7
url VCID-1g8c-gp4x-47g4
vulnerability_id VCID-1g8c-gp4x-47g4
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2689
reference_id
reference_type
scores
0
value 0.00143
scoring_system epss
scoring_elements 0.34544
published_at 2026-04-21T12:55:00Z
1
value 0.00143
scoring_system epss
scoring_elements 0.34653
published_at 2026-04-02T12:55:00Z
2
value 0.00143
scoring_system epss
scoring_elements 0.3462
published_at 2026-04-09T12:55:00Z
3
value 0.00143
scoring_system epss
scoring_elements 0.34622
published_at 2026-04-11T12:55:00Z
4
value 0.00143
scoring_system epss
scoring_elements 0.34582
published_at 2026-04-18T12:55:00Z
5
value 0.00143
scoring_system epss
scoring_elements 0.34558
published_at 2026-04-13T12:55:00Z
6
value 0.00143
scoring_system epss
scoring_elements 0.34597
published_at 2026-04-16T12:55:00Z
7
value 0.00143
scoring_system epss
scoring_elements 0.34335
published_at 2026-04-01T12:55:00Z
8
value 0.00143
scoring_system epss
scoring_elements 0.3468
published_at 2026-04-04T12:55:00Z
9
value 0.00143
scoring_system epss
scoring_elements 0.34548
published_at 2026-04-07T12:55:00Z
10
value 0.00143
scoring_system epss
scoring_elements 0.34591
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2689
1
reference_url https://security.gentoo.org/glsa/202004-02
reference_id GLSA-202004-02
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:01:47Z/
url https://security.gentoo.org/glsa/202004-02
2
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:01:47Z/
url https://security.gentoo.org/glsa/202101-09
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.2-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.2-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.2-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2020-2689
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1g8c-gp4x-47g4
8
url VCID-1jw1-krq2-p3fa
vulnerability_id VCID-1jw1-krq2-p3fa
summary Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 6.1.46 and Prior to 7.0.10. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 4.2 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22016
reference_id
reference_type
scores
0
value 0.00044
scoring_system epss
scoring_elements 0.13503
published_at 2026-04-02T12:55:00Z
1
value 0.00044
scoring_system epss
scoring_elements 0.13564
published_at 2026-04-04T12:55:00Z
2
value 0.00044
scoring_system epss
scoring_elements 0.13359
published_at 2026-04-07T12:55:00Z
3
value 0.00044
scoring_system epss
scoring_elements 0.1344
published_at 2026-04-08T12:55:00Z
4
value 0.00044
scoring_system epss
scoring_elements 0.1349
published_at 2026-04-09T12:55:00Z
5
value 0.00044
scoring_system epss
scoring_elements 0.13463
published_at 2026-04-11T12:55:00Z
6
value 0.00049
scoring_system epss
scoring_elements 0.14872
published_at 2026-04-16T12:55:00Z
7
value 0.00049
scoring_system epss
scoring_elements 0.14932
published_at 2026-04-21T12:55:00Z
8
value 0.00049
scoring_system epss
scoring_elements 0.14878
published_at 2026-04-18T12:55:00Z
9
value 0.00049
scoring_system epss
scoring_elements 0.15036
published_at 2026-04-12T12:55:00Z
10
value 0.00049
scoring_system epss
scoring_elements 0.14975
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22016
1
reference_url https://www.oracle.com/security-alerts/cpujul2023.html
reference_id cpujul2023.html
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T17:57:13Z/
url https://www.oracle.com/security-alerts/cpujul2023.html
fixed_packages
0
url pkg:deb/debian/virtualbox@7.0.10-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.0.10-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.0.10-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2023-22016
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1jw1-krq2-p3fa
9
url VCID-1kd2-vwft-zyaq
vulnerability_id VCID-1kd2-vwft-zyaq
summary Multiple vulnerabilities have been discovered in Oracle Virtualbox, the worst of which could result in root privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2475
reference_id
reference_type
scores
0
value 0.00051
scoring_system epss
scoring_elements 0.15784
published_at 2026-04-21T12:55:00Z
1
value 0.00051
scoring_system epss
scoring_elements 0.15876
published_at 2026-04-12T12:55:00Z
2
value 0.00051
scoring_system epss
scoring_elements 0.15809
published_at 2026-04-13T12:55:00Z
3
value 0.00051
scoring_system epss
scoring_elements 0.15732
published_at 2026-04-16T12:55:00Z
4
value 0.00051
scoring_system epss
scoring_elements 0.1574
published_at 2026-04-18T12:55:00Z
5
value 0.00051
scoring_system epss
scoring_elements 0.15868
published_at 2026-04-01T12:55:00Z
6
value 0.00051
scoring_system epss
scoring_elements 0.1593
published_at 2026-04-02T12:55:00Z
7
value 0.00051
scoring_system epss
scoring_elements 0.15992
published_at 2026-04-04T12:55:00Z
8
value 0.00051
scoring_system epss
scoring_elements 0.15791
published_at 2026-04-07T12:55:00Z
9
value 0.00051
scoring_system epss
scoring_elements 0.15877
published_at 2026-04-08T12:55:00Z
10
value 0.00051
scoring_system epss
scoring_elements 0.15939
published_at 2026-04-09T12:55:00Z
11
value 0.00051
scoring_system epss
scoring_elements 0.15915
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2475
1
reference_url https://security.archlinux.org/ASA-202110-3
reference_id ASA-202110-3
reference_type
scores
url https://security.archlinux.org/ASA-202110-3
2
reference_url https://security.archlinux.org/AVG-2476
reference_id AVG-2476
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2476
3
reference_url https://security.gentoo.org/glsa/202208-36
reference_id GLSA-202208-36
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:13Z/
url https://security.gentoo.org/glsa/202208-36
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.28-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.28-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.28-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2021-2475
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1kd2-vwft-zyaq
10
url VCID-1kvg-9jhd-vuhq
vulnerability_id VCID-1kvg-9jhd-vuhq
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14712
reference_id
reference_type
scores
0
value 0.00312
scoring_system epss
scoring_elements 0.54269
published_at 2026-04-01T12:55:00Z
1
value 0.00312
scoring_system epss
scoring_elements 0.54289
published_at 2026-04-02T12:55:00Z
2
value 0.00312
scoring_system epss
scoring_elements 0.54372
published_at 2026-04-12T12:55:00Z
3
value 0.00312
scoring_system epss
scoring_elements 0.54351
published_at 2026-04-13T12:55:00Z
4
value 0.00312
scoring_system epss
scoring_elements 0.54394
published_at 2026-04-18T12:55:00Z
5
value 0.00312
scoring_system epss
scoring_elements 0.54375
published_at 2026-04-21T12:55:00Z
6
value 0.00312
scoring_system epss
scoring_elements 0.54319
published_at 2026-04-04T12:55:00Z
7
value 0.00312
scoring_system epss
scoring_elements 0.54294
published_at 2026-04-07T12:55:00Z
8
value 0.00312
scoring_system epss
scoring_elements 0.54345
published_at 2026-04-08T12:55:00Z
9
value 0.00312
scoring_system epss
scoring_elements 0.54341
published_at 2026-04-09T12:55:00Z
10
value 0.00312
scoring_system epss
scoring_elements 0.5439
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14712
1
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:10Z/
url https://security.gentoo.org/glsa/202101-09
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html
reference_id msg00068.html
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:10Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html
reference_id msg00079.html
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:10Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.12-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.12-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.12-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2020-14712
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1kvg-9jhd-vuhq
11
url VCID-1kz2-xtxt-ufha
vulnerability_id VCID-1kz2-xtxt-ufha
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-3002
reference_id
reference_type
scores
0
value 0.00167
scoring_system epss
scoring_elements 0.3771
published_at 2026-04-01T12:55:00Z
1
value 0.00167
scoring_system epss
scoring_elements 0.37845
published_at 2026-04-08T12:55:00Z
2
value 0.00167
scoring_system epss
scoring_elements 0.37857
published_at 2026-04-16T12:55:00Z
3
value 0.00167
scoring_system epss
scoring_elements 0.37872
published_at 2026-04-11T12:55:00Z
4
value 0.00167
scoring_system epss
scoring_elements 0.37836
published_at 2026-04-12T12:55:00Z
5
value 0.00167
scoring_system epss
scoring_elements 0.37811
published_at 2026-04-13T12:55:00Z
6
value 0.00167
scoring_system epss
scoring_elements 0.37838
published_at 2026-04-18T12:55:00Z
7
value 0.00167
scoring_system epss
scoring_elements 0.37891
published_at 2026-04-02T12:55:00Z
8
value 0.00167
scoring_system epss
scoring_elements 0.37916
published_at 2026-04-04T12:55:00Z
9
value 0.00167
scoring_system epss
scoring_elements 0.37794
published_at 2026-04-07T12:55:00Z
10
value 0.00216
scoring_system epss
scoring_elements 0.4411
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-3002
1
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:26Z/
url http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
2
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
3
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-3002
reference_id CVE-2019-3002
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
1
value 6.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-3002
4
reference_url https://security.gentoo.org/glsa/202004-02
reference_id GLSA-202004-02
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:26Z/
url https://security.gentoo.org/glsa/202004-02
5
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:26Z/
url https://security.gentoo.org/glsa/202101-09
fixed_packages
0
url pkg:deb/debian/virtualbox@6.0.14-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.0.14-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.0.14-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2019-3002
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1kz2-xtxt-ufha
12
url VCID-1mnd-zfa2-2qgn
vulnerability_id VCID-1mnd-zfa2-2qgn
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which might allow unauthorized changes to some critical or all
    accessible data.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3290
reference_id
reference_type
scores
0
value 0.00075
scoring_system epss
scoring_elements 0.22549
published_at 2026-04-21T12:55:00Z
1
value 0.00075
scoring_system epss
scoring_elements 0.22703
published_at 2026-04-02T12:55:00Z
2
value 0.00075
scoring_system epss
scoring_elements 0.22588
published_at 2026-04-13T12:55:00Z
3
value 0.00075
scoring_system epss
scoring_elements 0.22603
published_at 2026-04-16T12:55:00Z
4
value 0.00075
scoring_system epss
scoring_elements 0.226
published_at 2026-04-18T12:55:00Z
5
value 0.00075
scoring_system epss
scoring_elements 0.22531
published_at 2026-04-01T12:55:00Z
6
value 0.00075
scoring_system epss
scoring_elements 0.22748
published_at 2026-04-04T12:55:00Z
7
value 0.00075
scoring_system epss
scoring_elements 0.22536
published_at 2026-04-07T12:55:00Z
8
value 0.00075
scoring_system epss
scoring_elements 0.22613
published_at 2026-04-08T12:55:00Z
9
value 0.00075
scoring_system epss
scoring_elements 0.22666
published_at 2026-04-09T12:55:00Z
10
value 0.00075
scoring_system epss
scoring_elements 0.22684
published_at 2026-04-11T12:55:00Z
11
value 0.00075
scoring_system epss
scoring_elements 0.22643
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3290
1
reference_url http://www.securitytracker.com/id/1037638
reference_id 1037638
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:46Z/
url http://www.securitytracker.com/id/1037638
2
reference_url http://www.securityfocus.com/bid/95601
reference_id 95601
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:46Z/
url http://www.securityfocus.com/bid/95601
3
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
reference_id cpujan2017-2881727.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:46Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
4
reference_url https://security.gentoo.org/glsa/201702-08
reference_id GLSA-201702-08
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:46Z/
url https://security.gentoo.org/glsa/201702-08
fixed_packages
0
url pkg:deb/debian/virtualbox@5.1.14-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.1.14-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.1.14-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2017-3290
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1mnd-zfa2-2qgn
13
url VCID-1ms1-6m6u-bkca
vulnerability_id VCID-1ms1-6m6u-bkca
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14676
reference_id
reference_type
scores
0
value 0.0016
scoring_system epss
scoring_elements 0.36832
published_at 2026-04-01T12:55:00Z
1
value 0.0016
scoring_system epss
scoring_elements 0.36989
published_at 2026-04-02T12:55:00Z
2
value 0.0016
scoring_system epss
scoring_elements 0.36926
published_at 2026-04-11T12:55:00Z
3
value 0.0016
scoring_system epss
scoring_elements 0.36891
published_at 2026-04-12T12:55:00Z
4
value 0.0016
scoring_system epss
scoring_elements 0.36866
published_at 2026-04-13T12:55:00Z
5
value 0.0016
scoring_system epss
scoring_elements 0.36911
published_at 2026-04-16T12:55:00Z
6
value 0.0016
scoring_system epss
scoring_elements 0.36895
published_at 2026-04-18T12:55:00Z
7
value 0.0016
scoring_system epss
scoring_elements 0.36837
published_at 2026-04-21T12:55:00Z
8
value 0.0016
scoring_system epss
scoring_elements 0.37024
published_at 2026-04-04T12:55:00Z
9
value 0.0016
scoring_system epss
scoring_elements 0.36852
published_at 2026-04-07T12:55:00Z
10
value 0.0016
scoring_system epss
scoring_elements 0.36902
published_at 2026-04-08T12:55:00Z
11
value 0.0016
scoring_system epss
scoring_elements 0.36918
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14676
1
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:47Z/
url https://security.gentoo.org/glsa/202101-09
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html
reference_id msg00068.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:47Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html
reference_id msg00079.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:47Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html
4
reference_url https://www.zerodayinitiative.com/advisories/ZDI-20-894/
reference_id ZDI-20-894
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:47Z/
url https://www.zerodayinitiative.com/advisories/ZDI-20-894/
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.12-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.12-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.12-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2020-14676
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1ms1-6m6u-bkca
14
url VCID-1tnp-5rpu-7bgy
vulnerability_id VCID-1tnp-5rpu-7bgy
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.1.24. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox as well as unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data and unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 7.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10240
reference_id
reference_type
scores
0
value 0.00059
scoring_system epss
scoring_elements 0.18474
published_at 2026-04-21T12:55:00Z
1
value 0.00059
scoring_system epss
scoring_elements 0.18695
published_at 2026-04-02T12:55:00Z
2
value 0.00059
scoring_system epss
scoring_elements 0.18443
published_at 2026-04-16T12:55:00Z
3
value 0.00059
scoring_system epss
scoring_elements 0.18453
published_at 2026-04-18T12:55:00Z
4
value 0.00059
scoring_system epss
scoring_elements 0.18554
published_at 2026-04-12T12:55:00Z
5
value 0.00059
scoring_system epss
scoring_elements 0.18749
published_at 2026-04-04T12:55:00Z
6
value 0.00059
scoring_system epss
scoring_elements 0.18466
published_at 2026-04-07T12:55:00Z
7
value 0.00059
scoring_system epss
scoring_elements 0.18546
published_at 2026-04-08T12:55:00Z
8
value 0.00059
scoring_system epss
scoring_elements 0.18599
published_at 2026-04-09T12:55:00Z
9
value 0.00059
scoring_system epss
scoring_elements 0.18601
published_at 2026-04-11T12:55:00Z
10
value 0.00059
scoring_system epss
scoring_elements 0.18502
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10240
1
reference_url http://www.securitytracker.com/id/1038929
reference_id 1038929
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:49:05Z/
url http://www.securitytracker.com/id/1038929
2
reference_url http://www.securityfocus.com/bid/99683
reference_id 99683
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:49:05Z/
url http://www.securityfocus.com/bid/99683
fixed_packages
0
url pkg:deb/debian/virtualbox@5.1.24-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.1.24-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.1.24-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2017-10240
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1tnp-5rpu-7bgy
15
url VCID-22js-xq7x-syhx
vulnerability_id VCID-22js-xq7x-syhx
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2676
reference_id
reference_type
scores
0
value 0.00165
scoring_system epss
scoring_elements 0.37471
published_at 2026-04-21T12:55:00Z
1
value 0.00165
scoring_system epss
scoring_elements 0.37589
published_at 2026-04-02T12:55:00Z
2
value 0.00165
scoring_system epss
scoring_elements 0.37506
published_at 2026-04-13T12:55:00Z
3
value 0.00165
scoring_system epss
scoring_elements 0.37535
published_at 2026-04-18T12:55:00Z
4
value 0.00165
scoring_system epss
scoring_elements 0.37423
published_at 2026-04-01T12:55:00Z
5
value 0.00165
scoring_system epss
scoring_elements 0.37612
published_at 2026-04-04T12:55:00Z
6
value 0.00165
scoring_system epss
scoring_elements 0.37489
published_at 2026-04-07T12:55:00Z
7
value 0.00165
scoring_system epss
scoring_elements 0.3754
published_at 2026-04-08T12:55:00Z
8
value 0.00165
scoring_system epss
scoring_elements 0.37553
published_at 2026-04-16T12:55:00Z
9
value 0.00165
scoring_system epss
scoring_elements 0.37567
published_at 2026-04-11T12:55:00Z
10
value 0.00165
scoring_system epss
scoring_elements 0.37533
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2676
1
reference_url http://www.securityfocus.com/bid/102699
reference_id 102699
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:54Z/
url http://www.securityfocus.com/bid/102699
2
reference_url http://www.securitytracker.com/id/1040202
reference_id 1040202
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:54Z/
url http://www.securitytracker.com/id/1040202
3
reference_url https://security.gentoo.org/glsa/201802-01
reference_id GLSA-201802-01
reference_type
scores
url https://security.gentoo.org/glsa/201802-01
fixed_packages
0
url pkg:deb/debian/virtualbox@5.2.6-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.2.6-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.6-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2018-2676
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-22js-xq7x-syhx
16
url VCID-26qh-gga7-7kgd
vulnerability_id VCID-26qh-gga7-7kgd
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.1.24. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox as well as unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data and unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 7.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10238
reference_id
reference_type
scores
0
value 0.00061
scoring_system epss
scoring_elements 0.19135
published_at 2026-04-21T12:55:00Z
1
value 0.00061
scoring_system epss
scoring_elements 0.19352
published_at 2026-04-02T12:55:00Z
2
value 0.00061
scoring_system epss
scoring_elements 0.19117
published_at 2026-04-16T12:55:00Z
3
value 0.00061
scoring_system epss
scoring_elements 0.19126
published_at 2026-04-18T12:55:00Z
4
value 0.00061
scoring_system epss
scoring_elements 0.19217
published_at 2026-04-01T12:55:00Z
5
value 0.00061
scoring_system epss
scoring_elements 0.19404
published_at 2026-04-04T12:55:00Z
6
value 0.00061
scoring_system epss
scoring_elements 0.1912
published_at 2026-04-07T12:55:00Z
7
value 0.00061
scoring_system epss
scoring_elements 0.192
published_at 2026-04-08T12:55:00Z
8
value 0.00061
scoring_system epss
scoring_elements 0.19253
published_at 2026-04-09T12:55:00Z
9
value 0.00061
scoring_system epss
scoring_elements 0.19258
published_at 2026-04-11T12:55:00Z
10
value 0.00061
scoring_system epss
scoring_elements 0.19212
published_at 2026-04-12T12:55:00Z
11
value 0.00061
scoring_system epss
scoring_elements 0.19157
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10238
1
reference_url http://www.securitytracker.com/id/1038929
reference_id 1038929
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:49:11Z/
url http://www.securitytracker.com/id/1038929
2
reference_url http://www.securityfocus.com/bid/99668
reference_id 99668
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:49:11Z/
url http://www.securityfocus.com/bid/99668
fixed_packages
0
url pkg:deb/debian/virtualbox@5.1.24-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.1.24-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.1.24-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2017-10238
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-26qh-gga7-7kgd
17
url VCID-26vv-az1y-6ygq
vulnerability_id VCID-26vv-az1y-6ygq
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:19Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2914
reference_id
reference_type
scores
0
value 0.00208
scoring_system epss
scoring_elements 0.4309
published_at 2026-04-01T12:55:00Z
1
value 0.00208
scoring_system epss
scoring_elements 0.43168
published_at 2026-04-12T12:55:00Z
2
value 0.00208
scoring_system epss
scoring_elements 0.4318
published_at 2026-04-09T12:55:00Z
3
value 0.00208
scoring_system epss
scoring_elements 0.43201
published_at 2026-04-11T12:55:00Z
4
value 0.00208
scoring_system epss
scoring_elements 0.43153
published_at 2026-04-13T12:55:00Z
5
value 0.00208
scoring_system epss
scoring_elements 0.43213
published_at 2026-04-16T12:55:00Z
6
value 0.00208
scoring_system epss
scoring_elements 0.43202
published_at 2026-04-18T12:55:00Z
7
value 0.00208
scoring_system epss
scoring_elements 0.43135
published_at 2026-04-21T12:55:00Z
8
value 0.00208
scoring_system epss
scoring_elements 0.43149
published_at 2026-04-02T12:55:00Z
9
value 0.00208
scoring_system epss
scoring_elements 0.43177
published_at 2026-04-04T12:55:00Z
10
value 0.00208
scoring_system epss
scoring_elements 0.43115
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2914
2
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:19Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
3
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2914
reference_id CVE-2020-2914
reference_type
scores
0
value 4.4
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:P/A:P
1
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
2
value 7.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-2914
6
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value 7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:19Z/
url https://security.gentoo.org/glsa/202101-09
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.6-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.6-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.6-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2020-2914
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-26vv-az1y-6ygq
18
url VCID-29mb-1bzt-aqb8
vulnerability_id VCID-29mb-1bzt-aqb8
summary Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization VirtualBox before 5.0.26 allows local users to affect availability via vectors related to Core.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-3597
reference_id
reference_type
scores
0
value 0.00074
scoring_system epss
scoring_elements 0.22313
published_at 2026-04-21T12:55:00Z
1
value 0.00074
scoring_system epss
scoring_elements 0.22452
published_at 2026-04-11T12:55:00Z
2
value 0.00074
scoring_system epss
scoring_elements 0.2241
published_at 2026-04-12T12:55:00Z
3
value 0.00074
scoring_system epss
scoring_elements 0.22353
published_at 2026-04-13T12:55:00Z
4
value 0.00074
scoring_system epss
scoring_elements 0.2237
published_at 2026-04-16T12:55:00Z
5
value 0.00074
scoring_system epss
scoring_elements 0.22364
published_at 2026-04-18T12:55:00Z
6
value 0.00074
scoring_system epss
scoring_elements 0.22294
published_at 2026-04-07T12:55:00Z
7
value 0.00074
scoring_system epss
scoring_elements 0.2246
published_at 2026-04-02T12:55:00Z
8
value 0.00074
scoring_system epss
scoring_elements 0.22505
published_at 2026-04-04T12:55:00Z
9
value 0.00074
scoring_system epss
scoring_elements 0.22376
published_at 2026-04-08T12:55:00Z
10
value 0.00074
scoring_system epss
scoring_elements 0.22431
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-3597
1
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:53Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
2
reference_url http://www.securityfocus.com/bid/91787
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:53Z/
url http://www.securityfocus.com/bid/91787
3
reference_url http://www.securityfocus.com/bid/91864
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:53Z/
url http://www.securityfocus.com/bid/91864
4
reference_url http://www.securitytracker.com/id/1036384
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:53Z/
url http://www.securitytracker.com/id/1036384
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-3597
reference_id CVE-2016-3597
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-3597
fixed_packages
0
url pkg:deb/debian/virtualbox@5.1.4-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.1.4-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.1.4-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2016-3597
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-29mb-1bzt-aqb8
19
url VCID-29n7-4eyc-y3bk
vulnerability_id VCID-29n7-4eyc-y3bk
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-3297
reference_id
reference_type
scores
0
value 0.0045
scoring_system epss
scoring_elements 0.63619
published_at 2026-04-02T12:55:00Z
1
value 0.0045
scoring_system epss
scoring_elements 0.63669
published_at 2026-04-21T12:55:00Z
2
value 0.0045
scoring_system epss
scoring_elements 0.63676
published_at 2026-04-16T12:55:00Z
3
value 0.0045
scoring_system epss
scoring_elements 0.63686
published_at 2026-04-18T12:55:00Z
4
value 0.0045
scoring_system epss
scoring_elements 0.63559
published_at 2026-04-01T12:55:00Z
5
value 0.0045
scoring_system epss
scoring_elements 0.63645
published_at 2026-04-04T12:55:00Z
6
value 0.0045
scoring_system epss
scoring_elements 0.63604
published_at 2026-04-07T12:55:00Z
7
value 0.0045
scoring_system epss
scoring_elements 0.63656
published_at 2026-04-08T12:55:00Z
8
value 0.0045
scoring_system epss
scoring_elements 0.63672
published_at 2026-04-12T12:55:00Z
9
value 0.0045
scoring_system epss
scoring_elements 0.63687
published_at 2026-04-11T12:55:00Z
10
value 0.0045
scoring_system epss
scoring_elements 0.63639
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-3297
1
reference_url http://www.securitytracker.com/id/1041887
reference_id 1041887
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:15:51Z/
url http://www.securitytracker.com/id/1041887
2
reference_url http://www.securityfocus.com/bid/105619
reference_id 105619
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:15:51Z/
url http://www.securityfocus.com/bid/105619
fixed_packages
0
url pkg:deb/debian/virtualbox@5.2.20-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.2.20-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.20-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2018-3297
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-29n7-4eyc-y3bk
20
url VCID-2a63-hzam-z7h7
vulnerability_id VCID-2a63-hzam-z7h7
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could result in privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2125
reference_id
reference_type
scores
0
value 0.0012
scoring_system epss
scoring_elements 0.30962
published_at 2026-04-21T12:55:00Z
1
value 0.0012
scoring_system epss
scoring_elements 0.31028
published_at 2026-04-12T12:55:00Z
2
value 0.0012
scoring_system epss
scoring_elements 0.30983
published_at 2026-04-13T12:55:00Z
3
value 0.0012
scoring_system epss
scoring_elements 0.31013
published_at 2026-04-16T12:55:00Z
4
value 0.0012
scoring_system epss
scoring_elements 0.30995
published_at 2026-04-18T12:55:00Z
5
value 0.0012
scoring_system epss
scoring_elements 0.3099
published_at 2026-04-01T12:55:00Z
6
value 0.0012
scoring_system epss
scoring_elements 0.31114
published_at 2026-04-02T12:55:00Z
7
value 0.0012
scoring_system epss
scoring_elements 0.31161
published_at 2026-04-04T12:55:00Z
8
value 0.0012
scoring_system epss
scoring_elements 0.3098
published_at 2026-04-07T12:55:00Z
9
value 0.0012
scoring_system epss
scoring_elements 0.31037
published_at 2026-04-08T12:55:00Z
10
value 0.0012
scoring_system epss
scoring_elements 0.31066
published_at 2026-04-09T12:55:00Z
11
value 0.0012
scoring_system epss
scoring_elements 0.31072
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2125
1
reference_url https://security.archlinux.org/ASA-202101-37
reference_id ASA-202101-37
reference_type
scores
url https://security.archlinux.org/ASA-202101-37
2
reference_url https://security.archlinux.org/AVG-1483
reference_id AVG-1483
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1483
3
reference_url https://security.gentoo.org/glsa/202101-15
reference_id GLSA-202101-15
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:53:17Z/
url https://security.gentoo.org/glsa/202101-15
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.18-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.18-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.18-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2021-2125
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2a63-hzam-z7h7
21
url VCID-2atk-1h4j-jqbb
vulnerability_id VCID-2atk-1h4j-jqbb
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which allows local users to escalate privileges.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-6595
reference_id
reference_type
scores
0
value 0.00079
scoring_system epss
scoring_elements 0.23302
published_at 2026-04-01T12:55:00Z
1
value 0.00079
scoring_system epss
scoring_elements 0.23475
published_at 2026-04-02T12:55:00Z
2
value 0.00079
scoring_system epss
scoring_elements 0.23513
published_at 2026-04-04T12:55:00Z
3
value 0.00079
scoring_system epss
scoring_elements 0.23296
published_at 2026-04-07T12:55:00Z
4
value 0.00079
scoring_system epss
scoring_elements 0.23369
published_at 2026-04-08T12:55:00Z
5
value 0.00079
scoring_system epss
scoring_elements 0.2342
published_at 2026-04-09T12:55:00Z
6
value 0.00079
scoring_system epss
scoring_elements 0.23439
published_at 2026-04-11T12:55:00Z
7
value 0.00079
scoring_system epss
scoring_elements 0.23402
published_at 2026-04-12T12:55:00Z
8
value 0.00079
scoring_system epss
scoring_elements 0.23348
published_at 2026-04-13T12:55:00Z
9
value 0.00079
scoring_system epss
scoring_elements 0.23366
published_at 2026-04-16T12:55:00Z
10
value 0.00079
scoring_system epss
scoring_elements 0.2336
published_at 2026-04-18T12:55:00Z
11
value 0.00079
scoring_system epss
scoring_elements 0.2334
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-6595
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775888
reference_id 775888
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775888
2
reference_url https://security.gentoo.org/glsa/201612-27
reference_id GLSA-201612-27
reference_type
scores
url https://security.gentoo.org/glsa/201612-27
fixed_packages
0
url pkg:deb/debian/virtualbox@4.3.18-dfsg-2?distro=sid
purl pkg:deb/debian/virtualbox@4.3.18-dfsg-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@4.3.18-dfsg-2%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2014-6595
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2atk-1h4j-jqbb
22
url VCID-2dnw-zdwz-duc3
vulnerability_id VCID-2dnw-zdwz-duc3
summary Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization VirtualBox before 5.0.14 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Windows Installer. NOTE: the previous information is from the January 2016 CPU. Oracle has not commented on third-party claims that this is an untrusted search path issue that allows local users to gain privileges via a Trojan horse dll in the "application directory."
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0602
reference_id
reference_type
scores
0
value 0.01047
scoring_system epss
scoring_elements 0.7754
published_at 2026-04-21T12:55:00Z
1
value 0.01047
scoring_system epss
scoring_elements 0.77453
published_at 2026-04-01T12:55:00Z
2
value 0.01047
scoring_system epss
scoring_elements 0.7746
published_at 2026-04-02T12:55:00Z
3
value 0.01047
scoring_system epss
scoring_elements 0.77485
published_at 2026-04-04T12:55:00Z
4
value 0.01047
scoring_system epss
scoring_elements 0.77466
published_at 2026-04-07T12:55:00Z
5
value 0.01047
scoring_system epss
scoring_elements 0.77495
published_at 2026-04-08T12:55:00Z
6
value 0.01047
scoring_system epss
scoring_elements 0.77505
published_at 2026-04-09T12:55:00Z
7
value 0.01047
scoring_system epss
scoring_elements 0.77531
published_at 2026-04-11T12:55:00Z
8
value 0.01047
scoring_system epss
scoring_elements 0.77515
published_at 2026-04-12T12:55:00Z
9
value 0.01047
scoring_system epss
scoring_elements 0.77512
published_at 2026-04-13T12:55:00Z
10
value 0.01047
scoring_system epss
scoring_elements 0.77551
published_at 2026-04-16T12:55:00Z
11
value 0.01047
scoring_system epss
scoring_elements 0.77548
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0602
1
reference_url http://seclists.org/fulldisclosure/2016/Feb/54
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2016/Feb/54
2
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
3
reference_url http://www.securityfocus.com/archive/1/537462/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/537462/100/0/threaded
4
reference_url http://www.securitytracker.com/id/1034731
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034731
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0602
reference_id CVE-2016-0602
reference_type
scores
0
value 6.2
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2016-0602
fixed_packages
0
url pkg:deb/debian/virtualbox@0?distro=sid
purl pkg:deb/debian/virtualbox@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@0%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2016-0602
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2dnw-zdwz-duc3
23
url VCID-2dpy-reut-bqft
vulnerability_id VCID-2dpy-reut-bqft
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:28Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2908
reference_id
reference_type
scores
0
value 0.00163
scoring_system epss
scoring_elements 0.37214
published_at 2026-04-21T12:55:00Z
1
value 0.00163
scoring_system epss
scoring_elements 0.37225
published_at 2026-04-07T12:55:00Z
2
value 0.00163
scoring_system epss
scoring_elements 0.37276
published_at 2026-04-08T12:55:00Z
3
value 0.00163
scoring_system epss
scoring_elements 0.37289
published_at 2026-04-09T12:55:00Z
4
value 0.00163
scoring_system epss
scoring_elements 0.373
published_at 2026-04-11T12:55:00Z
5
value 0.00163
scoring_system epss
scoring_elements 0.37267
published_at 2026-04-12T12:55:00Z
6
value 0.00163
scoring_system epss
scoring_elements 0.37239
published_at 2026-04-13T12:55:00Z
7
value 0.00163
scoring_system epss
scoring_elements 0.37285
published_at 2026-04-16T12:55:00Z
8
value 0.00163
scoring_system epss
scoring_elements 0.37268
published_at 2026-04-18T12:55:00Z
9
value 0.00163
scoring_system epss
scoring_elements 0.37204
published_at 2026-04-01T12:55:00Z
10
value 0.00163
scoring_system epss
scoring_elements 0.3737
published_at 2026-04-02T12:55:00Z
11
value 0.00163
scoring_system epss
scoring_elements 0.37397
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2908
2
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:28Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
3
reference_url https://www.zerodayinitiative.com/advisories/ZDI-20-501/
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:28Z/
url https://www.zerodayinitiative.com/advisories/ZDI-20-501/
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2908
reference_id CVE-2020-2908
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
1
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
2
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-2908
7
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:28Z/
url https://security.gentoo.org/glsa/202101-09
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.6-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.6-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.6-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2020-2908
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2dpy-reut-bqft
24
url VCID-2dqk-t9gt-kqhu
vulnerability_id VCID-2dqk-t9gt-kqhu
summary Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 7.0.16. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21112
reference_id
reference_type
scores
0
value 0.0014
scoring_system epss
scoring_elements 0.34198
published_at 2026-04-21T12:55:00Z
1
value 0.0014
scoring_system epss
scoring_elements 0.34246
published_at 2026-04-16T12:55:00Z
2
value 0.0014
scoring_system epss
scoring_elements 0.34233
published_at 2026-04-18T12:55:00Z
3
value 0.0014
scoring_system epss
scoring_elements 0.34309
published_at 2026-04-02T12:55:00Z
4
value 0.0014
scoring_system epss
scoring_elements 0.34338
published_at 2026-04-04T12:55:00Z
5
value 0.0014
scoring_system epss
scoring_elements 0.34202
published_at 2026-04-07T12:55:00Z
6
value 0.0014
scoring_system epss
scoring_elements 0.34245
published_at 2026-04-08T12:55:00Z
7
value 0.0014
scoring_system epss
scoring_elements 0.34275
published_at 2026-04-11T12:55:00Z
8
value 0.0014
scoring_system epss
scoring_elements 0.34235
published_at 2026-04-12T12:55:00Z
9
value 0.0014
scoring_system epss
scoring_elements 0.34211
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21112
1
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.0.16:*:*:*:*:*:*:*
2
reference_url https://www.oracle.com/security-alerts/cpuapr2024.html
reference_id cpuapr2024.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-19T04:01:11Z/
url https://www.oracle.com/security-alerts/cpuapr2024.html
fixed_packages
0
url pkg:deb/debian/virtualbox@7.0.16-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.0.16-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.0.16-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2024-21112
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2dqk-t9gt-kqhu
25
url VCID-2f6u-9ns4-s3bx
vulnerability_id VCID-2f6u-9ns4-s3bx
summary Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-21985
reference_id
reference_type
scores
0
value 0.00022
scoring_system epss
scoring_elements 0.06082
published_at 2026-04-21T12:55:00Z
1
value 0.00022
scoring_system epss
scoring_elements 0.05931
published_at 2026-04-18T12:55:00Z
2
value 0.00022
scoring_system epss
scoring_elements 0.05891
published_at 2026-04-02T12:55:00Z
3
value 0.00022
scoring_system epss
scoring_elements 0.05925
published_at 2026-04-04T12:55:00Z
4
value 0.00022
scoring_system epss
scoring_elements 0.05914
published_at 2026-04-07T12:55:00Z
5
value 0.00022
scoring_system epss
scoring_elements 0.05952
published_at 2026-04-08T12:55:00Z
6
value 0.00022
scoring_system epss
scoring_elements 0.05992
published_at 2026-04-09T12:55:00Z
7
value 0.00022
scoring_system epss
scoring_elements 0.05973
published_at 2026-04-11T12:55:00Z
8
value 0.00022
scoring_system epss
scoring_elements 0.05964
published_at 2026-04-12T12:55:00Z
9
value 0.00022
scoring_system epss
scoring_elements 0.05954
published_at 2026-04-13T12:55:00Z
10
value 0.00022
scoring_system epss
scoring_elements 0.0592
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-21985
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126117
reference_id 1126117
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126117
2
reference_url https://www.oracle.com/security-alerts/cpujan2026.html
reference_id cpujan2026.html
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-23T18:56:39Z/
url https://www.oracle.com/security-alerts/cpujan2026.html
fixed_packages
0
url pkg:deb/debian/virtualbox@7.2.6-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2026-21985
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2f6u-9ns4-s3bx
26
url VCID-2fas-kjyg-kbc8
vulnerability_id VCID-2fas-kjyg-kbc8
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4813
reference_id
reference_type
scores
0
value 0.00056
scoring_system epss
scoring_elements 0.17403
published_at 2026-04-01T12:55:00Z
1
value 0.00056
scoring_system epss
scoring_elements 0.17563
published_at 2026-04-02T12:55:00Z
2
value 0.00056
scoring_system epss
scoring_elements 0.17609
published_at 2026-04-04T12:55:00Z
3
value 0.00056
scoring_system epss
scoring_elements 0.17392
published_at 2026-04-07T12:55:00Z
4
value 0.00056
scoring_system epss
scoring_elements 0.17484
published_at 2026-04-08T12:55:00Z
5
value 0.00056
scoring_system epss
scoring_elements 0.17544
published_at 2026-04-09T12:55:00Z
6
value 0.00056
scoring_system epss
scoring_elements 0.17557
published_at 2026-04-11T12:55:00Z
7
value 0.00056
scoring_system epss
scoring_elements 0.17509
published_at 2026-04-12T12:55:00Z
8
value 0.00056
scoring_system epss
scoring_elements 0.17456
published_at 2026-04-13T12:55:00Z
9
value 0.00056
scoring_system epss
scoring_elements 0.17398
published_at 2026-04-16T12:55:00Z
10
value 0.00056
scoring_system epss
scoring_elements 0.17409
published_at 2026-04-18T12:55:00Z
11
value 0.00056
scoring_system epss
scoring_elements 0.17443
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4813
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4813
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4896
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4896
fixed_packages
0
url pkg:deb/debian/virtualbox@5.0.8-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.0.8-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.0.8-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2015-4813
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2fas-kjyg-kbc8
27
url VCID-2fc8-9cbt-uyd1
vulnerability_id VCID-2fc8-9cbt-uyd1
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2863
reference_id
reference_type
scores
0
value 0.00104
scoring_system epss
scoring_elements 0.2854
published_at 2026-04-02T12:55:00Z
1
value 0.00104
scoring_system epss
scoring_elements 0.28344
published_at 2026-04-21T12:55:00Z
2
value 0.00104
scoring_system epss
scoring_elements 0.28396
published_at 2026-04-18T12:55:00Z
3
value 0.00104
scoring_system epss
scoring_elements 0.28446
published_at 2026-04-01T12:55:00Z
4
value 0.00104
scoring_system epss
scoring_elements 0.28582
published_at 2026-04-04T12:55:00Z
5
value 0.00104
scoring_system epss
scoring_elements 0.28384
published_at 2026-04-07T12:55:00Z
6
value 0.00104
scoring_system epss
scoring_elements 0.2845
published_at 2026-04-08T12:55:00Z
7
value 0.00104
scoring_system epss
scoring_elements 0.28492
published_at 2026-04-09T12:55:00Z
8
value 0.00104
scoring_system epss
scoring_elements 0.28496
published_at 2026-04-11T12:55:00Z
9
value 0.00104
scoring_system epss
scoring_elements 0.28453
published_at 2026-04-12T12:55:00Z
10
value 0.00104
scoring_system epss
scoring_elements 0.28403
published_at 2026-04-13T12:55:00Z
11
value 0.00104
scoring_system epss
scoring_elements 0.28418
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2863
1
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
reference_id cpujul2019-5072835.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:16:02Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
2
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:16:02Z/
url https://security.gentoo.org/glsa/202101-09
fixed_packages
0
url pkg:deb/debian/virtualbox@6.0.10-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.0.10-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.0.10-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2019-2863
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2fc8-9cbt-uyd1
28
url VCID-2h35-vvte-g7cs
vulnerability_id VCID-2h35-vvte-g7cs
summary x86: CPU lockup during exception delivery
references
0
reference_url http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cbdb967af3d54993f5814f1cee0ed311a055377d
reference_id
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/
url http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cbdb967af3d54993f5814f1cee0ed311a055377d
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172187.html
reference_id
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/
url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172187.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172300.html
reference_id
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/
url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172300.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172435.html
reference_id
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/
url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172435.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html
reference_id
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html
reference_id
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html
reference_id
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html
reference_id
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html
8
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html
reference_id
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html
9
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html
reference_id
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html
10
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
reference_id
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
11
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html
reference_id
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html
12
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00053.html
reference_id
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00053.html
13
reference_url http://rhn.redhat.com/errata/RHSA-2015-2636.html
reference_id
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/
url http://rhn.redhat.com/errata/RHSA-2015-2636.html
14
reference_url http://rhn.redhat.com/errata/RHSA-2015-2645.html
reference_id
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/
url http://rhn.redhat.com/errata/RHSA-2015-2645.html
15
reference_url http://rhn.redhat.com/errata/RHSA-2016-0046.html
reference_id
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/
url http://rhn.redhat.com/errata/RHSA-2016-0046.html
16
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8104.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8104.json
17
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-8104
reference_id
reference_type
scores
0
value 0.00327
scoring_system epss
scoring_elements 0.55673
published_at 2026-04-21T12:55:00Z
1
value 0.00327
scoring_system epss
scoring_elements 0.55511
published_at 2026-04-01T12:55:00Z
2
value 0.00327
scoring_system epss
scoring_elements 0.55622
published_at 2026-04-02T12:55:00Z
3
value 0.00327
scoring_system epss
scoring_elements 0.55647
published_at 2026-04-04T12:55:00Z
4
value 0.00327
scoring_system epss
scoring_elements 0.55625
published_at 2026-04-07T12:55:00Z
5
value 0.00327
scoring_system epss
scoring_elements 0.55677
published_at 2026-04-08T12:55:00Z
6
value 0.00327
scoring_system epss
scoring_elements 0.5568
published_at 2026-04-09T12:55:00Z
7
value 0.00327
scoring_system epss
scoring_elements 0.55689
published_at 2026-04-11T12:55:00Z
8
value 0.00327
scoring_system epss
scoring_elements 0.55669
published_at 2026-04-12T12:55:00Z
9
value 0.00327
scoring_system epss
scoring_elements 0.55651
published_at 2026-04-13T12:55:00Z
10
value 0.00327
scoring_system epss
scoring_elements 0.5569
published_at 2026-04-16T12:55:00Z
11
value 0.00327
scoring_system epss
scoring_elements 0.55693
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-8104
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7446
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7446
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3259
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3259
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3340
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5307
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6654
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6654
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7311
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7311
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7799
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7812
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7813
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7814
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7833
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7969
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7969
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7970
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7970
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7971
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7971
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7972
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7972
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8104
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8104
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0495
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0495
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0592
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0592
36
reference_url https://github.com/torvalds/linux/commit/cbdb967af3d54993f5814f1cee0ed311a055377d
reference_id
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/
url https://github.com/torvalds/linux/commit/cbdb967af3d54993f5814f1cee0ed311a055377d
37
reference_url https://kb.juniper.net/JSA10783
reference_id
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/
url https://kb.juniper.net/JSA10783
38
reference_url http://support.citrix.com/article/CTX202583
reference_id
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/
url http://support.citrix.com/article/CTX202583
39
reference_url http://support.citrix.com/article/CTX203879
reference_id
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/
url http://support.citrix.com/article/CTX203879
40
reference_url http://www.debian.org/security/2015/dsa-3414
reference_id
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/
url http://www.debian.org/security/2015/dsa-3414
41
reference_url http://www.debian.org/security/2015/dsa-3426
reference_id
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/
url http://www.debian.org/security/2015/dsa-3426
42
reference_url http://www.debian.org/security/2016/dsa-3454
reference_id
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/
url http://www.debian.org/security/2016/dsa-3454
43
reference_url http://www.openwall.com/lists/oss-security/2015/11/10/5
reference_id
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/
url http://www.openwall.com/lists/oss-security/2015/11/10/5
44
reference_url http://www.openwall.com/lists/oss-security/2023/10/10/4
reference_id
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/
url http://www.openwall.com/lists/oss-security/2023/10/10/4
45
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
reference_id
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
46
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
reference_id
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/
url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
47
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
reference_id
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
48
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
reference_id
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/
url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
49
reference_url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
reference_id
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/
url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
50
reference_url http://www.securityfocus.com/bid/77524
reference_id
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/
url http://www.securityfocus.com/bid/77524
51
reference_url http://www.securityfocus.com/bid/91787
reference_id
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/
url http://www.securityfocus.com/bid/91787
52
reference_url http://www.securitytracker.com/id/1034105
reference_id
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/
url http://www.securitytracker.com/id/1034105
53
reference_url http://www.ubuntu.com/usn/USN-2840-1
reference_id
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/
url http://www.ubuntu.com/usn/USN-2840-1
54
reference_url http://www.ubuntu.com/usn/USN-2841-1
reference_id
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/
url http://www.ubuntu.com/usn/USN-2841-1
55
reference_url http://www.ubuntu.com/usn/USN-2841-2
reference_id
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/
url http://www.ubuntu.com/usn/USN-2841-2
56
reference_url http://www.ubuntu.com/usn/USN-2842-1
reference_id
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/
url http://www.ubuntu.com/usn/USN-2842-1
57
reference_url http://www.ubuntu.com/usn/USN-2842-2
reference_id
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/
url http://www.ubuntu.com/usn/USN-2842-2
58
reference_url http://www.ubuntu.com/usn/USN-2843-1
reference_id
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/
url http://www.ubuntu.com/usn/USN-2843-1
59
reference_url http://www.ubuntu.com/usn/USN-2843-2
reference_id
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/
url http://www.ubuntu.com/usn/USN-2843-2
60
reference_url http://www.ubuntu.com/usn/USN-2844-1
reference_id
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/
url http://www.ubuntu.com/usn/USN-2844-1
61
reference_url http://xenbits.xen.org/xsa/advisory-156.html
reference_id
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/
url http://xenbits.xen.org/xsa/advisory-156.html
62
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1278496
reference_id 1278496
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:47:48Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=1278496
63
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823620
reference_id 823620
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823620
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.3:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.2:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.3:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.1:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.2:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.4:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.5:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-8104
reference_id CVE-2015-8104
reference_type
scores
0
value 4.7
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:C
1
value 10.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2015-8104
91
reference_url https://access.redhat.com/errata/RHSA-2015:2552
reference_id RHSA-2015:2552
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2552
92
reference_url https://access.redhat.com/errata/RHSA-2015:2636
reference_id RHSA-2015:2636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2636
93
reference_url https://access.redhat.com/errata/RHSA-2015:2645
reference_id RHSA-2015:2645
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2645
94
reference_url https://access.redhat.com/errata/RHSA-2016:0004
reference_id RHSA-2016:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0004
95
reference_url https://access.redhat.com/errata/RHSA-2016:0024
reference_id RHSA-2016:0024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0024
96
reference_url https://access.redhat.com/errata/RHSA-2016:0046
reference_id RHSA-2016:0046
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0046
97
reference_url https://access.redhat.com/errata/RHSA-2016:0103
reference_id RHSA-2016:0103
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0103
98
reference_url https://usn.ubuntu.com/2840-1/
reference_id USN-2840-1
reference_type
scores
url https://usn.ubuntu.com/2840-1/
99
reference_url https://usn.ubuntu.com/2841-1/
reference_id USN-2841-1
reference_type
scores
url https://usn.ubuntu.com/2841-1/
100
reference_url https://usn.ubuntu.com/2841-2/
reference_id USN-2841-2
reference_type
scores
url https://usn.ubuntu.com/2841-2/
101
reference_url https://usn.ubuntu.com/2842-1/
reference_id USN-2842-1
reference_type
scores
url https://usn.ubuntu.com/2842-1/
102
reference_url https://usn.ubuntu.com/2842-2/
reference_id USN-2842-2
reference_type
scores
url https://usn.ubuntu.com/2842-2/
103
reference_url https://usn.ubuntu.com/2843-1/
reference_id USN-2843-1
reference_type
scores
url https://usn.ubuntu.com/2843-1/
104
reference_url https://usn.ubuntu.com/2843-2/
reference_id USN-2843-2
reference_type
scores
url https://usn.ubuntu.com/2843-2/
105
reference_url https://usn.ubuntu.com/2844-1/
reference_id USN-2844-1
reference_type
scores
url https://usn.ubuntu.com/2844-1/
106
reference_url https://xenbits.xen.org/xsa/advisory-156.html
reference_id XSA-156
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-156.html
fixed_packages
0
url pkg:deb/debian/virtualbox@5.0.10-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.0.10-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.0.10-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2015-8104
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2h35-vvte-g7cs
29
url VCID-2h63-wwcq-b3br
vulnerability_id VCID-2h63-wwcq-b3br
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2594
reference_id
reference_type
scores
0
value 0.00134
scoring_system epss
scoring_elements 0.3294
published_at 2026-04-01T12:55:00Z
1
value 0.00134
scoring_system epss
scoring_elements 0.33069
published_at 2026-04-02T12:55:00Z
2
value 0.00134
scoring_system epss
scoring_elements 0.33102
published_at 2026-04-04T12:55:00Z
3
value 0.00134
scoring_system epss
scoring_elements 0.32931
published_at 2026-04-21T12:55:00Z
4
value 0.00134
scoring_system epss
scoring_elements 0.32977
published_at 2026-04-08T12:55:00Z
5
value 0.00134
scoring_system epss
scoring_elements 0.33007
published_at 2026-04-09T12:55:00Z
6
value 0.00134
scoring_system epss
scoring_elements 0.3301
published_at 2026-04-11T12:55:00Z
7
value 0.00134
scoring_system epss
scoring_elements 0.32972
published_at 2026-04-12T12:55:00Z
8
value 0.00134
scoring_system epss
scoring_elements 0.32948
published_at 2026-04-13T12:55:00Z
9
value 0.00134
scoring_system epss
scoring_elements 0.3299
published_at 2026-04-16T12:55:00Z
10
value 0.00134
scoring_system epss
scoring_elements 0.32968
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2594
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2594
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=792446
reference_id 792446
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=792446
fixed_packages
0
url pkg:deb/debian/virtualbox@4.3.30-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@4.3.30-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@4.3.30-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2015-2594
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2h63-wwcq-b3br
30
url VCID-2hdx-s4fs-wua5
vulnerability_id VCID-2hdx-s4fs-wua5
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could result in privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2128
reference_id
reference_type
scores
0
value 0.00167
scoring_system epss
scoring_elements 0.37807
published_at 2026-04-21T12:55:00Z
1
value 0.00167
scoring_system epss
scoring_elements 0.37868
published_at 2026-04-12T12:55:00Z
2
value 0.00167
scoring_system epss
scoring_elements 0.37843
published_at 2026-04-13T12:55:00Z
3
value 0.00167
scoring_system epss
scoring_elements 0.3789
published_at 2026-04-16T12:55:00Z
4
value 0.00167
scoring_system epss
scoring_elements 0.3787
published_at 2026-04-18T12:55:00Z
5
value 0.00167
scoring_system epss
scoring_elements 0.3774
published_at 2026-04-01T12:55:00Z
6
value 0.00167
scoring_system epss
scoring_elements 0.37923
published_at 2026-04-02T12:55:00Z
7
value 0.00167
scoring_system epss
scoring_elements 0.37948
published_at 2026-04-04T12:55:00Z
8
value 0.00167
scoring_system epss
scoring_elements 0.37826
published_at 2026-04-07T12:55:00Z
9
value 0.00167
scoring_system epss
scoring_elements 0.37876
published_at 2026-04-08T12:55:00Z
10
value 0.00167
scoring_system epss
scoring_elements 0.37889
published_at 2026-04-09T12:55:00Z
11
value 0.00167
scoring_system epss
scoring_elements 0.37904
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2128
1
reference_url https://security.archlinux.org/ASA-202101-37
reference_id ASA-202101-37
reference_type
scores
url https://security.archlinux.org/ASA-202101-37
2
reference_url https://security.archlinux.org/AVG-1483
reference_id AVG-1483
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1483
3
reference_url https://security.gentoo.org/glsa/202101-15
reference_id GLSA-202101-15
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:53:12Z/
url https://security.gentoo.org/glsa/202101-15
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.18-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.18-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.18-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2021-2128
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2hdx-s4fs-wua5
31
url VCID-2qtf-4bmt-5uev
vulnerability_id VCID-2qtf-4bmt-5uev
summary Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 7.0.16. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21114
reference_id
reference_type
scores
0
value 0.0014
scoring_system epss
scoring_elements 0.34198
published_at 2026-04-21T12:55:00Z
1
value 0.0014
scoring_system epss
scoring_elements 0.34246
published_at 2026-04-16T12:55:00Z
2
value 0.0014
scoring_system epss
scoring_elements 0.34233
published_at 2026-04-18T12:55:00Z
3
value 0.0014
scoring_system epss
scoring_elements 0.34309
published_at 2026-04-02T12:55:00Z
4
value 0.0014
scoring_system epss
scoring_elements 0.34338
published_at 2026-04-04T12:55:00Z
5
value 0.0014
scoring_system epss
scoring_elements 0.34202
published_at 2026-04-07T12:55:00Z
6
value 0.0014
scoring_system epss
scoring_elements 0.34245
published_at 2026-04-08T12:55:00Z
7
value 0.0014
scoring_system epss
scoring_elements 0.34275
published_at 2026-04-11T12:55:00Z
8
value 0.0014
scoring_system epss
scoring_elements 0.34235
published_at 2026-04-12T12:55:00Z
9
value 0.0014
scoring_system epss
scoring_elements 0.34211
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21114
1
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.0.16:*:*:*:*:*:*:*
2
reference_url https://www.oracle.com/security-alerts/cpuapr2024.html
reference_id cpuapr2024.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-19T04:01:13Z/
url https://www.oracle.com/security-alerts/cpuapr2024.html
fixed_packages
0
url pkg:deb/debian/virtualbox@7.0.16-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.0.16-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.0.16-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2024-21114
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2qtf-4bmt-5uev
32
url VCID-2r65-7mst-7ff7
vulnerability_id VCID-2r65-7mst-7ff7
summary Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.20. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2321
reference_id
reference_type
scores
0
value 0.00158
scoring_system epss
scoring_elements 0.36568
published_at 2026-04-21T12:55:00Z
1
value 0.00158
scoring_system epss
scoring_elements 0.36645
published_at 2026-04-16T12:55:00Z
2
value 0.00158
scoring_system epss
scoring_elements 0.36628
published_at 2026-04-18T12:55:00Z
3
value 0.00158
scoring_system epss
scoring_elements 0.36539
published_at 2026-04-01T12:55:00Z
4
value 0.00158
scoring_system epss
scoring_elements 0.36711
published_at 2026-04-02T12:55:00Z
5
value 0.00158
scoring_system epss
scoring_elements 0.36742
published_at 2026-04-04T12:55:00Z
6
value 0.00158
scoring_system epss
scoring_elements 0.3658
published_at 2026-04-07T12:55:00Z
7
value 0.00158
scoring_system epss
scoring_elements 0.36633
published_at 2026-04-08T12:55:00Z
8
value 0.00158
scoring_system epss
scoring_elements 0.36651
published_at 2026-04-09T12:55:00Z
9
value 0.00158
scoring_system epss
scoring_elements 0.36659
published_at 2026-04-11T12:55:00Z
10
value 0.00158
scoring_system epss
scoring_elements 0.36624
published_at 2026-04-12T12:55:00Z
11
value 0.00158
scoring_system epss
scoring_elements 0.36599
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2321
1
reference_url https://security.archlinux.org/ASA-202104-9
reference_id ASA-202104-9
reference_type
scores
url https://security.archlinux.org/ASA-202104-9
2
reference_url https://security.archlinux.org/AVG-1846
reference_id AVG-1846
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1846
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.20-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.20-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.20-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2021-2321
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2r65-7mst-7ff7
33
url VCID-2rmb-xydd-ckbs
vulnerability_id VCID-2rmb-xydd-ckbs
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are prior to 5.2.26 and prior to 6.0.4. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H).
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:01:54Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:01:54Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2527
reference_id
reference_type
scores
0
value 0.00203
scoring_system epss
scoring_elements 0.42327
published_at 2026-04-21T12:55:00Z
1
value 0.00203
scoring_system epss
scoring_elements 0.42395
published_at 2026-04-02T12:55:00Z
2
value 0.00203
scoring_system epss
scoring_elements 0.42405
published_at 2026-04-12T12:55:00Z
3
value 0.00203
scoring_system epss
scoring_elements 0.42375
published_at 2026-04-13T12:55:00Z
4
value 0.00203
scoring_system epss
scoring_elements 0.42399
published_at 2026-04-18T12:55:00Z
5
value 0.00203
scoring_system epss
scoring_elements 0.42321
published_at 2026-04-01T12:55:00Z
6
value 0.00203
scoring_system epss
scoring_elements 0.42424
published_at 2026-04-16T12:55:00Z
7
value 0.00203
scoring_system epss
scoring_elements 0.42362
published_at 2026-04-07T12:55:00Z
8
value 0.00203
scoring_system epss
scoring_elements 0.42411
published_at 2026-04-08T12:55:00Z
9
value 0.00203
scoring_system epss
scoring_elements 0.42418
published_at 2026-04-09T12:55:00Z
10
value 0.00203
scoring_system epss
scoring_elements 0.42442
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2527
3
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:01:54Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
4
reference_url http://www.securityfocus.com/bid/106568
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:01:54Z/
url http://www.securityfocus.com/bid/106568
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-2527
reference_id CVE-2019-2527
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-2527
fixed_packages
0
url pkg:deb/debian/virtualbox@5.2.24-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.2.24-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.24-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2019-2527
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2rmb-xydd-ckbs
34
url VCID-2srn-84s5-jka6
vulnerability_id VCID-2srn-84s5-jka6
summary Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.34. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. Note: This vulnerability applies to Windows systems only. CVSS 3.1 Base Score 7.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21491
reference_id
reference_type
scores
0
value 0.00131
scoring_system epss
scoring_elements 0.32604
published_at 2026-04-21T12:55:00Z
1
value 0.00131
scoring_system epss
scoring_elements 0.32618
published_at 2026-04-13T12:55:00Z
2
value 0.00131
scoring_system epss
scoring_elements 0.32657
published_at 2026-04-16T12:55:00Z
3
value 0.00131
scoring_system epss
scoring_elements 0.32634
published_at 2026-04-18T12:55:00Z
4
value 0.00131
scoring_system epss
scoring_elements 0.32753
published_at 2026-04-02T12:55:00Z
5
value 0.00131
scoring_system epss
scoring_elements 0.32789
published_at 2026-04-04T12:55:00Z
6
value 0.00131
scoring_system epss
scoring_elements 0.3261
published_at 2026-04-07T12:55:00Z
7
value 0.00131
scoring_system epss
scoring_elements 0.32658
published_at 2026-04-08T12:55:00Z
8
value 0.00131
scoring_system epss
scoring_elements 0.32683
published_at 2026-04-09T12:55:00Z
9
value 0.00131
scoring_system epss
scoring_elements 0.32685
published_at 2026-04-11T12:55:00Z
10
value 0.00131
scoring_system epss
scoring_elements 0.32647
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21491
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.34-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.34-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.34-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2022-21491
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2srn-84s5-jka6
35
url VCID-2uba-3jre-9kaw
vulnerability_id VCID-2uba-3jre-9kaw
summary Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 7.0.16. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21115
reference_id
reference_type
scores
0
value 0.00263
scoring_system epss
scoring_elements 0.49685
published_at 2026-04-21T12:55:00Z
1
value 0.00263
scoring_system epss
scoring_elements 0.49716
published_at 2026-04-16T12:55:00Z
2
value 0.00263
scoring_system epss
scoring_elements 0.49714
published_at 2026-04-18T12:55:00Z
3
value 0.00263
scoring_system epss
scoring_elements 0.49649
published_at 2026-04-02T12:55:00Z
4
value 0.00263
scoring_system epss
scoring_elements 0.49676
published_at 2026-04-04T12:55:00Z
5
value 0.00263
scoring_system epss
scoring_elements 0.49628
published_at 2026-04-07T12:55:00Z
6
value 0.00263
scoring_system epss
scoring_elements 0.49683
published_at 2026-04-08T12:55:00Z
7
value 0.00263
scoring_system epss
scoring_elements 0.49678
published_at 2026-04-09T12:55:00Z
8
value 0.00263
scoring_system epss
scoring_elements 0.49695
published_at 2026-04-11T12:55:00Z
9
value 0.00263
scoring_system epss
scoring_elements 0.49667
published_at 2026-04-12T12:55:00Z
10
value 0.00263
scoring_system epss
scoring_elements 0.49668
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21115
1
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.0.16:*:*:*:*:*:*:*
2
reference_url https://www.oracle.com/security-alerts/cpuapr2024.html
reference_id cpuapr2024.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-19T04:01:13Z/
url https://www.oracle.com/security-alerts/cpuapr2024.html
fixed_packages
0
url pkg:deb/debian/virtualbox@7.0.16-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.0.16-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.0.16-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2024-21115
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2uba-3jre-9kaw
36
url VCID-2vj4-6kgd-kfap
vulnerability_id VCID-2vj4-6kgd-kfap
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which allows local users to escalate privileges.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-6588
reference_id
reference_type
scores
0
value 0.00079
scoring_system epss
scoring_elements 0.23302
published_at 2026-04-01T12:55:00Z
1
value 0.00079
scoring_system epss
scoring_elements 0.23475
published_at 2026-04-02T12:55:00Z
2
value 0.00079
scoring_system epss
scoring_elements 0.23513
published_at 2026-04-04T12:55:00Z
3
value 0.00079
scoring_system epss
scoring_elements 0.23296
published_at 2026-04-07T12:55:00Z
4
value 0.00079
scoring_system epss
scoring_elements 0.23369
published_at 2026-04-08T12:55:00Z
5
value 0.00079
scoring_system epss
scoring_elements 0.2342
published_at 2026-04-09T12:55:00Z
6
value 0.00079
scoring_system epss
scoring_elements 0.23439
published_at 2026-04-11T12:55:00Z
7
value 0.00079
scoring_system epss
scoring_elements 0.23402
published_at 2026-04-12T12:55:00Z
8
value 0.00079
scoring_system epss
scoring_elements 0.23348
published_at 2026-04-13T12:55:00Z
9
value 0.00079
scoring_system epss
scoring_elements 0.23366
published_at 2026-04-16T12:55:00Z
10
value 0.00079
scoring_system epss
scoring_elements 0.2336
published_at 2026-04-18T12:55:00Z
11
value 0.00079
scoring_system epss
scoring_elements 0.2334
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-6588
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775888
reference_id 775888
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775888
2
reference_url https://security.gentoo.org/glsa/201612-27
reference_id GLSA-201612-27
reference_type
scores
url https://security.gentoo.org/glsa/201612-27
fixed_packages
0
url pkg:deb/debian/virtualbox@4.3.18-dfsg-2?distro=sid
purl pkg:deb/debian/virtualbox@4.3.18-dfsg-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@4.3.18-dfsg-2%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2014-6588
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2vj4-6kgd-kfap
37
url VCID-2xmv-8fj4-bke9
vulnerability_id VCID-2xmv-8fj4-bke9
summary
Multiple vulnerabilities have been found in VirtualBox, allowing
    local attackers to escalate their privileges or cause a Denial of Service
    condition.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-3221
reference_id
reference_type
scores
0
value 0.00396
scoring_system epss
scoring_elements 0.60455
published_at 2026-04-21T12:55:00Z
1
value 0.00396
scoring_system epss
scoring_elements 0.60293
published_at 2026-04-01T12:55:00Z
2
value 0.00396
scoring_system epss
scoring_elements 0.60368
published_at 2026-04-02T12:55:00Z
3
value 0.00396
scoring_system epss
scoring_elements 0.60395
published_at 2026-04-04T12:55:00Z
4
value 0.00396
scoring_system epss
scoring_elements 0.60363
published_at 2026-04-07T12:55:00Z
5
value 0.00396
scoring_system epss
scoring_elements 0.60412
published_at 2026-04-08T12:55:00Z
6
value 0.00396
scoring_system epss
scoring_elements 0.60428
published_at 2026-04-09T12:55:00Z
7
value 0.00396
scoring_system epss
scoring_elements 0.60449
published_at 2026-04-11T12:55:00Z
8
value 0.00396
scoring_system epss
scoring_elements 0.60435
published_at 2026-04-12T12:55:00Z
9
value 0.00396
scoring_system epss
scoring_elements 0.60416
published_at 2026-04-13T12:55:00Z
10
value 0.00396
scoring_system epss
scoring_elements 0.60456
published_at 2026-04-16T12:55:00Z
11
value 0.00396
scoring_system epss
scoring_elements 0.60464
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-3221
1
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/79380
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/79380
2
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16681
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16681
3
reference_url http://www.debian.org/security/2012/dsa-2594
reference_id
reference_type
scores
url http://www.debian.org/security/2012/dsa-2594
4
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
5
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html
6
reference_url http://www.securityfocus.com/bid/56045
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/56045
7
reference_url http://www.securitytracker.com/id?1027666
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1027666
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=690777
reference_id 690777
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=690777
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:virtualization:3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:virtualization:3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:virtualization:3.2:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:virtualization:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:virtualization:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:virtualization:4.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:virtualization:4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:virtualization:4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:virtualization:4.1:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-3221
reference_id CVE-2012-3221
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2012-3221
13
reference_url https://security.gentoo.org/glsa/201401-13
reference_id GLSA-201401-13
reference_type
scores
url https://security.gentoo.org/glsa/201401-13
14
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86-64/dos/21224.c
reference_id OSVDB-86384;CVE-2012-3221;OSVDB-85356
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86-64/dos/21224.c
15
reference_url https://www.securityfocus.com/bid/55471/info
reference_id OSVDB-86384;CVE-2012-3221;OSVDB-85356
reference_type exploit
scores
url https://www.securityfocus.com/bid/55471/info
fixed_packages
0
url pkg:deb/debian/virtualbox@4.1.18-dfsg-1.1?distro=sid
purl pkg:deb/debian/virtualbox@4.1.18-dfsg-1.1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@4.1.18-dfsg-1.1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2012-3221
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2xmv-8fj4-bke9
38
url VCID-3acw-eupj-2fad
vulnerability_id VCID-3acw-eupj-2fad
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14649
reference_id
reference_type
scores
0
value 0.0016
scoring_system epss
scoring_elements 0.36832
published_at 2026-04-01T12:55:00Z
1
value 0.0016
scoring_system epss
scoring_elements 0.36989
published_at 2026-04-02T12:55:00Z
2
value 0.0016
scoring_system epss
scoring_elements 0.36926
published_at 2026-04-11T12:55:00Z
3
value 0.0016
scoring_system epss
scoring_elements 0.36891
published_at 2026-04-12T12:55:00Z
4
value 0.0016
scoring_system epss
scoring_elements 0.36866
published_at 2026-04-13T12:55:00Z
5
value 0.0016
scoring_system epss
scoring_elements 0.36911
published_at 2026-04-16T12:55:00Z
6
value 0.0016
scoring_system epss
scoring_elements 0.36895
published_at 2026-04-18T12:55:00Z
7
value 0.0016
scoring_system epss
scoring_elements 0.36837
published_at 2026-04-21T12:55:00Z
8
value 0.0016
scoring_system epss
scoring_elements 0.37024
published_at 2026-04-04T12:55:00Z
9
value 0.0016
scoring_system epss
scoring_elements 0.36852
published_at 2026-04-07T12:55:00Z
10
value 0.0016
scoring_system epss
scoring_elements 0.36902
published_at 2026-04-08T12:55:00Z
11
value 0.0016
scoring_system epss
scoring_elements 0.36918
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14649
1
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:53Z/
url https://security.gentoo.org/glsa/202101-09
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html
reference_id msg00068.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:53Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html
reference_id msg00079.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:53Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html
4
reference_url https://www.zerodayinitiative.com/advisories/ZDI-20-891/
reference_id ZDI-20-891
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:53Z/
url https://www.zerodayinitiative.com/advisories/ZDI-20-891/
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.12-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.12-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.12-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2020-14649
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3acw-eupj-2fad
39
url VCID-3cvd-fd19-vfdn
vulnerability_id VCID-3cvd-fd19-vfdn
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:38Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2902
reference_id
reference_type
scores
0
value 0.00151
scoring_system epss
scoring_elements 0.35683
published_at 2026-04-01T12:55:00Z
1
value 0.00151
scoring_system epss
scoring_elements 0.35741
published_at 2026-04-07T12:55:00Z
2
value 0.00151
scoring_system epss
scoring_elements 0.35792
published_at 2026-04-08T12:55:00Z
3
value 0.00151
scoring_system epss
scoring_elements 0.35814
published_at 2026-04-09T12:55:00Z
4
value 0.00151
scoring_system epss
scoring_elements 0.35822
published_at 2026-04-11T12:55:00Z
5
value 0.00151
scoring_system epss
scoring_elements 0.35782
published_at 2026-04-12T12:55:00Z
6
value 0.00151
scoring_system epss
scoring_elements 0.35759
published_at 2026-04-13T12:55:00Z
7
value 0.00151
scoring_system epss
scoring_elements 0.358
published_at 2026-04-16T12:55:00Z
8
value 0.00151
scoring_system epss
scoring_elements 0.35788
published_at 2026-04-18T12:55:00Z
9
value 0.00151
scoring_system epss
scoring_elements 0.35739
published_at 2026-04-21T12:55:00Z
10
value 0.00151
scoring_system epss
scoring_elements 0.35881
published_at 2026-04-02T12:55:00Z
11
value 0.00151
scoring_system epss
scoring_elements 0.35911
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2902
2
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:38Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
3
reference_url https://www.zerodayinitiative.com/advisories/ZDI-20-497/
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:38Z/
url https://www.zerodayinitiative.com/advisories/ZDI-20-497/
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2902
reference_id CVE-2020-2902
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
2
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-2902
7
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:38Z/
url https://security.gentoo.org/glsa/202101-09
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.6-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.6-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.6-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2020-2902
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3cvd-fd19-vfdn
40
url VCID-3fme-q3w9-j7hc
vulnerability_id VCID-3fme-q3w9-j7hc
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could result in privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14885
reference_id
reference_type
scores
0
value 0.0014
scoring_system epss
scoring_elements 0.3419
published_at 2026-04-21T12:55:00Z
1
value 0.0014
scoring_system epss
scoring_elements 0.343
published_at 2026-04-02T12:55:00Z
2
value 0.0014
scoring_system epss
scoring_elements 0.34265
published_at 2026-04-09T12:55:00Z
3
value 0.0014
scoring_system epss
scoring_elements 0.34266
published_at 2026-04-11T12:55:00Z
4
value 0.0014
scoring_system epss
scoring_elements 0.34225
published_at 2026-04-12T12:55:00Z
5
value 0.0014
scoring_system epss
scoring_elements 0.34201
published_at 2026-04-13T12:55:00Z
6
value 0.0014
scoring_system epss
scoring_elements 0.34224
published_at 2026-04-18T12:55:00Z
7
value 0.0014
scoring_system epss
scoring_elements 0.33961
published_at 2026-04-01T12:55:00Z
8
value 0.0014
scoring_system epss
scoring_elements 0.34329
published_at 2026-04-04T12:55:00Z
9
value 0.0014
scoring_system epss
scoring_elements 0.34193
published_at 2026-04-07T12:55:00Z
10
value 0.0014
scoring_system epss
scoring_elements 0.34236
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14885
1
reference_url https://security.gentoo.org/glsa/202101-15
reference_id GLSA-202101-15
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:00Z/
url https://security.gentoo.org/glsa/202101-15
2
reference_url https://www.zerodayinitiative.com/advisories/ZDI-20-1281/
reference_id ZDI-20-1281
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:00Z/
url https://www.zerodayinitiative.com/advisories/ZDI-20-1281/
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.16-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.16-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.16-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2020-14885
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3fme-q3w9-j7hc
41
url VCID-3gaa-z5jw-g3e2
vulnerability_id VCID-3gaa-z5jw-g3e2
summary Unspecified vulnerability in the Oracle VM VirtualBox component before 5.0.28 and 5.1.x before 5.1.8 in Oracle Virtualization allows local users to affect confidentiality, integrity, and availability via vectors related to Core, a different vulnerability than CVE-2016-5501.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5538
reference_id
reference_type
scores
0
value 0.00138
scoring_system epss
scoring_elements 0.33768
published_at 2026-04-21T12:55:00Z
1
value 0.00138
scoring_system epss
scoring_elements 0.33777
published_at 2026-04-13T12:55:00Z
2
value 0.00138
scoring_system epss
scoring_elements 0.33814
published_at 2026-04-16T12:55:00Z
3
value 0.00138
scoring_system epss
scoring_elements 0.33549
published_at 2026-04-01T12:55:00Z
4
value 0.00138
scoring_system epss
scoring_elements 0.33884
published_at 2026-04-02T12:55:00Z
5
value 0.00138
scoring_system epss
scoring_elements 0.33915
published_at 2026-04-04T12:55:00Z
6
value 0.00138
scoring_system epss
scoring_elements 0.33769
published_at 2026-04-07T12:55:00Z
7
value 0.00138
scoring_system epss
scoring_elements 0.33812
published_at 2026-04-08T12:55:00Z
8
value 0.00138
scoring_system epss
scoring_elements 0.33845
published_at 2026-04-09T12:55:00Z
9
value 0.00138
scoring_system epss
scoring_elements 0.33843
published_at 2026-04-11T12:55:00Z
10
value 0.00138
scoring_system epss
scoring_elements 0.33801
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5538
1
reference_url http://www.securityfocus.com/bid/93697
reference_id 93697
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:47:00Z/
url http://www.securityfocus.com/bid/93697
fixed_packages
0
url pkg:deb/debian/virtualbox@5.1.8-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.1.8-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.1.8-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2016-5538
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3gaa-z5jw-g3e2
42
url VCID-3mbm-tn7y-abg5
vulnerability_id VCID-3mbm-tn7y-abg5
summary Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.12 and 7.2.2. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-61759
reference_id
reference_type
scores
0
value 0.0002
scoring_system epss
scoring_elements 0.0544
published_at 2026-04-21T12:55:00Z
1
value 0.0002
scoring_system epss
scoring_elements 0.05287
published_at 2026-04-18T12:55:00Z
2
value 0.0002
scoring_system epss
scoring_elements 0.05276
published_at 2026-04-02T12:55:00Z
3
value 0.0002
scoring_system epss
scoring_elements 0.05308
published_at 2026-04-04T12:55:00Z
4
value 0.0002
scoring_system epss
scoring_elements 0.05334
published_at 2026-04-07T12:55:00Z
5
value 0.0002
scoring_system epss
scoring_elements 0.05367
published_at 2026-04-08T12:55:00Z
6
value 0.0002
scoring_system epss
scoring_elements 0.05391
published_at 2026-04-09T12:55:00Z
7
value 0.0002
scoring_system epss
scoring_elements 0.0536
published_at 2026-04-11T12:55:00Z
8
value 0.0002
scoring_system epss
scoring_elements 0.05348
published_at 2026-04-12T12:55:00Z
9
value 0.0002
scoring_system epss
scoring_elements 0.05338
published_at 2026-04-13T12:55:00Z
10
value 0.0002
scoring_system epss
scoring_elements 0.05285
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-61759
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118542
reference_id 1118542
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118542
2
reference_url https://www.oracle.com/security-alerts/cpuoct2025.html
reference_id cpuoct2025.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-22T17:29:54Z/
url https://www.oracle.com/security-alerts/cpuoct2025.html
fixed_packages
0
url pkg:deb/debian/virtualbox@7.2.4-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.2.4-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.4-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2025-61759
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3mbm-tn7y-abg5
43
url VCID-3mx7-d15v-rkfw
vulnerability_id VCID-3mx7-d15v-rkfw
summary
Multiple vulnerabilities were found in VirtualBox, allowing local
    attackers to gain escalated privileges.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-2305
reference_id
reference_type
scores
0
value 0.00189
scoring_system epss
scoring_elements 0.40724
published_at 2026-04-01T12:55:00Z
1
value 0.00189
scoring_system epss
scoring_elements 0.40809
published_at 2026-04-02T12:55:00Z
2
value 0.00189
scoring_system epss
scoring_elements 0.40836
published_at 2026-04-11T12:55:00Z
3
value 0.00189
scoring_system epss
scoring_elements 0.40761
published_at 2026-04-07T12:55:00Z
4
value 0.00189
scoring_system epss
scoring_elements 0.40811
published_at 2026-04-08T12:55:00Z
5
value 0.00189
scoring_system epss
scoring_elements 0.40818
published_at 2026-04-09T12:55:00Z
6
value 0.00189
scoring_system epss
scoring_elements 0.40802
published_at 2026-04-12T12:55:00Z
7
value 0.00189
scoring_system epss
scoring_elements 0.40783
published_at 2026-04-13T12:55:00Z
8
value 0.00189
scoring_system epss
scoring_elements 0.40827
published_at 2026-04-16T12:55:00Z
9
value 0.00189
scoring_system epss
scoring_elements 0.40797
published_at 2026-04-18T12:55:00Z
10
value 0.00189
scoring_system epss
scoring_elements 0.40719
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-2305
1
reference_url https://security.gentoo.org/glsa/201204-01
reference_id GLSA-201204-01
reference_type
scores
url https://security.gentoo.org/glsa/201204-01
fixed_packages
0
url pkg:deb/debian/virtualbox@4.0.10-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@4.0.10-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@4.0.10-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2011-2305
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3mx7-d15v-rkfw
44
url VCID-3nw6-9452-6bgk
vulnerability_id VCID-3nw6-9452-6bgk
summary Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-21984
reference_id
reference_type
scores
0
value 0.00029
scoring_system epss
scoring_elements 0.0819
published_at 2026-04-21T12:55:00Z
1
value 0.00029
scoring_system epss
scoring_elements 0.08031
published_at 2026-04-18T12:55:00Z
2
value 0.00029
scoring_system epss
scoring_elements 0.08113
published_at 2026-04-02T12:55:00Z
3
value 0.00029
scoring_system epss
scoring_elements 0.08155
published_at 2026-04-04T12:55:00Z
4
value 0.00029
scoring_system epss
scoring_elements 0.08102
published_at 2026-04-07T12:55:00Z
5
value 0.00029
scoring_system epss
scoring_elements 0.08161
published_at 2026-04-08T12:55:00Z
6
value 0.00029
scoring_system epss
scoring_elements 0.08183
published_at 2026-04-09T12:55:00Z
7
value 0.00029
scoring_system epss
scoring_elements 0.08177
published_at 2026-04-11T12:55:00Z
8
value 0.00029
scoring_system epss
scoring_elements 0.08157
published_at 2026-04-12T12:55:00Z
9
value 0.00029
scoring_system epss
scoring_elements 0.0814
published_at 2026-04-13T12:55:00Z
10
value 0.00029
scoring_system epss
scoring_elements 0.08046
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-21984
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126117
reference_id 1126117
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126117
2
reference_url https://www.oracle.com/security-alerts/cpujan2026.html
reference_id cpujan2026.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-22T04:55:22Z/
url https://www.oracle.com/security-alerts/cpujan2026.html
fixed_packages
0
url pkg:deb/debian/virtualbox@7.2.6-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2026-21984
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3nw6-9452-6bgk
45
url VCID-3nyp-v4dh-k7ft
vulnerability_id VCID-3nyp-v4dh-k7ft
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14647
reference_id
reference_type
scores
0
value 0.0016
scoring_system epss
scoring_elements 0.36832
published_at 2026-04-01T12:55:00Z
1
value 0.0016
scoring_system epss
scoring_elements 0.36989
published_at 2026-04-02T12:55:00Z
2
value 0.0016
scoring_system epss
scoring_elements 0.36926
published_at 2026-04-11T12:55:00Z
3
value 0.0016
scoring_system epss
scoring_elements 0.36891
published_at 2026-04-12T12:55:00Z
4
value 0.0016
scoring_system epss
scoring_elements 0.36866
published_at 2026-04-13T12:55:00Z
5
value 0.0016
scoring_system epss
scoring_elements 0.36911
published_at 2026-04-16T12:55:00Z
6
value 0.0016
scoring_system epss
scoring_elements 0.36895
published_at 2026-04-18T12:55:00Z
7
value 0.0016
scoring_system epss
scoring_elements 0.36837
published_at 2026-04-21T12:55:00Z
8
value 0.0016
scoring_system epss
scoring_elements 0.37024
published_at 2026-04-04T12:55:00Z
9
value 0.0016
scoring_system epss
scoring_elements 0.36852
published_at 2026-04-07T12:55:00Z
10
value 0.0016
scoring_system epss
scoring_elements 0.36902
published_at 2026-04-08T12:55:00Z
11
value 0.0016
scoring_system epss
scoring_elements 0.36918
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14647
1
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:54Z/
url https://security.gentoo.org/glsa/202101-09
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html
reference_id msg00068.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:54Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html
reference_id msg00079.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:54Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html
4
reference_url https://www.zerodayinitiative.com/advisories/ZDI-20-890/
reference_id ZDI-20-890
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:54Z/
url https://www.zerodayinitiative.com/advisories/ZDI-20-890/
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.12-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.12-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.12-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2020-14647
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3nyp-v4dh-k7ft
46
url VCID-3pt6-aef6-g3bg
vulnerability_id VCID-3pt6-aef6-g3bg
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.16. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data as well as unauthorized read access to a subset of Oracle VM VirtualBox accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-3085
reference_id
reference_type
scores
0
value 0.00568
scoring_system epss
scoring_elements 0.6857
published_at 2026-04-18T12:55:00Z
1
value 0.00568
scoring_system epss
scoring_elements 0.68535
published_at 2026-04-09T12:55:00Z
2
value 0.00568
scoring_system epss
scoring_elements 0.68561
published_at 2026-04-11T12:55:00Z
3
value 0.00568
scoring_system epss
scoring_elements 0.68548
published_at 2026-04-21T12:55:00Z
4
value 0.00568
scoring_system epss
scoring_elements 0.68557
published_at 2026-04-16T12:55:00Z
5
value 0.00568
scoring_system epss
scoring_elements 0.68454
published_at 2026-04-01T12:55:00Z
6
value 0.00568
scoring_system epss
scoring_elements 0.68472
published_at 2026-04-02T12:55:00Z
7
value 0.00568
scoring_system epss
scoring_elements 0.68492
published_at 2026-04-04T12:55:00Z
8
value 0.00568
scoring_system epss
scoring_elements 0.68467
published_at 2026-04-07T12:55:00Z
9
value 0.00568
scoring_system epss
scoring_elements 0.68517
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-3085
1
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:08:58Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
2
reference_url http://www.securityfocus.com/bid/104764
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:08:58Z/
url http://www.securityfocus.com/bid/104764
3
reference_url http://www.securitytracker.com/id/1041296
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:08:58Z/
url http://www.securitytracker.com/id/1041296
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-3085
reference_id CVE-2018-3085
reference_type
scores
0
value 4.4
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:P/A:P
1
value 8.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-3085
fixed_packages
0
url pkg:deb/debian/virtualbox@5.2.16-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.2.16-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.16-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2018-3085
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3pt6-aef6-g3bg
47
url VCID-3q4q-e9xc-pqgp
vulnerability_id VCID-3q4q-e9xc-pqgp
summary Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 7.0.16. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21113
reference_id
reference_type
scores
0
value 0.00128
scoring_system epss
scoring_elements 0.32157
published_at 2026-04-21T12:55:00Z
1
value 0.00128
scoring_system epss
scoring_elements 0.32207
published_at 2026-04-16T12:55:00Z
2
value 0.00128
scoring_system epss
scoring_elements 0.32186
published_at 2026-04-18T12:55:00Z
3
value 0.00128
scoring_system epss
scoring_elements 0.32302
published_at 2026-04-02T12:55:00Z
4
value 0.00128
scoring_system epss
scoring_elements 0.3234
published_at 2026-04-04T12:55:00Z
5
value 0.00128
scoring_system epss
scoring_elements 0.32165
published_at 2026-04-07T12:55:00Z
6
value 0.00128
scoring_system epss
scoring_elements 0.32214
published_at 2026-04-08T12:55:00Z
7
value 0.00128
scoring_system epss
scoring_elements 0.32241
published_at 2026-04-09T12:55:00Z
8
value 0.00128
scoring_system epss
scoring_elements 0.32242
published_at 2026-04-11T12:55:00Z
9
value 0.00128
scoring_system epss
scoring_elements 0.32204
published_at 2026-04-12T12:55:00Z
10
value 0.00128
scoring_system epss
scoring_elements 0.32172
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21113
1
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.0.16:*:*:*:*:*:*:*
2
reference_url https://www.oracle.com/security-alerts/cpuapr2024.html
reference_id cpuapr2024.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-19T04:01:12Z/
url https://www.oracle.com/security-alerts/cpuapr2024.html
fixed_packages
0
url pkg:deb/debian/virtualbox@7.0.16-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.0.16-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.0.16-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2024-21113
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3q4q-e9xc-pqgp
48
url VCID-3rtp-jbxr-1qey
vulnerability_id VCID-3rtp-jbxr-1qey
summary Multiple vulnerabilities have been discovered in Oracle Virtualbox, the worst of which could result in root privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2286
reference_id
reference_type
scores
0
value 0.00169
scoring_system epss
scoring_elements 0.38081
published_at 2026-04-21T12:55:00Z
1
value 0.00169
scoring_system epss
scoring_elements 0.38143
published_at 2026-04-12T12:55:00Z
2
value 0.00169
scoring_system epss
scoring_elements 0.38119
published_at 2026-04-13T12:55:00Z
3
value 0.00169
scoring_system epss
scoring_elements 0.38165
published_at 2026-04-16T12:55:00Z
4
value 0.00169
scoring_system epss
scoring_elements 0.38146
published_at 2026-04-18T12:55:00Z
5
value 0.00169
scoring_system epss
scoring_elements 0.3803
published_at 2026-04-01T12:55:00Z
6
value 0.00169
scoring_system epss
scoring_elements 0.3821
published_at 2026-04-02T12:55:00Z
7
value 0.00169
scoring_system epss
scoring_elements 0.38233
published_at 2026-04-04T12:55:00Z
8
value 0.00169
scoring_system epss
scoring_elements 0.38103
published_at 2026-04-07T12:55:00Z
9
value 0.00169
scoring_system epss
scoring_elements 0.38153
published_at 2026-04-08T12:55:00Z
10
value 0.00169
scoring_system epss
scoring_elements 0.38161
published_at 2026-04-09T12:55:00Z
11
value 0.00169
scoring_system epss
scoring_elements 0.38179
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2286
1
reference_url https://security.archlinux.org/ASA-202104-9
reference_id ASA-202104-9
reference_type
scores
url https://security.archlinux.org/ASA-202104-9
2
reference_url https://security.archlinux.org/AVG-1846
reference_id AVG-1846
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1846
3
reference_url https://security.gentoo.org/glsa/202208-36
reference_id GLSA-202208-36
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:53Z/
url https://security.gentoo.org/glsa/202208-36
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.20-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.20-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.20-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2021-2286
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3rtp-jbxr-1qey
49
url VCID-3vrc-m3ra-wker
vulnerability_id VCID-3vrc-m3ra-wker
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.16. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 6.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-3091
reference_id
reference_type
scores
0
value 0.00246
scoring_system epss
scoring_elements 0.47908
published_at 2026-04-18T12:55:00Z
1
value 0.00246
scoring_system epss
scoring_elements 0.4785
published_at 2026-04-12T12:55:00Z
2
value 0.00246
scoring_system epss
scoring_elements 0.47874
published_at 2026-04-11T12:55:00Z
3
value 0.00246
scoring_system epss
scoring_elements 0.4786
published_at 2026-04-21T12:55:00Z
4
value 0.00246
scoring_system epss
scoring_elements 0.47914
published_at 2026-04-16T12:55:00Z
5
value 0.00246
scoring_system epss
scoring_elements 0.47793
published_at 2026-04-01T12:55:00Z
6
value 0.00246
scoring_system epss
scoring_elements 0.47831
published_at 2026-04-02T12:55:00Z
7
value 0.00246
scoring_system epss
scoring_elements 0.47853
published_at 2026-04-04T12:55:00Z
8
value 0.00246
scoring_system epss
scoring_elements 0.47801
published_at 2026-04-07T12:55:00Z
9
value 0.00246
scoring_system epss
scoring_elements 0.47854
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-3091
1
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:08:57Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
2
reference_url http://www.securityfocus.com/bid/104764
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:08:57Z/
url http://www.securityfocus.com/bid/104764
3
reference_url http://www.securitytracker.com/id/1041296
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:08:57Z/
url http://www.securitytracker.com/id/1041296
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-3091
reference_id CVE-2018-3091
reference_type
scores
0
value 1.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:N/A:N
1
value 6.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2018-3091
fixed_packages
0
url pkg:deb/debian/virtualbox@5.2.16-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.2.16-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.16-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2018-3091
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3vrc-m3ra-wker
50
url VCID-3wdm-kske-ufg6
vulnerability_id VCID-3wdm-kske-ufg6
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are prior to 5.2.24 and prior to 6.0.2. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 3.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N).
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:10Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2504
reference_id
reference_type
scores
0
value 0.00096
scoring_system epss
scoring_elements 0.26431
published_at 2026-04-21T12:55:00Z
1
value 0.00096
scoring_system epss
scoring_elements 0.26491
published_at 2026-04-13T12:55:00Z
2
value 0.00096
scoring_system epss
scoring_elements 0.26497
published_at 2026-04-16T12:55:00Z
3
value 0.00096
scoring_system epss
scoring_elements 0.26469
published_at 2026-04-18T12:55:00Z
4
value 0.00096
scoring_system epss
scoring_elements 0.26595
published_at 2026-04-01T12:55:00Z
5
value 0.00096
scoring_system epss
scoring_elements 0.26641
published_at 2026-04-02T12:55:00Z
6
value 0.00096
scoring_system epss
scoring_elements 0.26685
published_at 2026-04-04T12:55:00Z
7
value 0.00096
scoring_system epss
scoring_elements 0.2647
published_at 2026-04-07T12:55:00Z
8
value 0.00096
scoring_system epss
scoring_elements 0.26538
published_at 2026-04-08T12:55:00Z
9
value 0.00096
scoring_system epss
scoring_elements 0.26587
published_at 2026-04-09T12:55:00Z
10
value 0.00096
scoring_system epss
scoring_elements 0.26593
published_at 2026-04-11T12:55:00Z
11
value 0.00096
scoring_system epss
scoring_elements 0.26548
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2504
2
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:10Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
3
reference_url http://www.securityfocus.com/bid/106568
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:10Z/
url http://www.securityfocus.com/bid/106568
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-2504
reference_id CVE-2019-2504
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:N
1
value 3.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2019-2504
fixed_packages
0
url pkg:deb/debian/virtualbox@5.2.24-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.2.24-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.24-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2019-2504
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3wdm-kske-ufg6
51
url VCID-3y4z-5rfm-83g8
vulnerability_id VCID-3y4z-5rfm-83g8
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14628
reference_id
reference_type
scores
0
value 0.00179
scoring_system epss
scoring_elements 0.39406
published_at 2026-04-01T12:55:00Z
1
value 0.00179
scoring_system epss
scoring_elements 0.39569
published_at 2026-04-02T12:55:00Z
2
value 0.00179
scoring_system epss
scoring_elements 0.39589
published_at 2026-04-11T12:55:00Z
3
value 0.00179
scoring_system epss
scoring_elements 0.39551
published_at 2026-04-12T12:55:00Z
4
value 0.00179
scoring_system epss
scoring_elements 0.39535
published_at 2026-04-13T12:55:00Z
5
value 0.00179
scoring_system epss
scoring_elements 0.39585
published_at 2026-04-16T12:55:00Z
6
value 0.00179
scoring_system epss
scoring_elements 0.39555
published_at 2026-04-18T12:55:00Z
7
value 0.00179
scoring_system epss
scoring_elements 0.39471
published_at 2026-04-21T12:55:00Z
8
value 0.00179
scoring_system epss
scoring_elements 0.39592
published_at 2026-04-04T12:55:00Z
9
value 0.00179
scoring_system epss
scoring_elements 0.39508
published_at 2026-04-07T12:55:00Z
10
value 0.00179
scoring_system epss
scoring_elements 0.39563
published_at 2026-04-08T12:55:00Z
11
value 0.00179
scoring_system epss
scoring_elements 0.39578
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14628
1
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:57Z/
url https://security.gentoo.org/glsa/202101-09
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html
reference_id msg00068.html
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:57Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html
reference_id msg00079.html
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:57Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html
4
reference_url https://www.zerodayinitiative.com/advisories/ZDI-20-886/
reference_id ZDI-20-886
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:57Z/
url https://www.zerodayinitiative.com/advisories/ZDI-20-886/
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.12-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.12-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.12-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2020-14628
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3y4z-5rfm-83g8
52
url VCID-3y8r-53vp-cbbx
vulnerability_id VCID-3y8r-53vp-cbbx
summary Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Difficult to exploit vulnerability allows unauthenticated attacker with access to the physical communication segment attached to the hardware where the Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-21982
reference_id
reference_type
scores
0
value 0.00068
scoring_system epss
scoring_elements 0.20879
published_at 2026-04-21T12:55:00Z
1
value 0.00068
scoring_system epss
scoring_elements 0.20898
published_at 2026-04-18T12:55:00Z
2
value 0.00068
scoring_system epss
scoring_elements 0.21079
published_at 2026-04-02T12:55:00Z
3
value 0.00068
scoring_system epss
scoring_elements 0.21132
published_at 2026-04-04T12:55:00Z
4
value 0.00068
scoring_system epss
scoring_elements 0.20846
published_at 2026-04-07T12:55:00Z
5
value 0.00068
scoring_system epss
scoring_elements 0.20926
published_at 2026-04-08T12:55:00Z
6
value 0.00068
scoring_system epss
scoring_elements 0.20988
published_at 2026-04-09T12:55:00Z
7
value 0.00068
scoring_system epss
scoring_elements 0.21004
published_at 2026-04-11T12:55:00Z
8
value 0.00068
scoring_system epss
scoring_elements 0.2096
published_at 2026-04-12T12:55:00Z
9
value 0.00068
scoring_system epss
scoring_elements 0.20906
published_at 2026-04-13T12:55:00Z
10
value 0.00068
scoring_system epss
scoring_elements 0.20897
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-21982
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126117
reference_id 1126117
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126117
2
reference_url https://www.oracle.com/security-alerts/cpujan2026.html
reference_id cpujan2026.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-22T04:55:25Z/
url https://www.oracle.com/security-alerts/cpujan2026.html
fixed_packages
0
url pkg:deb/debian/virtualbox@7.2.6-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2026-21982
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3y8r-53vp-cbbx
53
url VCID-42aj-vkah-muff
vulnerability_id VCID-42aj-vkah-muff
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.2.28 and prior to 6.0.6. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2703
reference_id
reference_type
scores
0
value 0.00323
scoring_system epss
scoring_elements 0.55332
published_at 2026-04-02T12:55:00Z
1
value 0.00323
scoring_system epss
scoring_elements 0.55377
published_at 2026-04-21T12:55:00Z
2
value 0.00323
scoring_system epss
scoring_elements 0.55233
published_at 2026-04-01T12:55:00Z
3
value 0.00323
scoring_system epss
scoring_elements 0.55356
published_at 2026-04-04T12:55:00Z
4
value 0.00323
scoring_system epss
scoring_elements 0.55338
published_at 2026-04-07T12:55:00Z
5
value 0.00323
scoring_system epss
scoring_elements 0.55388
published_at 2026-04-09T12:55:00Z
6
value 0.00323
scoring_system epss
scoring_elements 0.55398
published_at 2026-04-18T12:55:00Z
7
value 0.00323
scoring_system epss
scoring_elements 0.55376
published_at 2026-04-12T12:55:00Z
8
value 0.00323
scoring_system epss
scoring_elements 0.55358
published_at 2026-04-13T12:55:00Z
9
value 0.00323
scoring_system epss
scoring_elements 0.55394
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2703
fixed_packages
0
url pkg:deb/debian/virtualbox@6.0.6-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.0.6-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.0.6-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2019-2703
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-42aj-vkah-muff
54
url VCID-45uz-b4kt-ykdg
vulnerability_id VCID-45uz-b4kt-ykdg
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0418
reference_id
reference_type
scores
0
value 0.00074
scoring_system epss
scoring_elements 0.22319
published_at 2026-04-01T12:55:00Z
1
value 0.00074
scoring_system epss
scoring_elements 0.22484
published_at 2026-04-02T12:55:00Z
2
value 0.00074
scoring_system epss
scoring_elements 0.22529
published_at 2026-04-04T12:55:00Z
3
value 0.00074
scoring_system epss
scoring_elements 0.22317
published_at 2026-04-07T12:55:00Z
4
value 0.00074
scoring_system epss
scoring_elements 0.22399
published_at 2026-04-08T12:55:00Z
5
value 0.00074
scoring_system epss
scoring_elements 0.22454
published_at 2026-04-09T12:55:00Z
6
value 0.00074
scoring_system epss
scoring_elements 0.22474
published_at 2026-04-11T12:55:00Z
7
value 0.00074
scoring_system epss
scoring_elements 0.22433
published_at 2026-04-12T12:55:00Z
8
value 0.00074
scoring_system epss
scoring_elements 0.22378
published_at 2026-04-13T12:55:00Z
9
value 0.00074
scoring_system epss
scoring_elements 0.22395
published_at 2026-04-16T12:55:00Z
10
value 0.00074
scoring_system epss
scoring_elements 0.22392
published_at 2026-04-18T12:55:00Z
11
value 0.00074
scoring_system epss
scoring_elements 0.22342
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0418
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0377
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0377
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0418
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0418
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775888
reference_id 775888
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775888
4
reference_url https://security.gentoo.org/glsa/201612-27
reference_id GLSA-201612-27
reference_type
scores
url https://security.gentoo.org/glsa/201612-27
fixed_packages
0
url pkg:deb/debian/virtualbox@4.3.2-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@4.3.2-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@4.3.2-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2015-0418
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-45uz-b4kt-ykdg
55
url VCID-47ac-172h-puf9
vulnerability_id VCID-47ac-172h-puf9
summary Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization VirtualBox before 3.2.24, 4.0.26, 4.1.34, 4.2.26, and 4.3.12 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Core.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-2489
reference_id
reference_type
scores
0
value 0.00094
scoring_system epss
scoring_elements 0.26133
published_at 2026-04-21T12:55:00Z
1
value 0.00094
scoring_system epss
scoring_elements 0.2632
published_at 2026-04-01T12:55:00Z
2
value 0.00094
scoring_system epss
scoring_elements 0.2636
published_at 2026-04-02T12:55:00Z
3
value 0.00094
scoring_system epss
scoring_elements 0.26401
published_at 2026-04-04T12:55:00Z
4
value 0.00094
scoring_system epss
scoring_elements 0.26173
published_at 2026-04-07T12:55:00Z
5
value 0.00094
scoring_system epss
scoring_elements 0.26241
published_at 2026-04-08T12:55:00Z
6
value 0.00094
scoring_system epss
scoring_elements 0.26289
published_at 2026-04-09T12:55:00Z
7
value 0.00094
scoring_system epss
scoring_elements 0.26296
published_at 2026-04-11T12:55:00Z
8
value 0.00094
scoring_system epss
scoring_elements 0.2625
published_at 2026-04-12T12:55:00Z
9
value 0.00094
scoring_system epss
scoring_elements 0.26191
published_at 2026-04-13T12:55:00Z
10
value 0.00094
scoring_system epss
scoring_elements 0.26195
published_at 2026-04-16T12:55:00Z
11
value 0.00094
scoring_system epss
scoring_elements 0.2617
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-2489
1
reference_url http://seclists.org/fulldisclosure/2014/Dec/23
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2014/Dec/23
2
reference_url http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
3
reference_url http://www.securityfocus.com/archive/1/534161/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/534161/100/0/threaded
4
reference_url http://www.vmware.com/security/advisories/VMSA-2014-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2014-0012.html
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=754939
reference_id 754939
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=754939
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:3.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.0:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:3.2.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.10:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:3.2.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.12:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:3.2.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.14:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:3.2.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.16:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:3.2.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.18:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:3.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.2:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:3.2.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.20:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:3.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.4:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:3.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.6:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:3.2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.8:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.10:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.12:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.0.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.14:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.16:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.0.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.18:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.2:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.0.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.20:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.22:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.4:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.6:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.8:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.10:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.12:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.14:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.16:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.18:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.2:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.20:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.22:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.24:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.26:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.26:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.28:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.28:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.28:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.30:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.30:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.4:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.6:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.8:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.2.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.10:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.2.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.12:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.2.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.14:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.2.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.16:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.2.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.18:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.2:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.2.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.20:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.2.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.22:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.4:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.6:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.8:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.3.0:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.3.2:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.3.4:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.3.6:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.3.8:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-2489
reference_id CVE-2014-2489
reference_type
scores
0
value 4.1
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:S/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-2489
fixed_packages
0
url pkg:deb/debian/virtualbox@4.3.12-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@4.3.12-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@4.3.12-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2014-2489
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-47ac-172h-puf9
56
url VCID-4nyc-f22h-4fbh
vulnerability_id VCID-4nyc-f22h-4fbh
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.2.28 and prior to 6.0.6. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2680
reference_id
reference_type
scores
0
value 0.00139
scoring_system epss
scoring_elements 0.34061
published_at 2026-04-02T12:55:00Z
1
value 0.00139
scoring_system epss
scoring_elements 0.33944
published_at 2026-04-21T12:55:00Z
2
value 0.00139
scoring_system epss
scoring_elements 0.33718
published_at 2026-04-01T12:55:00Z
3
value 0.00139
scoring_system epss
scoring_elements 0.34092
published_at 2026-04-04T12:55:00Z
4
value 0.00139
scoring_system epss
scoring_elements 0.3395
published_at 2026-04-07T12:55:00Z
5
value 0.00139
scoring_system epss
scoring_elements 0.33991
published_at 2026-04-16T12:55:00Z
6
value 0.00139
scoring_system epss
scoring_elements 0.34023
published_at 2026-04-11T12:55:00Z
7
value 0.00139
scoring_system epss
scoring_elements 0.3398
published_at 2026-04-12T12:55:00Z
8
value 0.00139
scoring_system epss
scoring_elements 0.33956
published_at 2026-04-13T12:55:00Z
9
value 0.00139
scoring_system epss
scoring_elements 0.33977
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2680
fixed_packages
0
url pkg:deb/debian/virtualbox@6.0.6-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.0.6-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.0.6-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2019-2680
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4nyc-f22h-4fbh
57
url VCID-4nyx-grab-93ha
vulnerability_id VCID-4nyx-grab-93ha
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14648
reference_id
reference_type
scores
0
value 0.00146
scoring_system epss
scoring_elements 0.3487
published_at 2026-04-01T12:55:00Z
1
value 0.00146
scoring_system epss
scoring_elements 0.35068
published_at 2026-04-02T12:55:00Z
2
value 0.00146
scoring_system epss
scoring_elements 0.35052
published_at 2026-04-11T12:55:00Z
3
value 0.00146
scoring_system epss
scoring_elements 0.35016
published_at 2026-04-12T12:55:00Z
4
value 0.00146
scoring_system epss
scoring_elements 0.34993
published_at 2026-04-13T12:55:00Z
5
value 0.00146
scoring_system epss
scoring_elements 0.35034
published_at 2026-04-16T12:55:00Z
6
value 0.00146
scoring_system epss
scoring_elements 0.35019
published_at 2026-04-18T12:55:00Z
7
value 0.00146
scoring_system epss
scoring_elements 0.34973
published_at 2026-04-21T12:55:00Z
8
value 0.00146
scoring_system epss
scoring_elements 0.35095
published_at 2026-04-04T12:55:00Z
9
value 0.00146
scoring_system epss
scoring_elements 0.34975
published_at 2026-04-07T12:55:00Z
10
value 0.00146
scoring_system epss
scoring_elements 0.3502
published_at 2026-04-08T12:55:00Z
11
value 0.00146
scoring_system epss
scoring_elements 0.35048
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14648
1
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:57:33Z/
url https://security.gentoo.org/glsa/202101-09
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html
reference_id msg00068.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:57:33Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html
reference_id msg00079.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:57:33Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html
4
reference_url https://www.zerodayinitiative.com/advisories/ZDI-20-889/
reference_id ZDI-20-889
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:57:33Z/
url https://www.zerodayinitiative.com/advisories/ZDI-20-889/
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.12-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.12-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.12-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2020-14648
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4nyx-grab-93ha
58
url VCID-4sk2-6fz1-6qd1
vulnerability_id VCID-4sk2-6fz1-6qd1
summary Multiple vulnerabilities have been discovered in Oracle Virtualbox, the worst of which could result in root privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2264
reference_id
reference_type
scores
0
value 0.00113
scoring_system epss
scoring_elements 0.29875
published_at 2026-04-09T12:55:00Z
1
value 0.00113
scoring_system epss
scoring_elements 0.29919
published_at 2026-04-02T12:55:00Z
2
value 0.00113
scoring_system epss
scoring_elements 0.29966
published_at 2026-04-04T12:55:00Z
3
value 0.00113
scoring_system epss
scoring_elements 0.29778
published_at 2026-04-07T12:55:00Z
4
value 0.00113
scoring_system epss
scoring_elements 0.2984
published_at 2026-04-08T12:55:00Z
5
value 0.00113
scoring_system epss
scoring_elements 0.29884
published_at 2026-04-11T12:55:00Z
6
value 0.00113
scoring_system epss
scoring_elements 0.29838
published_at 2026-04-12T12:55:00Z
7
value 0.00113
scoring_system epss
scoring_elements 0.29788
published_at 2026-04-18T12:55:00Z
8
value 0.00113
scoring_system epss
scoring_elements 0.29807
published_at 2026-04-16T12:55:00Z
9
value 0.00113
scoring_system epss
scoring_elements 0.29741
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2264
1
reference_url http://www.openwall.com/lists/oss-security/2021/04/26/1
reference_id 1
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T14:48:20Z/
url http://www.openwall.com/lists/oss-security/2021/04/26/1
2
reference_url http://www.openwall.com/lists/oss-security/2021/04/26/2
reference_id 2
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T14:48:20Z/
url http://www.openwall.com/lists/oss-security/2021/04/26/2
3
reference_url https://security.archlinux.org/AVG-1870
reference_id AVG-1870
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1870
4
reference_url https://security.gentoo.org/glsa/202208-36
reference_id GLSA-202208-36
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T14:48:20Z/
url https://security.gentoo.org/glsa/202208-36
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.20-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.20-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.20-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2021-2264
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4sk2-6fz1-6qd1
59
url VCID-4txk-ybs5-ukea
vulnerability_id VCID-4txk-ybs5-ukea
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could result in privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2112
reference_id
reference_type
scores
0
value 0.00162
scoring_system epss
scoring_elements 0.37026
published_at 2026-04-21T12:55:00Z
1
value 0.00162
scoring_system epss
scoring_elements 0.37083
published_at 2026-04-12T12:55:00Z
2
value 0.00162
scoring_system epss
scoring_elements 0.37055
published_at 2026-04-13T12:55:00Z
3
value 0.00162
scoring_system epss
scoring_elements 0.37101
published_at 2026-04-16T12:55:00Z
4
value 0.00162
scoring_system epss
scoring_elements 0.37084
published_at 2026-04-18T12:55:00Z
5
value 0.00162
scoring_system epss
scoring_elements 0.37007
published_at 2026-04-01T12:55:00Z
6
value 0.00162
scoring_system epss
scoring_elements 0.37183
published_at 2026-04-02T12:55:00Z
7
value 0.00162
scoring_system epss
scoring_elements 0.37212
published_at 2026-04-04T12:55:00Z
8
value 0.00162
scoring_system epss
scoring_elements 0.37043
published_at 2026-04-07T12:55:00Z
9
value 0.00162
scoring_system epss
scoring_elements 0.37094
published_at 2026-04-08T12:55:00Z
10
value 0.00162
scoring_system epss
scoring_elements 0.37106
published_at 2026-04-09T12:55:00Z
11
value 0.00162
scoring_system epss
scoring_elements 0.37117
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2112
1
reference_url https://security.archlinux.org/ASA-202101-37
reference_id ASA-202101-37
reference_type
scores
url https://security.archlinux.org/ASA-202101-37
2
reference_url https://security.archlinux.org/AVG-1483
reference_id AVG-1483
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1483
3
reference_url https://security.gentoo.org/glsa/202101-15
reference_id GLSA-202101-15
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:53:38Z/
url https://security.gentoo.org/glsa/202101-15
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.18-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.18-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.18-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2021-2112
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4txk-ybs5-ukea
60
url VCID-4vcx-trqp-97af
vulnerability_id VCID-4vcx-trqp-97af
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14714
reference_id
reference_type
scores
0
value 0.00094
scoring_system epss
scoring_elements 0.26064
published_at 2026-04-21T12:55:00Z
1
value 0.00094
scoring_system epss
scoring_elements 0.26287
published_at 2026-04-02T12:55:00Z
2
value 0.00094
scoring_system epss
scoring_elements 0.26119
published_at 2026-04-13T12:55:00Z
3
value 0.00094
scoring_system epss
scoring_elements 0.26124
published_at 2026-04-16T12:55:00Z
4
value 0.00094
scoring_system epss
scoring_elements 0.26102
published_at 2026-04-18T12:55:00Z
5
value 0.00094
scoring_system epss
scoring_elements 0.26207
published_at 2026-04-01T12:55:00Z
6
value 0.00094
scoring_system epss
scoring_elements 0.26328
published_at 2026-04-04T12:55:00Z
7
value 0.00094
scoring_system epss
scoring_elements 0.261
published_at 2026-04-07T12:55:00Z
8
value 0.00094
scoring_system epss
scoring_elements 0.26167
published_at 2026-04-08T12:55:00Z
9
value 0.00094
scoring_system epss
scoring_elements 0.26215
published_at 2026-04-09T12:55:00Z
10
value 0.00094
scoring_system epss
scoring_elements 0.26224
published_at 2026-04-11T12:55:00Z
11
value 0.00094
scoring_system epss
scoring_elements 0.26178
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14714
1
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:09Z/
url https://security.gentoo.org/glsa/202101-09
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html
reference_id msg00068.html
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:09Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html
reference_id msg00079.html
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:09Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.12-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.12-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.12-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2020-14714
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4vcx-trqp-97af
61
url VCID-4xnp-72y4-2uh4
vulnerability_id VCID-4xnp-72y4-2uh4
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14703
reference_id
reference_type
scores
0
value 0.00164
scoring_system epss
scoring_elements 0.37271
published_at 2026-04-01T12:55:00Z
1
value 0.00164
scoring_system epss
scoring_elements 0.37436
published_at 2026-04-02T12:55:00Z
2
value 0.00164
scoring_system epss
scoring_elements 0.37363
published_at 2026-04-11T12:55:00Z
3
value 0.00164
scoring_system epss
scoring_elements 0.37329
published_at 2026-04-12T12:55:00Z
4
value 0.00164
scoring_system epss
scoring_elements 0.37301
published_at 2026-04-13T12:55:00Z
5
value 0.00164
scoring_system epss
scoring_elements 0.37348
published_at 2026-04-16T12:55:00Z
6
value 0.00164
scoring_system epss
scoring_elements 0.37331
published_at 2026-04-18T12:55:00Z
7
value 0.00164
scoring_system epss
scoring_elements 0.37276
published_at 2026-04-21T12:55:00Z
8
value 0.00164
scoring_system epss
scoring_elements 0.3746
published_at 2026-04-04T12:55:00Z
9
value 0.00164
scoring_system epss
scoring_elements 0.37289
published_at 2026-04-07T12:55:00Z
10
value 0.00164
scoring_system epss
scoring_elements 0.3734
published_at 2026-04-08T12:55:00Z
11
value 0.00164
scoring_system epss
scoring_elements 0.37351
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14703
1
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:22Z/
url https://security.gentoo.org/glsa/202101-09
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html
reference_id msg00068.html
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:22Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html
reference_id msg00079.html
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:22Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html
4
reference_url https://www.zerodayinitiative.com/advisories/ZDI-20-905/
reference_id ZDI-20-905
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:22Z/
url https://www.zerodayinitiative.com/advisories/ZDI-20-905/
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.12-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.12-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.12-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2020-14703
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4xnp-72y4-2uh4
62
url VCID-59ka-knuq-pfdb
vulnerability_id VCID-59ka-knuq-pfdb
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.0.38 and Prior to 5.1.20. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 2.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3513
reference_id
reference_type
scores
0
value 0.00066
scoring_system epss
scoring_elements 0.20356
published_at 2026-04-21T12:55:00Z
1
value 0.00066
scoring_system epss
scoring_elements 0.20424
published_at 2026-04-12T12:55:00Z
2
value 0.00066
scoring_system epss
scoring_elements 0.20367
published_at 2026-04-13T12:55:00Z
3
value 0.00066
scoring_system epss
scoring_elements 0.20358
published_at 2026-04-16T12:55:00Z
4
value 0.00066
scoring_system epss
scoring_elements 0.20359
published_at 2026-04-18T12:55:00Z
5
value 0.00066
scoring_system epss
scoring_elements 0.20372
published_at 2026-04-01T12:55:00Z
6
value 0.00066
scoring_system epss
scoring_elements 0.20518
published_at 2026-04-02T12:55:00Z
7
value 0.00066
scoring_system epss
scoring_elements 0.20576
published_at 2026-04-04T12:55:00Z
8
value 0.00066
scoring_system epss
scoring_elements 0.20304
published_at 2026-04-07T12:55:00Z
9
value 0.00066
scoring_system epss
scoring_elements 0.20386
published_at 2026-04-08T12:55:00Z
10
value 0.00066
scoring_system epss
scoring_elements 0.20443
published_at 2026-04-09T12:55:00Z
11
value 0.00066
scoring_system epss
scoring_elements 0.20469
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3513
1
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:12Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
2
reference_url http://www.securityfocus.com/bid/97736
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:12Z/
url http://www.securityfocus.com/bid/97736
3
reference_url http://www.securitytracker.com/id/1038288
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:45:12Z/
url http://www.securitytracker.com/id/1038288
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-3513
reference_id CVE-2017-3513
reference_type
scores
0
value 1.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:N/A:N
1
value 2.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-3513
fixed_packages
0
url pkg:deb/debian/virtualbox@5.1.20-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.1.20-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.1.20-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2017-3513
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-59ka-knuq-pfdb
63
url VCID-5ae9-et5p-9yat
vulnerability_id VCID-5ae9-et5p-9yat
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are prior to 5.2.24 and prior to 6.0.2. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 7.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H).
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:56:17Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2522
reference_id
reference_type
scores
0
value 0.00136
scoring_system epss
scoring_elements 0.33375
published_at 2026-04-21T12:55:00Z
1
value 0.00136
scoring_system epss
scoring_elements 0.33395
published_at 2026-04-13T12:55:00Z
2
value 0.00136
scoring_system epss
scoring_elements 0.33431
published_at 2026-04-16T12:55:00Z
3
value 0.00136
scoring_system epss
scoring_elements 0.33406
published_at 2026-04-18T12:55:00Z
4
value 0.00136
scoring_system epss
scoring_elements 0.33366
published_at 2026-04-01T12:55:00Z
5
value 0.00136
scoring_system epss
scoring_elements 0.33504
published_at 2026-04-02T12:55:00Z
6
value 0.00136
scoring_system epss
scoring_elements 0.33536
published_at 2026-04-04T12:55:00Z
7
value 0.00136
scoring_system epss
scoring_elements 0.33377
published_at 2026-04-07T12:55:00Z
8
value 0.00136
scoring_system epss
scoring_elements 0.33422
published_at 2026-04-08T12:55:00Z
9
value 0.00136
scoring_system epss
scoring_elements 0.33456
published_at 2026-04-09T12:55:00Z
10
value 0.00136
scoring_system epss
scoring_elements 0.3346
published_at 2026-04-11T12:55:00Z
11
value 0.00136
scoring_system epss
scoring_elements 0.33419
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2522
2
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:56:17Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
3
reference_url http://www.securityfocus.com/bid/106568
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:56:17Z/
url http://www.securityfocus.com/bid/106568
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-2522
reference_id CVE-2019-2522
reference_type
scores
0
value 4.4
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:P/A:P
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-2522
fixed_packages
0
url pkg:deb/debian/virtualbox@5.2.24-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.2.24-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.24-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2019-2522
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5ae9-et5p-9yat
64
url VCID-5af2-fa5b-puat
vulnerability_id VCID-5af2-fa5b-puat
summary Multiple vulnerabilities have been discovered in VirtualBox, leading to compomise of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21886
reference_id
reference_type
scores
0
value 0.00915
scoring_system epss
scoring_elements 0.75924
published_at 2026-04-21T12:55:00Z
1
value 0.00915
scoring_system epss
scoring_elements 0.75897
published_at 2026-04-13T12:55:00Z
2
value 0.00915
scoring_system epss
scoring_elements 0.75935
published_at 2026-04-16T12:55:00Z
3
value 0.00915
scoring_system epss
scoring_elements 0.75937
published_at 2026-04-18T12:55:00Z
4
value 0.00915
scoring_system epss
scoring_elements 0.75841
published_at 2026-04-02T12:55:00Z
5
value 0.00915
scoring_system epss
scoring_elements 0.75873
published_at 2026-04-04T12:55:00Z
6
value 0.00915
scoring_system epss
scoring_elements 0.75853
published_at 2026-04-07T12:55:00Z
7
value 0.00915
scoring_system epss
scoring_elements 0.75885
published_at 2026-04-08T12:55:00Z
8
value 0.00915
scoring_system epss
scoring_elements 0.75899
published_at 2026-04-09T12:55:00Z
9
value 0.00915
scoring_system epss
scoring_elements 0.75922
published_at 2026-04-11T12:55:00Z
10
value 0.00915
scoring_system epss
scoring_elements 0.75903
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21886
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029153
reference_id 1029153
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029153
2
reference_url https://security.gentoo.org/glsa/202310-07
reference_id GLSA-202310-07
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-17T13:39:34Z/
url https://security.gentoo.org/glsa/202310-07
fixed_packages
0
url pkg:deb/debian/virtualbox@7.0.6-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.0.6-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.0.6-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2023-21886
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5af2-fa5b-puat
65
url VCID-5b3f-5cbq-jycs
vulnerability_id VCID-5b3f-5cbq-jycs
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-3296
reference_id
reference_type
scores
0
value 0.0045
scoring_system epss
scoring_elements 0.63619
published_at 2026-04-02T12:55:00Z
1
value 0.0045
scoring_system epss
scoring_elements 0.63669
published_at 2026-04-21T12:55:00Z
2
value 0.0045
scoring_system epss
scoring_elements 0.63676
published_at 2026-04-16T12:55:00Z
3
value 0.0045
scoring_system epss
scoring_elements 0.63686
published_at 2026-04-18T12:55:00Z
4
value 0.0045
scoring_system epss
scoring_elements 0.63559
published_at 2026-04-01T12:55:00Z
5
value 0.0045
scoring_system epss
scoring_elements 0.63645
published_at 2026-04-04T12:55:00Z
6
value 0.0045
scoring_system epss
scoring_elements 0.63604
published_at 2026-04-07T12:55:00Z
7
value 0.0045
scoring_system epss
scoring_elements 0.63656
published_at 2026-04-08T12:55:00Z
8
value 0.0045
scoring_system epss
scoring_elements 0.63672
published_at 2026-04-12T12:55:00Z
9
value 0.0045
scoring_system epss
scoring_elements 0.63687
published_at 2026-04-11T12:55:00Z
10
value 0.0045
scoring_system epss
scoring_elements 0.63639
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-3296
1
reference_url http://www.securitytracker.com/id/1041887
reference_id 1041887
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:15:52Z/
url http://www.securitytracker.com/id/1041887
2
reference_url http://www.securityfocus.com/bid/105619
reference_id 105619
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:15:52Z/
url http://www.securityfocus.com/bid/105619
fixed_packages
0
url pkg:deb/debian/virtualbox@5.2.20-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.2.20-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.20-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2018-3296
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5b3f-5cbq-jycs
66
url VCID-5b91-2rka-2bd2
vulnerability_id VCID-5b91-2rka-2bd2
summary Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 7.0.16. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21121
reference_id
reference_type
scores
0
value 0.00156
scoring_system epss
scoring_elements 0.36366
published_at 2026-04-21T12:55:00Z
1
value 0.00156
scoring_system epss
scoring_elements 0.36439
published_at 2026-04-16T12:55:00Z
2
value 0.00156
scoring_system epss
scoring_elements 0.36423
published_at 2026-04-18T12:55:00Z
3
value 0.00156
scoring_system epss
scoring_elements 0.36504
published_at 2026-04-02T12:55:00Z
4
value 0.00156
scoring_system epss
scoring_elements 0.36538
published_at 2026-04-04T12:55:00Z
5
value 0.00156
scoring_system epss
scoring_elements 0.36376
published_at 2026-04-07T12:55:00Z
6
value 0.00156
scoring_system epss
scoring_elements 0.36427
published_at 2026-04-08T12:55:00Z
7
value 0.00156
scoring_system epss
scoring_elements 0.36447
published_at 2026-04-09T12:55:00Z
8
value 0.00156
scoring_system epss
scoring_elements 0.36455
published_at 2026-04-11T12:55:00Z
9
value 0.00156
scoring_system epss
scoring_elements 0.3642
published_at 2026-04-12T12:55:00Z
10
value 0.00156
scoring_system epss
scoring_elements 0.36398
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21121
1
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.0.16:*:*:*:*:*:*:*
2
reference_url https://www.oracle.com/security-alerts/cpuapr2024.html
reference_id cpuapr2024.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-26T03:55:33Z/
url https://www.oracle.com/security-alerts/cpuapr2024.html
fixed_packages
0
url pkg:deb/debian/virtualbox@7.0.16-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.0.16-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.0.16-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2024-21121
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5b91-2rka-2bd2
67
url VCID-5d4j-pgur-qqcp
vulnerability_id VCID-5d4j-pgur-qqcp
summary Multiple vulnerabilities have been discovered in Oracle Virtualbox, the worst of which could result in root privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21471
reference_id
reference_type
scores
0
value 0.00148
scoring_system epss
scoring_elements 0.35238
published_at 2026-04-21T12:55:00Z
1
value 0.00148
scoring_system epss
scoring_elements 0.35341
published_at 2026-04-02T12:55:00Z
2
value 0.00148
scoring_system epss
scoring_elements 0.35322
published_at 2026-04-11T12:55:00Z
3
value 0.00148
scoring_system epss
scoring_elements 0.35287
published_at 2026-04-12T12:55:00Z
4
value 0.00148
scoring_system epss
scoring_elements 0.35264
published_at 2026-04-13T12:55:00Z
5
value 0.00148
scoring_system epss
scoring_elements 0.35302
published_at 2026-04-16T12:55:00Z
6
value 0.00148
scoring_system epss
scoring_elements 0.35288
published_at 2026-04-18T12:55:00Z
7
value 0.00148
scoring_system epss
scoring_elements 0.35368
published_at 2026-04-04T12:55:00Z
8
value 0.00148
scoring_system epss
scoring_elements 0.35251
published_at 2026-04-07T12:55:00Z
9
value 0.00148
scoring_system epss
scoring_elements 0.35297
published_at 2026-04-08T12:55:00Z
10
value 0.00148
scoring_system epss
scoring_elements 0.3532
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21471
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://security.gentoo.org/glsa/202208-36
reference_id GLSA-202208-36
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:49Z/
url https://security.gentoo.org/glsa/202208-36
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.34-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.34-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.34-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2022-21471
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5d4j-pgur-qqcp
68
url VCID-5dnb-z566-67by
vulnerability_id VCID-5dnb-z566-67by
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are prior to 5.2.24 and prior to 6.0.2. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 3.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N).
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:09Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2505
reference_id
reference_type
scores
0
value 0.00098
scoring_system epss
scoring_elements 0.26978
published_at 2026-04-21T12:55:00Z
1
value 0.00098
scoring_system epss
scoring_elements 0.27031
published_at 2026-04-13T12:55:00Z
2
value 0.00098
scoring_system epss
scoring_elements 0.2704
published_at 2026-04-16T12:55:00Z
3
value 0.00098
scoring_system epss
scoring_elements 0.27015
published_at 2026-04-18T12:55:00Z
4
value 0.00098
scoring_system epss
scoring_elements 0.27144
published_at 2026-04-01T12:55:00Z
5
value 0.00098
scoring_system epss
scoring_elements 0.27185
published_at 2026-04-02T12:55:00Z
6
value 0.00098
scoring_system epss
scoring_elements 0.27221
published_at 2026-04-04T12:55:00Z
7
value 0.00098
scoring_system epss
scoring_elements 0.27014
published_at 2026-04-07T12:55:00Z
8
value 0.00098
scoring_system epss
scoring_elements 0.27083
published_at 2026-04-08T12:55:00Z
9
value 0.00098
scoring_system epss
scoring_elements 0.27129
published_at 2026-04-09T12:55:00Z
10
value 0.00098
scoring_system epss
scoring_elements 0.27132
published_at 2026-04-11T12:55:00Z
11
value 0.00098
scoring_system epss
scoring_elements 0.27089
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2505
2
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:09Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
3
reference_url http://www.securityfocus.com/bid/106568
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:09Z/
url http://www.securityfocus.com/bid/106568
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-2505
reference_id CVE-2019-2505
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:N
1
value 3.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2019-2505
fixed_packages
0
url pkg:deb/debian/virtualbox@5.2.24-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.2.24-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.24-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2019-2505
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5dnb-z566-67by
69
url VCID-5g31-n2ar-zuea
vulnerability_id VCID-5g31-n2ar-zuea
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.0.38 and Prior to 5.1.20. Easily "exploitable" vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3576
reference_id
reference_type
scores
0
value 0.00221
scoring_system epss
scoring_elements 0.44749
published_at 2026-04-21T12:55:00Z
1
value 0.00221
scoring_system epss
scoring_elements 0.44802
published_at 2026-04-11T12:55:00Z
2
value 0.00221
scoring_system epss
scoring_elements 0.44771
published_at 2026-04-12T12:55:00Z
3
value 0.00221
scoring_system epss
scoring_elements 0.44773
published_at 2026-04-13T12:55:00Z
4
value 0.00221
scoring_system epss
scoring_elements 0.44826
published_at 2026-04-16T12:55:00Z
5
value 0.00221
scoring_system epss
scoring_elements 0.44819
published_at 2026-04-18T12:55:00Z
6
value 0.00221
scoring_system epss
scoring_elements 0.4469
published_at 2026-04-01T12:55:00Z
7
value 0.00221
scoring_system epss
scoring_elements 0.4477
published_at 2026-04-02T12:55:00Z
8
value 0.00221
scoring_system epss
scoring_elements 0.44791
published_at 2026-04-04T12:55:00Z
9
value 0.00221
scoring_system epss
scoring_elements 0.4473
published_at 2026-04-07T12:55:00Z
10
value 0.00221
scoring_system epss
scoring_elements 0.44783
published_at 2026-04-08T12:55:00Z
11
value 0.00221
scoring_system epss
scoring_elements 0.44785
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3576
1
reference_url https://www.exploit-db.com/exploits/41907/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:10Z/
url https://www.exploit-db.com/exploits/41907/
2
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:10Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
3
reference_url http://www.securityfocus.com/bid/97759
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:10Z/
url http://www.securityfocus.com/bid/97759
4
reference_url http://www.securitytracker.com/id/1038288
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:10Z/
url http://www.securitytracker.com/id/1038288
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
6
reference_url https://bugs.chromium.org/p/project-zero/issues/detail?id=1141
reference_id CVE-2017-3576
reference_type exploit
scores
url https://bugs.chromium.org/p/project-zero/issues/detail?id=1141
7
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/41907.c
reference_id CVE-2017-3576
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/41907.c
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-3576
reference_id CVE-2017-3576
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-3576
fixed_packages
0
url pkg:deb/debian/virtualbox@5.1.20-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.1.20-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.1.20-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2017-3576
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5g31-n2ar-zuea
70
url VCID-5q9d-47a4-9uah
vulnerability_id VCID-5q9d-47a4-9uah
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are prior to 5.2.24 and prior to 6.0.2. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 3.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N).
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:01:28Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2553
reference_id
reference_type
scores
0
value 0.00098
scoring_system epss
scoring_elements 0.26978
published_at 2026-04-21T12:55:00Z
1
value 0.00098
scoring_system epss
scoring_elements 0.27031
published_at 2026-04-13T12:55:00Z
2
value 0.00098
scoring_system epss
scoring_elements 0.2704
published_at 2026-04-16T12:55:00Z
3
value 0.00098
scoring_system epss
scoring_elements 0.27015
published_at 2026-04-18T12:55:00Z
4
value 0.00098
scoring_system epss
scoring_elements 0.27144
published_at 2026-04-01T12:55:00Z
5
value 0.00098
scoring_system epss
scoring_elements 0.27185
published_at 2026-04-02T12:55:00Z
6
value 0.00098
scoring_system epss
scoring_elements 0.27221
published_at 2026-04-04T12:55:00Z
7
value 0.00098
scoring_system epss
scoring_elements 0.27014
published_at 2026-04-07T12:55:00Z
8
value 0.00098
scoring_system epss
scoring_elements 0.27083
published_at 2026-04-08T12:55:00Z
9
value 0.00098
scoring_system epss
scoring_elements 0.27129
published_at 2026-04-09T12:55:00Z
10
value 0.00098
scoring_system epss
scoring_elements 0.27132
published_at 2026-04-11T12:55:00Z
11
value 0.00098
scoring_system epss
scoring_elements 0.27089
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2553
2
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:01:28Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
3
reference_url http://www.securityfocus.com/bid/106568
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:01:28Z/
url http://www.securityfocus.com/bid/106568
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-2553
reference_id CVE-2019-2553
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:N
1
value 3.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2019-2553
fixed_packages
0
url pkg:deb/debian/virtualbox@5.2.24-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.2.24-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.24-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2019-2553
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5q9d-47a4-9uah
71
url VCID-5qtn-9jhp-mubb
vulnerability_id VCID-5qtn-9jhp-mubb
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14711
reference_id
reference_type
scores
0
value 0.00374
scoring_system epss
scoring_elements 0.58987
published_at 2026-04-01T12:55:00Z
1
value 0.00374
scoring_system epss
scoring_elements 0.59062
published_at 2026-04-02T12:55:00Z
2
value 0.00374
scoring_system epss
scoring_elements 0.59122
published_at 2026-04-11T12:55:00Z
3
value 0.00374
scoring_system epss
scoring_elements 0.59121
published_at 2026-04-16T12:55:00Z
4
value 0.00374
scoring_system epss
scoring_elements 0.59125
published_at 2026-04-18T12:55:00Z
5
value 0.00374
scoring_system epss
scoring_elements 0.59105
published_at 2026-04-21T12:55:00Z
6
value 0.00374
scoring_system epss
scoring_elements 0.59085
published_at 2026-04-13T12:55:00Z
7
value 0.00374
scoring_system epss
scoring_elements 0.59049
published_at 2026-04-07T12:55:00Z
8
value 0.00374
scoring_system epss
scoring_elements 0.591
published_at 2026-04-08T12:55:00Z
9
value 0.00374
scoring_system epss
scoring_elements 0.59104
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14711
1
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T19:54:21Z/
url https://security.gentoo.org/glsa/202101-09
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html
reference_id msg00068.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T19:54:21Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html
reference_id msg00079.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T19:54:21Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html
fixed_packages
0
url pkg:deb/debian/virtualbox@0?distro=sid
purl pkg:deb/debian/virtualbox@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@0%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2020-14711
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5qtn-9jhp-mubb
72
url VCID-5x3d-8v24-73hg
vulnerability_id VCID-5x3d-8v24-73hg
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.2.28 and prior to 6.0.6. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 7.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2690
reference_id
reference_type
scores
0
value 0.00139
scoring_system epss
scoring_elements 0.34061
published_at 2026-04-02T12:55:00Z
1
value 0.00139
scoring_system epss
scoring_elements 0.33944
published_at 2026-04-21T12:55:00Z
2
value 0.00139
scoring_system epss
scoring_elements 0.33718
published_at 2026-04-01T12:55:00Z
3
value 0.00139
scoring_system epss
scoring_elements 0.34092
published_at 2026-04-04T12:55:00Z
4
value 0.00139
scoring_system epss
scoring_elements 0.3395
published_at 2026-04-07T12:55:00Z
5
value 0.00139
scoring_system epss
scoring_elements 0.33991
published_at 2026-04-16T12:55:00Z
6
value 0.00139
scoring_system epss
scoring_elements 0.34023
published_at 2026-04-11T12:55:00Z
7
value 0.00139
scoring_system epss
scoring_elements 0.3398
published_at 2026-04-12T12:55:00Z
8
value 0.00139
scoring_system epss
scoring_elements 0.33956
published_at 2026-04-13T12:55:00Z
9
value 0.00139
scoring_system epss
scoring_elements 0.33977
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2690
fixed_packages
0
url pkg:deb/debian/virtualbox@6.0.6-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.0.6-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.0.6-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2019-2690
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5x3d-8v24-73hg
73
url VCID-5xff-vqcp-rqay
vulnerability_id VCID-5xff-vqcp-rqay
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.1.24. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox as well as unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data and unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 7.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10242
reference_id
reference_type
scores
0
value 0.00061
scoring_system epss
scoring_elements 0.19135
published_at 2026-04-21T12:55:00Z
1
value 0.00061
scoring_system epss
scoring_elements 0.19352
published_at 2026-04-02T12:55:00Z
2
value 0.00061
scoring_system epss
scoring_elements 0.19117
published_at 2026-04-16T12:55:00Z
3
value 0.00061
scoring_system epss
scoring_elements 0.19126
published_at 2026-04-18T12:55:00Z
4
value 0.00061
scoring_system epss
scoring_elements 0.19217
published_at 2026-04-01T12:55:00Z
5
value 0.00061
scoring_system epss
scoring_elements 0.19404
published_at 2026-04-04T12:55:00Z
6
value 0.00061
scoring_system epss
scoring_elements 0.1912
published_at 2026-04-07T12:55:00Z
7
value 0.00061
scoring_system epss
scoring_elements 0.192
published_at 2026-04-08T12:55:00Z
8
value 0.00061
scoring_system epss
scoring_elements 0.19253
published_at 2026-04-09T12:55:00Z
9
value 0.00061
scoring_system epss
scoring_elements 0.19258
published_at 2026-04-11T12:55:00Z
10
value 0.00061
scoring_system epss
scoring_elements 0.19212
published_at 2026-04-12T12:55:00Z
11
value 0.00061
scoring_system epss
scoring_elements 0.19157
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10242
1
reference_url http://www.securitytracker.com/id/1038929
reference_id 1038929
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:59Z/
url http://www.securitytracker.com/id/1038929
2
reference_url http://www.securityfocus.com/bid/99689
reference_id 99689
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:48:59Z/
url http://www.securityfocus.com/bid/99689
fixed_packages
0
url pkg:deb/debian/virtualbox@5.1.24-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.1.24-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.1.24-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2017-10242
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5xff-vqcp-rqay
74
url VCID-5xv9-gayz-jbdb
vulnerability_id VCID-5xv9-gayz-jbdb
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are prior to 5.2.24 and prior to 6.0.2. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:56:14Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2524
reference_id
reference_type
scores
0
value 0.00136
scoring_system epss
scoring_elements 0.33375
published_at 2026-04-21T12:55:00Z
1
value 0.00136
scoring_system epss
scoring_elements 0.33395
published_at 2026-04-13T12:55:00Z
2
value 0.00136
scoring_system epss
scoring_elements 0.33431
published_at 2026-04-16T12:55:00Z
3
value 0.00136
scoring_system epss
scoring_elements 0.33406
published_at 2026-04-18T12:55:00Z
4
value 0.00136
scoring_system epss
scoring_elements 0.33366
published_at 2026-04-01T12:55:00Z
5
value 0.00136
scoring_system epss
scoring_elements 0.33504
published_at 2026-04-02T12:55:00Z
6
value 0.00136
scoring_system epss
scoring_elements 0.33536
published_at 2026-04-04T12:55:00Z
7
value 0.00136
scoring_system epss
scoring_elements 0.33377
published_at 2026-04-07T12:55:00Z
8
value 0.00136
scoring_system epss
scoring_elements 0.33422
published_at 2026-04-08T12:55:00Z
9
value 0.00136
scoring_system epss
scoring_elements 0.33456
published_at 2026-04-09T12:55:00Z
10
value 0.00136
scoring_system epss
scoring_elements 0.3346
published_at 2026-04-11T12:55:00Z
11
value 0.00136
scoring_system epss
scoring_elements 0.33419
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2524
2
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:56:14Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
3
reference_url http://www.securityfocus.com/bid/106568
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:56:14Z/
url http://www.securityfocus.com/bid/106568
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-2524
reference_id CVE-2019-2524
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-2524
fixed_packages
0
url pkg:deb/debian/virtualbox@5.2.24-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.2.24-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.24-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2019-2524
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5xv9-gayz-jbdb
75
url VCID-625m-j3ya-dua2
vulnerability_id VCID-625m-j3ya-dua2
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are prior to 5.2.24 and prior to 6.0.2. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N).
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:38Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:38Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2450
reference_id
reference_type
scores
0
value 0.00116
scoring_system epss
scoring_elements 0.30247
published_at 2026-04-21T12:55:00Z
1
value 0.00116
scoring_system epss
scoring_elements 0.30433
published_at 2026-04-02T12:55:00Z
2
value 0.00116
scoring_system epss
scoring_elements 0.30294
published_at 2026-04-13T12:55:00Z
3
value 0.00116
scoring_system epss
scoring_elements 0.30309
published_at 2026-04-16T12:55:00Z
4
value 0.00116
scoring_system epss
scoring_elements 0.30292
published_at 2026-04-18T12:55:00Z
5
value 0.00116
scoring_system epss
scoring_elements 0.30403
published_at 2026-04-01T12:55:00Z
6
value 0.00116
scoring_system epss
scoring_elements 0.30478
published_at 2026-04-04T12:55:00Z
7
value 0.00116
scoring_system epss
scoring_elements 0.30288
published_at 2026-04-07T12:55:00Z
8
value 0.00116
scoring_system epss
scoring_elements 0.30347
published_at 2026-04-08T12:55:00Z
9
value 0.00116
scoring_system epss
scoring_elements 0.30382
published_at 2026-04-09T12:55:00Z
10
value 0.00116
scoring_system epss
scoring_elements 0.30384
published_at 2026-04-11T12:55:00Z
11
value 0.00116
scoring_system epss
scoring_elements 0.30341
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2450
3
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:38Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
4
reference_url http://www.securityfocus.com/bid/106568
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:38Z/
url http://www.securityfocus.com/bid/106568
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-2450
reference_id CVE-2019-2450
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:N
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2019-2450
fixed_packages
0
url pkg:deb/debian/virtualbox@5.2.24-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.2.24-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.24-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2019-2450
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-625m-j3ya-dua2
76
url VCID-644f-8x1b-8ye4
vulnerability_id VCID-644f-8x1b-8ye4
summary Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is 7.1.10. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 2.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-53029
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06482
published_at 2026-04-02T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.0651
published_at 2026-04-04T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.065
published_at 2026-04-07T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.0655
published_at 2026-04-08T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.06592
published_at 2026-04-09T12:55:00Z
5
value 0.00025
scoring_system epss
scoring_elements 0.06701
published_at 2026-04-18T12:55:00Z
6
value 0.00025
scoring_system epss
scoring_elements 0.06861
published_at 2026-04-21T12:55:00Z
7
value 0.00025
scoring_system epss
scoring_elements 0.06793
published_at 2026-04-11T12:55:00Z
8
value 0.00025
scoring_system epss
scoring_elements 0.06786
published_at 2026-04-12T12:55:00Z
9
value 0.00025
scoring_system epss
scoring_elements 0.06779
published_at 2026-04-13T12:55:00Z
10
value 0.00025
scoring_system epss
scoring_elements 0.06711
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-53029
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109373
reference_id 1109373
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109373
2
reference_url https://www.oracle.com/security-alerts/cpujul2025.html
reference_id cpujul2025.html
reference_type
scores
0
value 2.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-15T19:47:54Z/
url https://www.oracle.com/security-alerts/cpujul2025.html
fixed_packages
0
url pkg:deb/debian/virtualbox@7.1.12-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.1.12-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.1.12-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2025-53029
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-644f-8x1b-8ye4
77
url VCID-6bav-pth5-g3fp
vulnerability_id VCID-6bav-pth5-g3fp
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2685
reference_id
reference_type
scores
0
value 0.00178
scoring_system epss
scoring_elements 0.39267
published_at 2026-04-21T12:55:00Z
1
value 0.00178
scoring_system epss
scoring_elements 0.39366
published_at 2026-04-02T12:55:00Z
2
value 0.00178
scoring_system epss
scoring_elements 0.39382
published_at 2026-04-16T12:55:00Z
3
value 0.00178
scoring_system epss
scoring_elements 0.39353
published_at 2026-04-18T12:55:00Z
4
value 0.00178
scoring_system epss
scoring_elements 0.39179
published_at 2026-04-01T12:55:00Z
5
value 0.00178
scoring_system epss
scoring_elements 0.39389
published_at 2026-04-04T12:55:00Z
6
value 0.00178
scoring_system epss
scoring_elements 0.39303
published_at 2026-04-07T12:55:00Z
7
value 0.00178
scoring_system epss
scoring_elements 0.39358
published_at 2026-04-08T12:55:00Z
8
value 0.00178
scoring_system epss
scoring_elements 0.39375
published_at 2026-04-09T12:55:00Z
9
value 0.00178
scoring_system epss
scoring_elements 0.39387
published_at 2026-04-11T12:55:00Z
10
value 0.00178
scoring_system epss
scoring_elements 0.39348
published_at 2026-04-12T12:55:00Z
11
value 0.00178
scoring_system epss
scoring_elements 0.39329
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2685
1
reference_url http://www.securityfocus.com/bid/102689
reference_id 102689
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:52Z/
url http://www.securityfocus.com/bid/102689
2
reference_url http://www.securitytracker.com/id/1040202
reference_id 1040202
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:52Z/
url http://www.securitytracker.com/id/1040202
3
reference_url https://security.gentoo.org/glsa/201802-01
reference_id GLSA-201802-01
reference_type
scores
url https://security.gentoo.org/glsa/201802-01
fixed_packages
0
url pkg:deb/debian/virtualbox@5.2.6-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.2.6-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.6-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2018-2685
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6bav-pth5-g3fp
78
url VCID-6dww-g6vm-uqar
vulnerability_id VCID-6dww-g6vm-uqar
summary Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.12 and 7.2.2. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-61760
reference_id
reference_type
scores
0
value 0.00022
scoring_system epss
scoring_elements 0.06127
published_at 2026-04-21T12:55:00Z
1
value 0.00022
scoring_system epss
scoring_elements 0.05976
published_at 2026-04-18T12:55:00Z
2
value 0.00022
scoring_system epss
scoring_elements 0.05931
published_at 2026-04-02T12:55:00Z
3
value 0.00022
scoring_system epss
scoring_elements 0.05963
published_at 2026-04-04T12:55:00Z
4
value 0.00022
scoring_system epss
scoring_elements 0.05947
published_at 2026-04-07T12:55:00Z
5
value 0.00022
scoring_system epss
scoring_elements 0.05986
published_at 2026-04-08T12:55:00Z
6
value 0.00022
scoring_system epss
scoring_elements 0.06025
published_at 2026-04-09T12:55:00Z
7
value 0.00022
scoring_system epss
scoring_elements 0.06016
published_at 2026-04-11T12:55:00Z
8
value 0.00022
scoring_system epss
scoring_elements 0.06008
published_at 2026-04-12T12:55:00Z
9
value 0.00022
scoring_system epss
scoring_elements 0.05999
published_at 2026-04-13T12:55:00Z
10
value 0.00022
scoring_system epss
scoring_elements 0.05965
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-61760
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118542
reference_id 1118542
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118542
2
reference_url https://www.oracle.com/security-alerts/cpuoct2025.html
reference_id cpuoct2025.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-23T03:55:25Z/
url https://www.oracle.com/security-alerts/cpuoct2025.html
fixed_packages
0
url pkg:deb/debian/virtualbox@7.2.4-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.2.4-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.4-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2025-61760
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6dww-g6vm-uqar
79
url VCID-6e2r-qhmm-t7ca
vulnerability_id VCID-6e2r-qhmm-t7ca
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could result in privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2131
reference_id
reference_type
scores
0
value 0.00305
scoring_system epss
scoring_elements 0.53799
published_at 2026-04-21T12:55:00Z
1
value 0.00305
scoring_system epss
scoring_elements 0.53792
published_at 2026-04-12T12:55:00Z
2
value 0.00305
scoring_system epss
scoring_elements 0.53777
published_at 2026-04-13T12:55:00Z
3
value 0.00305
scoring_system epss
scoring_elements 0.53814
published_at 2026-04-16T12:55:00Z
4
value 0.00305
scoring_system epss
scoring_elements 0.53818
published_at 2026-04-18T12:55:00Z
5
value 0.00305
scoring_system epss
scoring_elements 0.53691
published_at 2026-04-01T12:55:00Z
6
value 0.00305
scoring_system epss
scoring_elements 0.53711
published_at 2026-04-07T12:55:00Z
7
value 0.00305
scoring_system epss
scoring_elements 0.53738
published_at 2026-04-04T12:55:00Z
8
value 0.00305
scoring_system epss
scoring_elements 0.53763
published_at 2026-04-08T12:55:00Z
9
value 0.00305
scoring_system epss
scoring_elements 0.53761
published_at 2026-04-09T12:55:00Z
10
value 0.00305
scoring_system epss
scoring_elements 0.53809
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2131
1
reference_url https://security.archlinux.org/ASA-202101-37
reference_id ASA-202101-37
reference_type
scores
url https://security.archlinux.org/ASA-202101-37
2
reference_url https://security.archlinux.org/AVG-1483
reference_id AVG-1483
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1483
3
reference_url https://security.gentoo.org/glsa/202101-15
reference_id GLSA-202101-15
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:53:10Z/
url https://security.gentoo.org/glsa/202101-15
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.18-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.18-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.18-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2021-2131
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6e2r-qhmm-t7ca
80
url VCID-6fnv-g6gm-jkfc
vulnerability_id VCID-6fnv-g6gm-jkfc
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2701
reference_id
reference_type
scores
0
value 0.00167
scoring_system epss
scoring_elements 0.3781
published_at 2026-04-21T12:55:00Z
1
value 0.00167
scoring_system epss
scoring_elements 0.37926
published_at 2026-04-02T12:55:00Z
2
value 0.00167
scoring_system epss
scoring_elements 0.37907
published_at 2026-04-11T12:55:00Z
3
value 0.00167
scoring_system epss
scoring_elements 0.37871
published_at 2026-04-12T12:55:00Z
4
value 0.00167
scoring_system epss
scoring_elements 0.37846
published_at 2026-04-13T12:55:00Z
5
value 0.00167
scoring_system epss
scoring_elements 0.37893
published_at 2026-04-16T12:55:00Z
6
value 0.00167
scoring_system epss
scoring_elements 0.37873
published_at 2026-04-18T12:55:00Z
7
value 0.00167
scoring_system epss
scoring_elements 0.37743
published_at 2026-04-01T12:55:00Z
8
value 0.00167
scoring_system epss
scoring_elements 0.37951
published_at 2026-04-04T12:55:00Z
9
value 0.00167
scoring_system epss
scoring_elements 0.37829
published_at 2026-04-07T12:55:00Z
10
value 0.00167
scoring_system epss
scoring_elements 0.37879
published_at 2026-04-08T12:55:00Z
11
value 0.00167
scoring_system epss
scoring_elements 0.37892
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2701
1
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:41:57Z/
url https://security.gentoo.org/glsa/202101-09
2
reference_url https://www.zerodayinitiative.com/advisories/ZDI-20-550/
reference_id ZDI-20-550
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:41:57Z/
url https://www.zerodayinitiative.com/advisories/ZDI-20-550/
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.2-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.2-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.2-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2020-2701
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6fnv-g6gm-jkfc
81
url VCID-6g9h-qjtq-83bv
vulnerability_id VCID-6g9h-qjtq-83bv
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.2.28 and prior to 6.0.6. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2723
reference_id
reference_type
scores
0
value 0.0015
scoring_system epss
scoring_elements 0.35574
published_at 2026-04-02T12:55:00Z
1
value 0.0015
scoring_system epss
scoring_elements 0.35474
published_at 2026-04-21T12:55:00Z
2
value 0.0015
scoring_system epss
scoring_elements 0.35535
published_at 2026-04-16T12:55:00Z
3
value 0.0015
scoring_system epss
scoring_elements 0.35524
published_at 2026-04-18T12:55:00Z
4
value 0.0015
scoring_system epss
scoring_elements 0.35374
published_at 2026-04-01T12:55:00Z
5
value 0.0015
scoring_system epss
scoring_elements 0.35599
published_at 2026-04-04T12:55:00Z
6
value 0.0015
scoring_system epss
scoring_elements 0.35482
published_at 2026-04-07T12:55:00Z
7
value 0.0015
scoring_system epss
scoring_elements 0.35528
published_at 2026-04-08T12:55:00Z
8
value 0.0015
scoring_system epss
scoring_elements 0.35553
published_at 2026-04-09T12:55:00Z
9
value 0.0015
scoring_system epss
scoring_elements 0.35561
published_at 2026-04-11T12:55:00Z
10
value 0.0015
scoring_system epss
scoring_elements 0.35517
published_at 2026-04-12T12:55:00Z
11
value 0.0015
scoring_system epss
scoring_elements 0.35496
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2723
1
reference_url https://www.zerodayinitiative.com/advisories/ZDI-19-423/
reference_id ZDI-19-423
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:55:39Z/
url https://www.zerodayinitiative.com/advisories/ZDI-19-423/
2
reference_url https://www.zerodayinitiative.com/advisories/ZDI-19-424/
reference_id ZDI-19-424
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:55:39Z/
url https://www.zerodayinitiative.com/advisories/ZDI-19-424/
fixed_packages
0
url pkg:deb/debian/virtualbox@6.0.6-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.0.6-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.0.6-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2019-2723
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6g9h-qjtq-83bv
82
url VCID-6gzd-ma2m-wued
vulnerability_id VCID-6gzd-ma2m-wued
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which might allow unauthorized changes to some critical or all
    accessible data.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3332
reference_id
reference_type
scores
0
value 0.00113
scoring_system epss
scoring_elements 0.2983
published_at 2026-04-21T12:55:00Z
1
value 0.00113
scoring_system epss
scoring_elements 0.30008
published_at 2026-04-02T12:55:00Z
2
value 0.00113
scoring_system epss
scoring_elements 0.29877
published_at 2026-04-13T12:55:00Z
3
value 0.00113
scoring_system epss
scoring_elements 0.29895
published_at 2026-04-16T12:55:00Z
4
value 0.00113
scoring_system epss
scoring_elements 0.29875
published_at 2026-04-18T12:55:00Z
5
value 0.00113
scoring_system epss
scoring_elements 0.29967
published_at 2026-04-01T12:55:00Z
6
value 0.00113
scoring_system epss
scoring_elements 0.30056
published_at 2026-04-04T12:55:00Z
7
value 0.00113
scoring_system epss
scoring_elements 0.2987
published_at 2026-04-07T12:55:00Z
8
value 0.00113
scoring_system epss
scoring_elements 0.29931
published_at 2026-04-08T12:55:00Z
9
value 0.00113
scoring_system epss
scoring_elements 0.29968
published_at 2026-04-09T12:55:00Z
10
value 0.00113
scoring_system epss
scoring_elements 0.29973
published_at 2026-04-11T12:55:00Z
11
value 0.00113
scoring_system epss
scoring_elements 0.29926
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3332
1
reference_url http://www.securitytracker.com/id/1037638
reference_id 1037638
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:17Z/
url http://www.securitytracker.com/id/1037638
2
reference_url http://www.securityfocus.com/bid/95599
reference_id 95599
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:17Z/
url http://www.securityfocus.com/bid/95599
3
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
reference_id cpujan2017-2881727.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:17Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
4
reference_url https://security.gentoo.org/glsa/201702-08
reference_id GLSA-201702-08
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T20:09:17Z/
url https://security.gentoo.org/glsa/201702-08
fixed_packages
0
url pkg:deb/debian/virtualbox@5.1.14-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.1.14-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.1.14-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2017-3332
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6gzd-ma2m-wued
83
url VCID-6hse-9ytw-77a8
vulnerability_id VCID-6hse-9ytw-77a8
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2698
reference_id
reference_type
scores
0
value 0.00753
scoring_system epss
scoring_elements 0.73257
published_at 2026-04-21T12:55:00Z
1
value 0.00753
scoring_system epss
scoring_elements 0.73167
published_at 2026-04-02T12:55:00Z
2
value 0.00753
scoring_system epss
scoring_elements 0.73218
published_at 2026-04-12T12:55:00Z
3
value 0.00753
scoring_system epss
scoring_elements 0.73254
published_at 2026-04-16T12:55:00Z
4
value 0.00753
scoring_system epss
scoring_elements 0.73264
published_at 2026-04-18T12:55:00Z
5
value 0.00753
scoring_system epss
scoring_elements 0.73157
published_at 2026-04-01T12:55:00Z
6
value 0.00753
scoring_system epss
scoring_elements 0.73188
published_at 2026-04-04T12:55:00Z
7
value 0.00753
scoring_system epss
scoring_elements 0.73162
published_at 2026-04-07T12:55:00Z
8
value 0.00753
scoring_system epss
scoring_elements 0.73198
published_at 2026-04-08T12:55:00Z
9
value 0.00753
scoring_system epss
scoring_elements 0.73212
published_at 2026-04-13T12:55:00Z
10
value 0.00753
scoring_system epss
scoring_elements 0.73237
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2698
1
reference_url http://www.securityfocus.com/bid/102688
reference_id 102688
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:31Z/
url http://www.securityfocus.com/bid/102688
2
reference_url http://www.securitytracker.com/id/1040202
reference_id 1040202
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:31Z/
url http://www.securitytracker.com/id/1040202
3
reference_url https://www.exploit-db.com/exploits/43878/
reference_id 43878
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:31Z/
url https://www.exploit-db.com/exploits/43878/
4
reference_url https://blogs.securiteam.com/index.php/archives/3649
reference_id CVE-2018-2698
reference_type exploit
scores
url https://blogs.securiteam.com/index.php/archives/3649
5
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/43878.md
reference_id CVE-2018-2698
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/43878.md
6
reference_url https://security.gentoo.org/glsa/201802-01
reference_id GLSA-201802-01
reference_type
scores
url https://security.gentoo.org/glsa/201802-01
fixed_packages
0
url pkg:deb/debian/virtualbox@5.2.6-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.2.6-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.6-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2018-2698
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6hse-9ytw-77a8
84
url VCID-6j81-1pbz-ufcj
vulnerability_id VCID-6j81-1pbz-ufcj
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.0.38 and Prior to 5.1.20. Easily "exploitable" vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox as well as unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data and unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 7.9 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3559
reference_id
reference_type
scores
0
value 0.00058
scoring_system epss
scoring_elements 0.18017
published_at 2026-04-21T12:55:00Z
1
value 0.00058
scoring_system epss
scoring_elements 0.18082
published_at 2026-04-12T12:55:00Z
2
value 0.00058
scoring_system epss
scoring_elements 0.18033
published_at 2026-04-13T12:55:00Z
3
value 0.00058
scoring_system epss
scoring_elements 0.17975
published_at 2026-04-16T12:55:00Z
4
value 0.00058
scoring_system epss
scoring_elements 0.17986
published_at 2026-04-18T12:55:00Z
5
value 0.00058
scoring_system epss
scoring_elements 0.18056
published_at 2026-04-01T12:55:00Z
6
value 0.00058
scoring_system epss
scoring_elements 0.18217
published_at 2026-04-02T12:55:00Z
7
value 0.00058
scoring_system epss
scoring_elements 0.1827
published_at 2026-04-04T12:55:00Z
8
value 0.00058
scoring_system epss
scoring_elements 0.17971
published_at 2026-04-07T12:55:00Z
9
value 0.00058
scoring_system epss
scoring_elements 0.18057
published_at 2026-04-08T12:55:00Z
10
value 0.00058
scoring_system epss
scoring_elements 0.18118
published_at 2026-04-09T12:55:00Z
11
value 0.00058
scoring_system epss
scoring_elements 0.18125
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3559
1
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:44Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
2
reference_url http://www.securityfocus.com/bid/97739
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:44Z/
url http://www.securityfocus.com/bid/97739
3
reference_url http://www.securitytracker.com/id/1038288
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:44Z/
url http://www.securitytracker.com/id/1038288
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-3559
reference_id CVE-2017-3559
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:P/I:P/A:P
1
value 7.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-3559
fixed_packages
0
url pkg:deb/debian/virtualbox@5.1.20-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.1.20-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.1.20-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2017-3559
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6j81-1pbz-ufcj
85
url VCID-6juz-7nx9-8qe7
vulnerability_id VCID-6juz-7nx9-8qe7
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2866
reference_id
reference_type
scores
0
value 0.0016
scoring_system epss
scoring_elements 0.37041
published_at 2026-04-02T12:55:00Z
1
value 0.0016
scoring_system epss
scoring_elements 0.36882
published_at 2026-04-21T12:55:00Z
2
value 0.0016
scoring_system epss
scoring_elements 0.36942
published_at 2026-04-18T12:55:00Z
3
value 0.0016
scoring_system epss
scoring_elements 0.36871
published_at 2026-04-01T12:55:00Z
4
value 0.0016
scoring_system epss
scoring_elements 0.37074
published_at 2026-04-04T12:55:00Z
5
value 0.0016
scoring_system epss
scoring_elements 0.36902
published_at 2026-04-07T12:55:00Z
6
value 0.0016
scoring_system epss
scoring_elements 0.36953
published_at 2026-04-08T12:55:00Z
7
value 0.0016
scoring_system epss
scoring_elements 0.36966
published_at 2026-04-09T12:55:00Z
8
value 0.0016
scoring_system epss
scoring_elements 0.36974
published_at 2026-04-11T12:55:00Z
9
value 0.0016
scoring_system epss
scoring_elements 0.36939
published_at 2026-04-12T12:55:00Z
10
value 0.0016
scoring_system epss
scoring_elements 0.36913
published_at 2026-04-13T12:55:00Z
11
value 0.0016
scoring_system epss
scoring_elements 0.36958
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2866
1
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
reference_id cpujul2019-5072835.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:16:35Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
2
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:16:35Z/
url https://security.gentoo.org/glsa/202101-09
fixed_packages
0
url pkg:deb/debian/virtualbox@6.0.10-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.0.10-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.0.10-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2019-2866
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6juz-7nx9-8qe7
86
url VCID-6v66-95ez-u7ev
vulnerability_id VCID-6v66-95ez-u7ev
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are prior to 5.2.24 and prior to 6.0.2. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 7.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H).
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:56:18Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2521
reference_id
reference_type
scores
0
value 0.00136
scoring_system epss
scoring_elements 0.33375
published_at 2026-04-21T12:55:00Z
1
value 0.00136
scoring_system epss
scoring_elements 0.33395
published_at 2026-04-13T12:55:00Z
2
value 0.00136
scoring_system epss
scoring_elements 0.33431
published_at 2026-04-16T12:55:00Z
3
value 0.00136
scoring_system epss
scoring_elements 0.33406
published_at 2026-04-18T12:55:00Z
4
value 0.00136
scoring_system epss
scoring_elements 0.33366
published_at 2026-04-01T12:55:00Z
5
value 0.00136
scoring_system epss
scoring_elements 0.33504
published_at 2026-04-02T12:55:00Z
6
value 0.00136
scoring_system epss
scoring_elements 0.33536
published_at 2026-04-04T12:55:00Z
7
value 0.00136
scoring_system epss
scoring_elements 0.33377
published_at 2026-04-07T12:55:00Z
8
value 0.00136
scoring_system epss
scoring_elements 0.33422
published_at 2026-04-08T12:55:00Z
9
value 0.00136
scoring_system epss
scoring_elements 0.33456
published_at 2026-04-09T12:55:00Z
10
value 0.00136
scoring_system epss
scoring_elements 0.3346
published_at 2026-04-11T12:55:00Z
11
value 0.00136
scoring_system epss
scoring_elements 0.33419
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2521
2
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:56:18Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
3
reference_url http://www.securityfocus.com/bid/106568
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:56:18Z/
url http://www.securityfocus.com/bid/106568
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-2521
reference_id CVE-2019-2521
reference_type
scores
0
value 4.4
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:P/A:P
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-2521
fixed_packages
0
url pkg:deb/debian/virtualbox@5.2.24-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.2.24-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.24-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2019-2521
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6v66-95ez-u7ev
87
url VCID-6w31-wsm4-mufh
vulnerability_id VCID-6w31-wsm4-mufh
summary Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 6.1.44 and Prior to 7.0.8. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21989
reference_id
reference_type
scores
0
value 0.00073
scoring_system epss
scoring_elements 0.22085
published_at 2026-04-21T12:55:00Z
1
value 0.00073
scoring_system epss
scoring_elements 0.2213
published_at 2026-04-18T12:55:00Z
2
value 0.00073
scoring_system epss
scoring_elements 0.22251
published_at 2026-04-02T12:55:00Z
3
value 0.00073
scoring_system epss
scoring_elements 0.22297
published_at 2026-04-04T12:55:00Z
4
value 0.00073
scoring_system epss
scoring_elements 0.22081
published_at 2026-04-07T12:55:00Z
5
value 0.00073
scoring_system epss
scoring_elements 0.22162
published_at 2026-04-08T12:55:00Z
6
value 0.00073
scoring_system epss
scoring_elements 0.22217
published_at 2026-04-09T12:55:00Z
7
value 0.00073
scoring_system epss
scoring_elements 0.22238
published_at 2026-04-11T12:55:00Z
8
value 0.00073
scoring_system epss
scoring_elements 0.22197
published_at 2026-04-12T12:55:00Z
9
value 0.00073
scoring_system epss
scoring_elements 0.22136
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21989
fixed_packages
0
url pkg:deb/debian/virtualbox@7.0.8-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.0.8-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.0.8-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2023-21989
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6w31-wsm4-mufh
88
url VCID-77b5-6nkn-37e8
vulnerability_id VCID-77b5-6nkn-37e8
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.1.30. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data as well as unauthorized read access to a subset of Oracle VM VirtualBox accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.0 Base Score 5.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10428
reference_id
reference_type
scores
0
value 0.00053
scoring_system epss
scoring_elements 0.16509
published_at 2026-04-18T12:55:00Z
1
value 0.00053
scoring_system epss
scoring_elements 0.16662
published_at 2026-04-11T12:55:00Z
2
value 0.00053
scoring_system epss
scoring_elements 0.16621
published_at 2026-04-12T12:55:00Z
3
value 0.00053
scoring_system epss
scoring_elements 0.16562
published_at 2026-04-13T12:55:00Z
4
value 0.00053
scoring_system epss
scoring_elements 0.165
published_at 2026-04-16T12:55:00Z
5
value 0.00053
scoring_system epss
scoring_elements 0.16512
published_at 2026-04-01T12:55:00Z
6
value 0.00053
scoring_system epss
scoring_elements 0.16694
published_at 2026-04-02T12:55:00Z
7
value 0.00053
scoring_system epss
scoring_elements 0.16756
published_at 2026-04-04T12:55:00Z
8
value 0.00053
scoring_system epss
scoring_elements 0.16547
published_at 2026-04-21T12:55:00Z
9
value 0.00053
scoring_system epss
scoring_elements 0.16632
published_at 2026-04-08T12:55:00Z
10
value 0.00053
scoring_system epss
scoring_elements 0.16684
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10428
1
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:41:44Z/
url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
2
reference_url http://www.securityfocus.com/bid/101362
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:41:44Z/
url http://www.securityfocus.com/bid/101362
3
reference_url http://www.securitytracker.com/id/1039599
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:41:44Z/
url http://www.securitytracker.com/id/1039599
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-10428
reference_id CVE-2017-10428
reference_type
scores
0
value 4.1
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:S/C:P/I:P/A:P
1
value 5.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L
url https://nvd.nist.gov/vuln/detail/CVE-2017-10428
fixed_packages
0
url pkg:deb/debian/virtualbox@5.1.30-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.1.30-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.1.30-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2017-10428
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-77b5-6nkn-37e8
89
url VCID-7agu-g9dg-b3d6
vulnerability_id VCID-7agu-g9dg-b3d6
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could result in privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2120
reference_id
reference_type
scores
0
value 0.00158
scoring_system epss
scoring_elements 0.36556
published_at 2026-04-21T12:55:00Z
1
value 0.00158
scoring_system epss
scoring_elements 0.36612
published_at 2026-04-12T12:55:00Z
2
value 0.00158
scoring_system epss
scoring_elements 0.36588
published_at 2026-04-13T12:55:00Z
3
value 0.00158
scoring_system epss
scoring_elements 0.36634
published_at 2026-04-16T12:55:00Z
4
value 0.00158
scoring_system epss
scoring_elements 0.36616
published_at 2026-04-18T12:55:00Z
5
value 0.00158
scoring_system epss
scoring_elements 0.36527
published_at 2026-04-01T12:55:00Z
6
value 0.00158
scoring_system epss
scoring_elements 0.36699
published_at 2026-04-02T12:55:00Z
7
value 0.00158
scoring_system epss
scoring_elements 0.3673
published_at 2026-04-04T12:55:00Z
8
value 0.00158
scoring_system epss
scoring_elements 0.36568
published_at 2026-04-07T12:55:00Z
9
value 0.00158
scoring_system epss
scoring_elements 0.3662
published_at 2026-04-08T12:55:00Z
10
value 0.00158
scoring_system epss
scoring_elements 0.36639
published_at 2026-04-09T12:55:00Z
11
value 0.00158
scoring_system epss
scoring_elements 0.36646
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2120
1
reference_url https://security.archlinux.org/ASA-202101-37
reference_id ASA-202101-37
reference_type
scores
url https://security.archlinux.org/ASA-202101-37
2
reference_url https://security.archlinux.org/AVG-1483
reference_id AVG-1483
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1483
3
reference_url https://security.gentoo.org/glsa/202101-15
reference_id GLSA-202101-15
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:53:27Z/
url https://security.gentoo.org/glsa/202101-15
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.18-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.18-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.18-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2021-2120
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7agu-g9dg-b3d6
90
url VCID-7b9u-tggy-gqej
vulnerability_id VCID-7b9u-tggy-gqej
summary Multiple vulnerabilities have been discovered in Oracle Virtualbox, the worst of which could result in root privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2279
reference_id
reference_type
scores
0
value 0.07624
scoring_system epss
scoring_elements 0.9183
published_at 2026-04-01T12:55:00Z
1
value 0.07624
scoring_system epss
scoring_elements 0.91853
published_at 2026-04-07T12:55:00Z
2
value 0.07624
scoring_system epss
scoring_elements 0.91866
published_at 2026-04-08T12:55:00Z
3
value 0.07624
scoring_system epss
scoring_elements 0.91871
published_at 2026-04-13T12:55:00Z
4
value 0.07624
scoring_system epss
scoring_elements 0.91875
published_at 2026-04-12T12:55:00Z
5
value 0.07624
scoring_system epss
scoring_elements 0.91889
published_at 2026-04-16T12:55:00Z
6
value 0.07624
scoring_system epss
scoring_elements 0.91886
published_at 2026-04-18T12:55:00Z
7
value 0.07624
scoring_system epss
scoring_elements 0.91883
published_at 2026-04-21T12:55:00Z
8
value 0.07624
scoring_system epss
scoring_elements 0.91838
published_at 2026-04-02T12:55:00Z
9
value 0.07624
scoring_system epss
scoring_elements 0.91845
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2279
1
reference_url https://security.archlinux.org/ASA-202104-9
reference_id ASA-202104-9
reference_type
scores
url https://security.archlinux.org/ASA-202104-9
2
reference_url https://security.archlinux.org/AVG-1846
reference_id AVG-1846
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1846
3
reference_url https://security.gentoo.org/glsa/202208-36
reference_id GLSA-202208-36
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T14:47:59Z/
url https://security.gentoo.org/glsa/202208-36
4
reference_url https://www.zerodayinitiative.com/advisories/ZDI-21-453/
reference_id ZDI-21-453
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T14:47:59Z/
url https://www.zerodayinitiative.com/advisories/ZDI-21-453/
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.20-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.20-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.20-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2021-2279
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7b9u-tggy-gqej
91
url VCID-7bvm-wdur-s7at
vulnerability_id VCID-7bvm-wdur-s7at
summary Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is 7.1.10. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-53030
reference_id
reference_type
scores
0
value 0.0003
scoring_system epss
scoring_elements 0.08673
published_at 2026-04-21T12:55:00Z
1
value 0.0003
scoring_system epss
scoring_elements 0.08521
published_at 2026-04-18T12:55:00Z
2
value 0.0003
scoring_system epss
scoring_elements 0.08423
published_at 2026-04-02T12:55:00Z
3
value 0.0003
scoring_system epss
scoring_elements 0.08477
published_at 2026-04-04T12:55:00Z
4
value 0.0003
scoring_system epss
scoring_elements 0.08396
published_at 2026-04-07T12:55:00Z
5
value 0.0003
scoring_system epss
scoring_elements 0.08468
published_at 2026-04-08T12:55:00Z
6
value 0.0003
scoring_system epss
scoring_elements 0.08487
published_at 2026-04-09T12:55:00Z
7
value 0.0003
scoring_system epss
scoring_elements 0.0868
published_at 2026-04-11T12:55:00Z
8
value 0.0003
scoring_system epss
scoring_elements 0.08657
published_at 2026-04-12T12:55:00Z
9
value 0.0003
scoring_system epss
scoring_elements 0.08644
published_at 2026-04-13T12:55:00Z
10
value 0.0003
scoring_system epss
scoring_elements 0.08534
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-53030
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109373
reference_id 1109373
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109373
2
reference_url https://www.oracle.com/security-alerts/cpujul2025.html
reference_id cpujul2025.html
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-17T03:55:38Z/
url https://www.oracle.com/security-alerts/cpujul2025.html
fixed_packages
0
url pkg:deb/debian/virtualbox@7.1.12-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.1.12-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.1.12-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2025-53030
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7bvm-wdur-s7at
92
url VCID-7bze-1pt2-23bp
vulnerability_id VCID-7bze-1pt2-23bp
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2702
reference_id
reference_type
scores
0
value 0.00167
scoring_system epss
scoring_elements 0.3781
published_at 2026-04-21T12:55:00Z
1
value 0.00167
scoring_system epss
scoring_elements 0.37926
published_at 2026-04-02T12:55:00Z
2
value 0.00167
scoring_system epss
scoring_elements 0.37907
published_at 2026-04-11T12:55:00Z
3
value 0.00167
scoring_system epss
scoring_elements 0.37871
published_at 2026-04-12T12:55:00Z
4
value 0.00167
scoring_system epss
scoring_elements 0.37846
published_at 2026-04-13T12:55:00Z
5
value 0.00167
scoring_system epss
scoring_elements 0.37893
published_at 2026-04-16T12:55:00Z
6
value 0.00167
scoring_system epss
scoring_elements 0.37873
published_at 2026-04-18T12:55:00Z
7
value 0.00167
scoring_system epss
scoring_elements 0.37743
published_at 2026-04-01T12:55:00Z
8
value 0.00167
scoring_system epss
scoring_elements 0.37951
published_at 2026-04-04T12:55:00Z
9
value 0.00167
scoring_system epss
scoring_elements 0.37829
published_at 2026-04-07T12:55:00Z
10
value 0.00167
scoring_system epss
scoring_elements 0.37879
published_at 2026-04-08T12:55:00Z
11
value 0.00167
scoring_system epss
scoring_elements 0.37892
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2702
1
reference_url https://security.gentoo.org/glsa/202004-02
reference_id GLSA-202004-02
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:41:56Z/
url https://security.gentoo.org/glsa/202004-02
2
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:41:56Z/
url https://security.gentoo.org/glsa/202101-09
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.2-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.2-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.2-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2020-2702
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7bze-1pt2-23bp
93
url VCID-7c35-93nr-93cv
vulnerability_id VCID-7c35-93nr-93cv
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.16. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-3086
reference_id
reference_type
scores
0
value 0.0045
scoring_system epss
scoring_elements 0.63669
published_at 2026-04-21T12:55:00Z
1
value 0.0045
scoring_system epss
scoring_elements 0.63687
published_at 2026-04-11T12:55:00Z
2
value 0.0045
scoring_system epss
scoring_elements 0.63639
published_at 2026-04-13T12:55:00Z
3
value 0.0045
scoring_system epss
scoring_elements 0.63676
published_at 2026-04-16T12:55:00Z
4
value 0.0045
scoring_system epss
scoring_elements 0.63686
published_at 2026-04-18T12:55:00Z
5
value 0.0045
scoring_system epss
scoring_elements 0.63559
published_at 2026-04-01T12:55:00Z
6
value 0.0045
scoring_system epss
scoring_elements 0.63619
published_at 2026-04-02T12:55:00Z
7
value 0.0045
scoring_system epss
scoring_elements 0.63645
published_at 2026-04-04T12:55:00Z
8
value 0.0045
scoring_system epss
scoring_elements 0.63604
published_at 2026-04-07T12:55:00Z
9
value 0.0045
scoring_system epss
scoring_elements 0.63656
published_at 2026-04-08T12:55:00Z
10
value 0.0045
scoring_system epss
scoring_elements 0.63672
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-3086
1
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:27Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
2
reference_url http://www.securityfocus.com/bid/104764
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:27Z/
url http://www.securityfocus.com/bid/104764
3
reference_url http://www.securitytracker.com/id/1041296
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:27Z/
url http://www.securitytracker.com/id/1041296
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-3086
reference_id CVE-2018-3086
reference_type
scores
0
value 4.4
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:P/A:P
1
value 8.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-3086
fixed_packages
0
url pkg:deb/debian/virtualbox@5.2.16-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.2.16-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.16-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2018-3086
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7c35-93nr-93cv
94
url VCID-7d2s-r3zf-u7ag
vulnerability_id VCID-7d2s-r3zf-u7ag
summary Multiple vulnerabilities have been discovered in Oracle Virtualbox, the worst of which could result in root privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2283
reference_id
reference_type
scores
0
value 0.00182
scoring_system epss
scoring_elements 0.39933
published_at 2026-04-21T12:55:00Z
1
value 0.00182
scoring_system epss
scoring_elements 0.4001
published_at 2026-04-12T12:55:00Z
2
value 0.00182
scoring_system epss
scoring_elements 0.3999
published_at 2026-04-13T12:55:00Z
3
value 0.00182
scoring_system epss
scoring_elements 0.4004
published_at 2026-04-16T12:55:00Z
4
value 0.00182
scoring_system epss
scoring_elements 0.40011
published_at 2026-04-18T12:55:00Z
5
value 0.00182
scoring_system epss
scoring_elements 0.39875
published_at 2026-04-01T12:55:00Z
6
value 0.00182
scoring_system epss
scoring_elements 0.40023
published_at 2026-04-08T12:55:00Z
7
value 0.00182
scoring_system epss
scoring_elements 0.40049
published_at 2026-04-04T12:55:00Z
8
value 0.00182
scoring_system epss
scoring_elements 0.3997
published_at 2026-04-07T12:55:00Z
9
value 0.00182
scoring_system epss
scoring_elements 0.40036
published_at 2026-04-09T12:55:00Z
10
value 0.00182
scoring_system epss
scoring_elements 0.40047
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2283
1
reference_url https://security.archlinux.org/ASA-202104-9
reference_id ASA-202104-9
reference_type
scores
url https://security.archlinux.org/ASA-202104-9
2
reference_url https://security.archlinux.org/AVG-1846
reference_id AVG-1846
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1846
3
reference_url https://security.gentoo.org/glsa/202208-36
reference_id GLSA-202208-36
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:42:40Z/
url https://security.gentoo.org/glsa/202208-36
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.20-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.20-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.20-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2021-2283
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7d2s-r3zf-u7ag
95
url VCID-7gts-v1hm-sbgs
vulnerability_id VCID-7gts-v1hm-sbgs
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14707
reference_id
reference_type
scores
0
value 0.00221
scoring_system epss
scoring_elements 0.44663
published_at 2026-04-01T12:55:00Z
1
value 0.00221
scoring_system epss
scoring_elements 0.44743
published_at 2026-04-12T12:55:00Z
2
value 0.00221
scoring_system epss
scoring_elements 0.44744
published_at 2026-04-13T12:55:00Z
3
value 0.00221
scoring_system epss
scoring_elements 0.44799
published_at 2026-04-16T12:55:00Z
4
value 0.00221
scoring_system epss
scoring_elements 0.44791
published_at 2026-04-18T12:55:00Z
5
value 0.00221
scoring_system epss
scoring_elements 0.44721
published_at 2026-04-21T12:55:00Z
6
value 0.00221
scoring_system epss
scoring_elements 0.44764
published_at 2026-04-04T12:55:00Z
7
value 0.00221
scoring_system epss
scoring_elements 0.44702
published_at 2026-04-07T12:55:00Z
8
value 0.00221
scoring_system epss
scoring_elements 0.44755
published_at 2026-04-08T12:55:00Z
9
value 0.00221
scoring_system epss
scoring_elements 0.44758
published_at 2026-04-09T12:55:00Z
10
value 0.00221
scoring_system epss
scoring_elements 0.44774
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14707
1
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:16Z/
url https://security.gentoo.org/glsa/202101-09
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html
reference_id msg00068.html
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:16Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html
reference_id msg00079.html
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:16Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.12-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.12-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.12-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2020-14707
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7gts-v1hm-sbgs
96
url VCID-7kps-avn8-ubaj
vulnerability_id VCID-7kps-avn8-ubaj
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are prior to 5.2.24 and prior to 6.0.2. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:56:21Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2500
reference_id
reference_type
scores
0
value 0.00136
scoring_system epss
scoring_elements 0.33375
published_at 2026-04-21T12:55:00Z
1
value 0.00136
scoring_system epss
scoring_elements 0.33395
published_at 2026-04-13T12:55:00Z
2
value 0.00136
scoring_system epss
scoring_elements 0.33431
published_at 2026-04-16T12:55:00Z
3
value 0.00136
scoring_system epss
scoring_elements 0.33406
published_at 2026-04-18T12:55:00Z
4
value 0.00136
scoring_system epss
scoring_elements 0.33366
published_at 2026-04-01T12:55:00Z
5
value 0.00136
scoring_system epss
scoring_elements 0.33504
published_at 2026-04-02T12:55:00Z
6
value 0.00136
scoring_system epss
scoring_elements 0.33536
published_at 2026-04-04T12:55:00Z
7
value 0.00136
scoring_system epss
scoring_elements 0.33377
published_at 2026-04-07T12:55:00Z
8
value 0.00136
scoring_system epss
scoring_elements 0.33422
published_at 2026-04-08T12:55:00Z
9
value 0.00136
scoring_system epss
scoring_elements 0.33456
published_at 2026-04-09T12:55:00Z
10
value 0.00136
scoring_system epss
scoring_elements 0.3346
published_at 2026-04-11T12:55:00Z
11
value 0.00136
scoring_system epss
scoring_elements 0.33419
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2500
2
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:56:21Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
3
reference_url http://www.securityfocus.com/bid/106568
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:56:21Z/
url http://www.securityfocus.com/bid/106568
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-2500
reference_id CVE-2019-2500
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-2500
fixed_packages
0
url pkg:deb/debian/virtualbox@5.2.24-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.2.24-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.24-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2019-2500
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7kps-avn8-ubaj
97
url VCID-7u7v-d9gp-rugm
vulnerability_id VCID-7u7v-d9gp-rugm
summary Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization VirtualBox before 5.0.22 allows remote attackers to affect confidentiality via vectors related to Core.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-3612
reference_id
reference_type
scores
0
value 0.00338
scoring_system epss
scoring_elements 0.5663
published_at 2026-04-21T12:55:00Z
1
value 0.00338
scoring_system epss
scoring_elements 0.56673
published_at 2026-04-11T12:55:00Z
2
value 0.00338
scoring_system epss
scoring_elements 0.56648
published_at 2026-04-12T12:55:00Z
3
value 0.00338
scoring_system epss
scoring_elements 0.56627
published_at 2026-04-13T12:55:00Z
4
value 0.00338
scoring_system epss
scoring_elements 0.56658
published_at 2026-04-16T12:55:00Z
5
value 0.00338
scoring_system epss
scoring_elements 0.56657
published_at 2026-04-18T12:55:00Z
6
value 0.00338
scoring_system epss
scoring_elements 0.56511
published_at 2026-04-01T12:55:00Z
7
value 0.00338
scoring_system epss
scoring_elements 0.56608
published_at 2026-04-07T12:55:00Z
8
value 0.00338
scoring_system epss
scoring_elements 0.56629
published_at 2026-04-04T12:55:00Z
9
value 0.00338
scoring_system epss
scoring_elements 0.56659
published_at 2026-04-08T12:55:00Z
10
value 0.00338
scoring_system epss
scoring_elements 0.56664
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-3612
1
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:50Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
2
reference_url http://www.securityfocus.com/bid/91787
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:50Z/
url http://www.securityfocus.com/bid/91787
3
reference_url http://www.securityfocus.com/bid/91860
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:50Z/
url http://www.securityfocus.com/bid/91860
4
reference_url http://www.securitytracker.com/id/1036384
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T19:47:50Z/
url http://www.securitytracker.com/id/1036384
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-3612
reference_id CVE-2016-3612
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
1
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-3612
fixed_packages
0
url pkg:deb/debian/virtualbox@5.0.22-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.0.22-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.0.22-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2016-3612
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7u7v-d9gp-rugm
98
url VCID-7wuj-m4tx-hket
vulnerability_id VCID-7wuj-m4tx-hket
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.1.24. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox as well as unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data and unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 7.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10236
reference_id
reference_type
scores
0
value 0.00059
scoring_system epss
scoring_elements 0.18474
published_at 2026-04-21T12:55:00Z
1
value 0.00059
scoring_system epss
scoring_elements 0.18695
published_at 2026-04-02T12:55:00Z
2
value 0.00059
scoring_system epss
scoring_elements 0.18443
published_at 2026-04-16T12:55:00Z
3
value 0.00059
scoring_system epss
scoring_elements 0.18453
published_at 2026-04-18T12:55:00Z
4
value 0.00059
scoring_system epss
scoring_elements 0.18554
published_at 2026-04-12T12:55:00Z
5
value 0.00059
scoring_system epss
scoring_elements 0.18749
published_at 2026-04-04T12:55:00Z
6
value 0.00059
scoring_system epss
scoring_elements 0.18466
published_at 2026-04-07T12:55:00Z
7
value 0.00059
scoring_system epss
scoring_elements 0.18546
published_at 2026-04-08T12:55:00Z
8
value 0.00059
scoring_system epss
scoring_elements 0.18599
published_at 2026-04-09T12:55:00Z
9
value 0.00059
scoring_system epss
scoring_elements 0.18601
published_at 2026-04-11T12:55:00Z
10
value 0.00059
scoring_system epss
scoring_elements 0.18502
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10236
1
reference_url http://www.securitytracker.com/id/1038929
reference_id 1038929
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:49:14Z/
url http://www.securitytracker.com/id/1038929
2
reference_url http://www.securityfocus.com/bid/99645
reference_id 99645
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:49:14Z/
url http://www.securityfocus.com/bid/99645
fixed_packages
0
url pkg:deb/debian/virtualbox@5.1.24-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.1.24-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.1.24-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2017-10236
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7wuj-m4tx-hket
99
url VCID-85jv-3ssg-dkc1
vulnerability_id VCID-85jv-3ssg-dkc1
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-3291
reference_id
reference_type
scores
0
value 0.0045
scoring_system epss
scoring_elements 0.63619
published_at 2026-04-02T12:55:00Z
1
value 0.0045
scoring_system epss
scoring_elements 0.63669
published_at 2026-04-21T12:55:00Z
2
value 0.0045
scoring_system epss
scoring_elements 0.63676
published_at 2026-04-16T12:55:00Z
3
value 0.0045
scoring_system epss
scoring_elements 0.63686
published_at 2026-04-18T12:55:00Z
4
value 0.0045
scoring_system epss
scoring_elements 0.63559
published_at 2026-04-01T12:55:00Z
5
value 0.0045
scoring_system epss
scoring_elements 0.63645
published_at 2026-04-04T12:55:00Z
6
value 0.0045
scoring_system epss
scoring_elements 0.63604
published_at 2026-04-07T12:55:00Z
7
value 0.0045
scoring_system epss
scoring_elements 0.63656
published_at 2026-04-08T12:55:00Z
8
value 0.0045
scoring_system epss
scoring_elements 0.63672
published_at 2026-04-12T12:55:00Z
9
value 0.0045
scoring_system epss
scoring_elements 0.63687
published_at 2026-04-11T12:55:00Z
10
value 0.0045
scoring_system epss
scoring_elements 0.63639
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-3291
1
reference_url http://www.securitytracker.com/id/1041887
reference_id 1041887
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:15:59Z/
url http://www.securitytracker.com/id/1041887
2
reference_url http://www.securityfocus.com/bid/105619
reference_id 105619
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:15:59Z/
url http://www.securityfocus.com/bid/105619
fixed_packages
0
url pkg:deb/debian/virtualbox@5.2.20-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.2.20-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.20-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2018-3291
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-85jv-3ssg-dkc1
100
url VCID-8bqe-gk57-qqaa
vulnerability_id VCID-8bqe-gk57-qqaa
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:15Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2951
reference_id
reference_type
scores
0
value 0.00151
scoring_system epss
scoring_elements 0.35573
published_at 2026-04-01T12:55:00Z
1
value 0.00151
scoring_system epss
scoring_elements 0.35744
published_at 2026-04-09T12:55:00Z
2
value 0.00151
scoring_system epss
scoring_elements 0.35753
published_at 2026-04-11T12:55:00Z
3
value 0.00151
scoring_system epss
scoring_elements 0.35709
published_at 2026-04-12T12:55:00Z
4
value 0.00151
scoring_system epss
scoring_elements 0.35685
published_at 2026-04-13T12:55:00Z
5
value 0.00151
scoring_system epss
scoring_elements 0.35726
published_at 2026-04-16T12:55:00Z
6
value 0.00151
scoring_system epss
scoring_elements 0.35714
published_at 2026-04-18T12:55:00Z
7
value 0.00151
scoring_system epss
scoring_elements 0.35664
published_at 2026-04-21T12:55:00Z
8
value 0.00151
scoring_system epss
scoring_elements 0.35769
published_at 2026-04-02T12:55:00Z
9
value 0.00151
scoring_system epss
scoring_elements 0.35795
published_at 2026-04-04T12:55:00Z
10
value 0.00151
scoring_system epss
scoring_elements 0.35675
published_at 2026-04-07T12:55:00Z
11
value 0.00151
scoring_system epss
scoring_elements 0.35721
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2951
2
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:15Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
3
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2951
reference_id CVE-2020-2951
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
2
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-2951
6
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:00:15Z/
url https://security.gentoo.org/glsa/202101-09
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.6-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.6-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.6-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2020-2951
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8bqe-gk57-qqaa
101
url VCID-8enk-che5-e7f3
vulnerability_id VCID-8enk-che5-e7f3
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.1.24. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox as well as unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data and unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 7.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10239
reference_id
reference_type
scores
0
value 0.00061
scoring_system epss
scoring_elements 0.19135
published_at 2026-04-21T12:55:00Z
1
value 0.00061
scoring_system epss
scoring_elements 0.19352
published_at 2026-04-02T12:55:00Z
2
value 0.00061
scoring_system epss
scoring_elements 0.19117
published_at 2026-04-16T12:55:00Z
3
value 0.00061
scoring_system epss
scoring_elements 0.19126
published_at 2026-04-18T12:55:00Z
4
value 0.00061
scoring_system epss
scoring_elements 0.19217
published_at 2026-04-01T12:55:00Z
5
value 0.00061
scoring_system epss
scoring_elements 0.19404
published_at 2026-04-04T12:55:00Z
6
value 0.00061
scoring_system epss
scoring_elements 0.1912
published_at 2026-04-07T12:55:00Z
7
value 0.00061
scoring_system epss
scoring_elements 0.192
published_at 2026-04-08T12:55:00Z
8
value 0.00061
scoring_system epss
scoring_elements 0.19253
published_at 2026-04-09T12:55:00Z
9
value 0.00061
scoring_system epss
scoring_elements 0.19258
published_at 2026-04-11T12:55:00Z
10
value 0.00061
scoring_system epss
scoring_elements 0.19212
published_at 2026-04-12T12:55:00Z
11
value 0.00061
scoring_system epss
scoring_elements 0.19157
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10239
1
reference_url http://www.securitytracker.com/id/1038929
reference_id 1038929
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:49:06Z/
url http://www.securitytracker.com/id/1038929
2
reference_url http://www.securityfocus.com/bid/99681
reference_id 99681
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:49:06Z/
url http://www.securityfocus.com/bid/99681
fixed_packages
0
url pkg:deb/debian/virtualbox@5.1.24-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.1.24-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.1.24-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2017-10239
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8enk-che5-e7f3
102
url VCID-8fwv-bnnu-7bf7
vulnerability_id VCID-8fwv-bnnu-7bf7
summary Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-21963
reference_id
reference_type
scores
0
value 0.0002
scoring_system epss
scoring_elements 0.05592
published_at 2026-04-21T12:55:00Z
1
value 0.0002
scoring_system epss
scoring_elements 0.05421
published_at 2026-04-18T12:55:00Z
2
value 0.0002
scoring_system epss
scoring_elements 0.05412
published_at 2026-04-16T12:55:00Z
3
value 0.0002
scoring_system epss
scoring_elements 0.05445
published_at 2026-04-04T12:55:00Z
4
value 0.0002
scoring_system epss
scoring_elements 0.05451
published_at 2026-04-07T12:55:00Z
5
value 0.0002
scoring_system epss
scoring_elements 0.05486
published_at 2026-04-08T12:55:00Z
6
value 0.0002
scoring_system epss
scoring_elements 0.05508
published_at 2026-04-09T12:55:00Z
7
value 0.0002
scoring_system epss
scoring_elements 0.05482
published_at 2026-04-11T12:55:00Z
8
value 0.0002
scoring_system epss
scoring_elements 0.05468
published_at 2026-04-12T12:55:00Z
9
value 0.0002
scoring_system epss
scoring_elements 0.05461
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-21963
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126117
reference_id 1126117
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126117
2
reference_url https://www.oracle.com/security-alerts/cpujan2026.html
reference_id cpujan2026.html
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-21T15:48:27Z/
url https://www.oracle.com/security-alerts/cpujan2026.html
fixed_packages
0
url pkg:deb/debian/virtualbox@7.2.6-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2026-21963
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8fwv-bnnu-7bf7
103
url VCID-8n1x-aejs-z7f2
vulnerability_id VCID-8n1x-aejs-z7f2
summary Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 6.1.44 and Prior to 7.0.8. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 7.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21987
reference_id
reference_type
scores
0
value 0.08511
scoring_system epss
scoring_elements 0.92389
published_at 2026-04-21T12:55:00Z
1
value 0.08511
scoring_system epss
scoring_elements 0.92388
published_at 2026-04-18T12:55:00Z
2
value 0.08511
scoring_system epss
scoring_elements 0.92346
published_at 2026-04-02T12:55:00Z
3
value 0.08511
scoring_system epss
scoring_elements 0.92352
published_at 2026-04-04T12:55:00Z
4
value 0.08511
scoring_system epss
scoring_elements 0.92355
published_at 2026-04-07T12:55:00Z
5
value 0.08511
scoring_system epss
scoring_elements 0.92367
published_at 2026-04-08T12:55:00Z
6
value 0.08511
scoring_system epss
scoring_elements 0.92371
published_at 2026-04-09T12:55:00Z
7
value 0.08511
scoring_system epss
scoring_elements 0.92377
published_at 2026-04-13T12:55:00Z
8
value 0.08511
scoring_system epss
scoring_elements 0.92379
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21987
fixed_packages
0
url pkg:deb/debian/virtualbox@7.0.8-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.0.8-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.0.8-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2023-21987
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8n1x-aejs-z7f2
104
url VCID-8n55-mekz-tfcq
vulnerability_id VCID-8n55-mekz-tfcq
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2944
reference_id
reference_type
scores
0
value 0.00139
scoring_system epss
scoring_elements 0.33753
published_at 2026-04-01T12:55:00Z
1
value 0.00139
scoring_system epss
scoring_elements 0.34055
published_at 2026-04-09T12:55:00Z
2
value 0.00139
scoring_system epss
scoring_elements 0.34054
published_at 2026-04-11T12:55:00Z
3
value 0.00139
scoring_system epss
scoring_elements 0.34011
published_at 2026-04-12T12:55:00Z
4
value 0.00139
scoring_system epss
scoring_elements 0.33987
published_at 2026-04-13T12:55:00Z
5
value 0.00139
scoring_system epss
scoring_elements 0.34021
published_at 2026-04-16T12:55:00Z
6
value 0.00139
scoring_system epss
scoring_elements 0.34009
published_at 2026-04-18T12:55:00Z
7
value 0.00139
scoring_system epss
scoring_elements 0.3409
published_at 2026-04-02T12:55:00Z
8
value 0.00139
scoring_system epss
scoring_elements 0.34122
published_at 2026-04-04T12:55:00Z
9
value 0.00139
scoring_system epss
scoring_elements 0.33982
published_at 2026-04-07T12:55:00Z
10
value 0.00139
scoring_system epss
scoring_elements 0.34024
published_at 2026-04-08T12:55:00Z
11
value 0.00226
scoring_system epss
scoring_elements 0.45321
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2944
1
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:49Z/
url http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
2
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
3
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-2944
reference_id CVE-2019-2944
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
1
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-2944
4
reference_url https://security.gentoo.org/glsa/202004-02
reference_id GLSA-202004-02
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:49Z/
url https://security.gentoo.org/glsa/202004-02
5
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:14:49Z/
url https://security.gentoo.org/glsa/202101-09
fixed_packages
0
url pkg:deb/debian/virtualbox@6.0.14-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.0.14-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.0.14-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2019-2944
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8n55-mekz-tfcq
105
url VCID-8ndb-ms9z-ffe3
vulnerability_id VCID-8ndb-ms9z-ffe3
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2687
reference_id
reference_type
scores
0
value 0.00178
scoring_system epss
scoring_elements 0.39267
published_at 2026-04-21T12:55:00Z
1
value 0.00178
scoring_system epss
scoring_elements 0.39366
published_at 2026-04-02T12:55:00Z
2
value 0.00178
scoring_system epss
scoring_elements 0.39382
published_at 2026-04-16T12:55:00Z
3
value 0.00178
scoring_system epss
scoring_elements 0.39353
published_at 2026-04-18T12:55:00Z
4
value 0.00178
scoring_system epss
scoring_elements 0.39179
published_at 2026-04-01T12:55:00Z
5
value 0.00178
scoring_system epss
scoring_elements 0.39389
published_at 2026-04-04T12:55:00Z
6
value 0.00178
scoring_system epss
scoring_elements 0.39303
published_at 2026-04-07T12:55:00Z
7
value 0.00178
scoring_system epss
scoring_elements 0.39358
published_at 2026-04-08T12:55:00Z
8
value 0.00178
scoring_system epss
scoring_elements 0.39375
published_at 2026-04-09T12:55:00Z
9
value 0.00178
scoring_system epss
scoring_elements 0.39387
published_at 2026-04-11T12:55:00Z
10
value 0.00178
scoring_system epss
scoring_elements 0.39348
published_at 2026-04-12T12:55:00Z
11
value 0.00178
scoring_system epss
scoring_elements 0.39329
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2687
1
reference_url http://www.securityfocus.com/bid/102691
reference_id 102691
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:07Z/
url http://www.securityfocus.com/bid/102691
2
reference_url http://www.securitytracker.com/id/1040202
reference_id 1040202
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:07Z/
url http://www.securitytracker.com/id/1040202
3
reference_url https://security.gentoo.org/glsa/201802-01
reference_id GLSA-201802-01
reference_type
scores
url https://security.gentoo.org/glsa/201802-01
fixed_packages
0
url pkg:deb/debian/virtualbox@5.2.6-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.2.6-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.6-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2018-2687
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8ndb-ms9z-ffe3
106
url VCID-8p2y-n23g-77bn
vulnerability_id VCID-8p2y-n23g-77bn
summary Multiple vulnerabilities have been discovered in Oracle VirtualBox, the worst of which could lead to privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22100
reference_id
reference_type
scores
0
value 0.00168
scoring_system epss
scoring_elements 0.37889
published_at 2026-04-21T12:55:00Z
1
value 0.00168
scoring_system epss
scoring_elements 0.38004
published_at 2026-04-02T12:55:00Z
2
value 0.00168
scoring_system epss
scoring_elements 0.3803
published_at 2026-04-04T12:55:00Z
3
value 0.00168
scoring_system epss
scoring_elements 0.37909
published_at 2026-04-07T12:55:00Z
4
value 0.00168
scoring_system epss
scoring_elements 0.37959
published_at 2026-04-08T12:55:00Z
5
value 0.00168
scoring_system epss
scoring_elements 0.37971
published_at 2026-04-16T12:55:00Z
6
value 0.00168
scoring_system epss
scoring_elements 0.37988
published_at 2026-04-11T12:55:00Z
7
value 0.00168
scoring_system epss
scoring_elements 0.37951
published_at 2026-04-12T12:55:00Z
8
value 0.00168
scoring_system epss
scoring_elements 0.37926
published_at 2026-04-13T12:55:00Z
9
value 0.00168
scoring_system epss
scoring_elements 0.3795
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22100
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://security.gentoo.org/glsa/202409-11
reference_id GLSA-202409-11
reference_type
scores
url https://security.gentoo.org/glsa/202409-11
fixed_packages
0
url pkg:deb/debian/virtualbox@7.0.12-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.0.12-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.0.12-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2023-22100
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8p2y-n23g-77bn
107
url VCID-8q9q-fs5n-gyfj
vulnerability_id VCID-8q9q-fs5n-gyfj
summary Privilege escalation via emulated floppy disk drive
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3456.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3456.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-3456
reference_id
reference_type
scores
0
value 0.32263
scoring_system epss
scoring_elements 0.96809
published_at 2026-04-01T12:55:00Z
1
value 0.32263
scoring_system epss
scoring_elements 0.96816
published_at 2026-04-02T12:55:00Z
2
value 0.32263
scoring_system epss
scoring_elements 0.96841
published_at 2026-04-16T12:55:00Z
3
value 0.32263
scoring_system epss
scoring_elements 0.96845
published_at 2026-04-18T12:55:00Z
4
value 0.32263
scoring_system epss
scoring_elements 0.96848
published_at 2026-04-21T12:55:00Z
5
value 0.36084
scoring_system epss
scoring_elements 0.97092
published_at 2026-04-11T12:55:00Z
6
value 0.36084
scoring_system epss
scoring_elements 0.97093
published_at 2026-04-12T12:55:00Z
7
value 0.36084
scoring_system epss
scoring_elements 0.97094
published_at 2026-04-13T12:55:00Z
8
value 0.36084
scoring_system epss
scoring_elements 0.97079
published_at 2026-04-07T12:55:00Z
9
value 0.36084
scoring_system epss
scoring_elements 0.97088
published_at 2026-04-08T12:55:00Z
10
value 0.36084
scoring_system epss
scoring_elements 0.97089
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-3456
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9718
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9718
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1779
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2756
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2756
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3456
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3456
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1218611
reference_id 1218611
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1218611
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=785424
reference_id 785424
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=785424
8
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/37053.c
reference_id CVE-2015-3456;OSVDB-122072
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/37053.c
9
reference_url https://marc.info/?l=oss-security&m=143155206320935&w=2
reference_id CVE-2015-3456;OSVDB-122072
reference_type exploit
scores
url https://marc.info/?l=oss-security&m=143155206320935&w=2
10
reference_url https://security.gentoo.org/glsa/201602-01
reference_id GLSA-201602-01
reference_type
scores
url https://security.gentoo.org/glsa/201602-01
11
reference_url https://security.gentoo.org/glsa/201604-03
reference_id GLSA-201604-03
reference_type
scores
url https://security.gentoo.org/glsa/201604-03
12
reference_url https://security.gentoo.org/glsa/201612-27
reference_id GLSA-201612-27
reference_type
scores
url https://security.gentoo.org/glsa/201612-27
13
reference_url https://access.redhat.com/errata/RHSA-2015:0998
reference_id RHSA-2015:0998
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0998
14
reference_url https://access.redhat.com/errata/RHSA-2015:0999
reference_id RHSA-2015:0999
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0999
15
reference_url https://access.redhat.com/errata/RHSA-2015:1000
reference_id RHSA-2015:1000
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1000
16
reference_url https://access.redhat.com/errata/RHSA-2015:1001
reference_id RHSA-2015:1001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1001
17
reference_url https://access.redhat.com/errata/RHSA-2015:1002
reference_id RHSA-2015:1002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1002
18
reference_url https://access.redhat.com/errata/RHSA-2015:1003
reference_id RHSA-2015:1003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1003
19
reference_url https://access.redhat.com/errata/RHSA-2015:1004
reference_id RHSA-2015:1004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1004
20
reference_url https://access.redhat.com/errata/RHSA-2015:1011
reference_id RHSA-2015:1011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1011
21
reference_url https://access.redhat.com/errata/RHSA-2015:1031
reference_id RHSA-2015:1031
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1031
22
reference_url https://usn.ubuntu.com/2608-1/
reference_id USN-2608-1
reference_type
scores
url https://usn.ubuntu.com/2608-1/
23
reference_url https://xenbits.xen.org/xsa/advisory-133.html
reference_id XSA-133
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-133.html
fixed_packages
0
url pkg:deb/debian/virtualbox@4.3.28-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@4.3.28-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@4.3.28-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2015-3456
risk_score 0.6
exploitability 2.0
weighted_severity 0.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8q9q-fs5n-gyfj
108
url VCID-8vpe-4asg-bqaa
vulnerability_id VCID-8vpe-4asg-bqaa
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-3295
reference_id
reference_type
scores
0
value 0.11289
scoring_system epss
scoring_elements 0.935
published_at 2026-04-02T12:55:00Z
1
value 0.11289
scoring_system epss
scoring_elements 0.93556
published_at 2026-04-21T12:55:00Z
2
value 0.11289
scoring_system epss
scoring_elements 0.93543
published_at 2026-04-16T12:55:00Z
3
value 0.11289
scoring_system epss
scoring_elements 0.93549
published_at 2026-04-18T12:55:00Z
4
value 0.11289
scoring_system epss
scoring_elements 0.93491
published_at 2026-04-01T12:55:00Z
5
value 0.11289
scoring_system epss
scoring_elements 0.93508
published_at 2026-04-07T12:55:00Z
6
value 0.11289
scoring_system epss
scoring_elements 0.93516
published_at 2026-04-08T12:55:00Z
7
value 0.11289
scoring_system epss
scoring_elements 0.93519
published_at 2026-04-09T12:55:00Z
8
value 0.11289
scoring_system epss
scoring_elements 0.93524
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-3295
1
reference_url http://www.securitytracker.com/id/1041887
reference_id 1041887
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:15:53Z/
url http://www.securitytracker.com/id/1041887
2
reference_url http://www.securityfocus.com/bid/105619
reference_id 105619
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:15:53Z/
url http://www.securityfocus.com/bid/105619
fixed_packages
0
url pkg:deb/debian/virtualbox@5.2.20-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.2.20-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.20-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2018-3295
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8vpe-4asg-bqaa
109
url VCID-8yh6-4cvt-uufn
vulnerability_id VCID-8yh6-4cvt-uufn
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-3031
reference_id
reference_type
scores
0
value 0.00123
scoring_system epss
scoring_elements 0.31468
published_at 2026-04-21T12:55:00Z
1
value 0.00127
scoring_system epss
scoring_elements 0.32023
published_at 2026-04-07T12:55:00Z
2
value 0.00127
scoring_system epss
scoring_elements 0.32103
published_at 2026-04-09T12:55:00Z
3
value 0.00127
scoring_system epss
scoring_elements 0.32107
published_at 2026-04-11T12:55:00Z
4
value 0.00127
scoring_system epss
scoring_elements 0.32068
published_at 2026-04-12T12:55:00Z
5
value 0.00127
scoring_system epss
scoring_elements 0.32037
published_at 2026-04-13T12:55:00Z
6
value 0.00127
scoring_system epss
scoring_elements 0.32071
published_at 2026-04-16T12:55:00Z
7
value 0.00127
scoring_system epss
scoring_elements 0.32048
published_at 2026-04-18T12:55:00Z
8
value 0.00127
scoring_system epss
scoring_elements 0.32161
published_at 2026-04-02T12:55:00Z
9
value 0.00127
scoring_system epss
scoring_elements 0.322
published_at 2026-04-04T12:55:00Z
10
value 0.00127
scoring_system epss
scoring_elements 0.32034
published_at 2026-04-01T12:55:00Z
11
value 0.00127
scoring_system epss
scoring_elements 0.32074
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-3031
1
reference_url https://www.zerodayinitiative.com/advisories/ZDI-19-918/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:07Z/
url https://www.zerodayinitiative.com/advisories/ZDI-19-918/
2
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:07Z/
url http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
3
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-3031
reference_id CVE-2019-3031
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:N
1
value 6.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2019-3031
5
reference_url https://security.gentoo.org/glsa/202004-02
reference_id GLSA-202004-02
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:07Z/
url https://security.gentoo.org/glsa/202004-02
6
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:07Z/
url https://security.gentoo.org/glsa/202101-09
fixed_packages
0
url pkg:deb/debian/virtualbox@6.0.14-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.0.14-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.0.14-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2019-3031
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8yh6-4cvt-uufn
110
url VCID-92va-dj65-8qea
vulnerability_id VCID-92va-dj65-8qea
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2703
reference_id
reference_type
scores
0
value 0.00151
scoring_system epss
scoring_elements 0.35664
published_at 2026-04-21T12:55:00Z
1
value 0.00151
scoring_system epss
scoring_elements 0.35769
published_at 2026-04-02T12:55:00Z
2
value 0.00151
scoring_system epss
scoring_elements 0.35753
published_at 2026-04-11T12:55:00Z
3
value 0.00151
scoring_system epss
scoring_elements 0.35709
published_at 2026-04-12T12:55:00Z
4
value 0.00151
scoring_system epss
scoring_elements 0.35685
published_at 2026-04-13T12:55:00Z
5
value 0.00151
scoring_system epss
scoring_elements 0.35726
published_at 2026-04-16T12:55:00Z
6
value 0.00151
scoring_system epss
scoring_elements 0.35714
published_at 2026-04-18T12:55:00Z
7
value 0.00151
scoring_system epss
scoring_elements 0.35573
published_at 2026-04-01T12:55:00Z
8
value 0.00151
scoring_system epss
scoring_elements 0.35795
published_at 2026-04-04T12:55:00Z
9
value 0.00151
scoring_system epss
scoring_elements 0.35675
published_at 2026-04-07T12:55:00Z
10
value 0.00151
scoring_system epss
scoring_elements 0.35721
published_at 2026-04-08T12:55:00Z
11
value 0.00151
scoring_system epss
scoring_elements 0.35744
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2703
1
reference_url https://security.gentoo.org/glsa/202004-02
reference_id GLSA-202004-02
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:01:33Z/
url https://security.gentoo.org/glsa/202004-02
2
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:01:33Z/
url https://security.gentoo.org/glsa/202101-09
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.2-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.2-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.2-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2020-2703
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-92va-dj65-8qea
111
url VCID-9363-pb9n-z3cj
vulnerability_id VCID-9363-pb9n-z3cj
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-0406
reference_id
reference_type
scores
0
value 0.00059
scoring_system epss
scoring_elements 0.18474
published_at 2026-04-01T12:55:00Z
1
value 0.00059
scoring_system epss
scoring_elements 0.18619
published_at 2026-04-02T12:55:00Z
2
value 0.00059
scoring_system epss
scoring_elements 0.18674
published_at 2026-04-04T12:55:00Z
3
value 0.00059
scoring_system epss
scoring_elements 0.18388
published_at 2026-04-07T12:55:00Z
4
value 0.00059
scoring_system epss
scoring_elements 0.1847
published_at 2026-04-08T12:55:00Z
5
value 0.00059
scoring_system epss
scoring_elements 0.18522
published_at 2026-04-09T12:55:00Z
6
value 0.00059
scoring_system epss
scoring_elements 0.18523
published_at 2026-04-11T12:55:00Z
7
value 0.00059
scoring_system epss
scoring_elements 0.18475
published_at 2026-04-12T12:55:00Z
8
value 0.00059
scoring_system epss
scoring_elements 0.18424
published_at 2026-04-13T12:55:00Z
9
value 0.00059
scoring_system epss
scoring_elements 0.18368
published_at 2026-04-16T12:55:00Z
10
value 0.00059
scoring_system epss
scoring_elements 0.18381
published_at 2026-04-18T12:55:00Z
11
value 0.00059
scoring_system epss
scoring_elements 0.18405
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-0406
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5892
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5892
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0404
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0404
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0406
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0406
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0407
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0407
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=735410
reference_id 735410
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=735410
6
reference_url https://security.gentoo.org/glsa/201401-13
reference_id GLSA-201401-13
reference_type
scores
url https://security.gentoo.org/glsa/201401-13
fixed_packages
0
url pkg:deb/debian/virtualbox@4.3.6-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@4.3.6-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@4.3.6-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2014-0406
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9363-pb9n-z3cj
112
url VCID-94ka-m2fz-hqak
vulnerability_id VCID-94ka-m2fz-hqak
summary Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 7.0.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21109
reference_id
reference_type
scores
0
value 0.00392
scoring_system epss
scoring_elements 0.60237
published_at 2026-04-21T12:55:00Z
1
value 0.00392
scoring_system epss
scoring_elements 0.60242
published_at 2026-04-16T12:55:00Z
2
value 0.00392
scoring_system epss
scoring_elements 0.6025
published_at 2026-04-18T12:55:00Z
3
value 0.00392
scoring_system epss
scoring_elements 0.60155
published_at 2026-04-02T12:55:00Z
4
value 0.00392
scoring_system epss
scoring_elements 0.60179
published_at 2026-04-04T12:55:00Z
5
value 0.00392
scoring_system epss
scoring_elements 0.60149
published_at 2026-04-07T12:55:00Z
6
value 0.00392
scoring_system epss
scoring_elements 0.60199
published_at 2026-04-08T12:55:00Z
7
value 0.00392
scoring_system epss
scoring_elements 0.60212
published_at 2026-04-09T12:55:00Z
8
value 0.00392
scoring_system epss
scoring_elements 0.60234
published_at 2026-04-11T12:55:00Z
9
value 0.00392
scoring_system epss
scoring_elements 0.6022
published_at 2026-04-12T12:55:00Z
10
value 0.00392
scoring_system epss
scoring_elements 0.60203
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21109
1
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.0.16:*:*:*:*:*:*:*
2
reference_url https://www.oracle.com/security-alerts/cpuapr2024.html
reference_id cpuapr2024.html
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-15T20:04:38Z/
url https://www.oracle.com/security-alerts/cpuapr2024.html
fixed_packages
0
url pkg:deb/debian/virtualbox@7.0.16-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.0.16-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.0.16-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2024-21109
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-94ka-m2fz-hqak
113
url VCID-94zg-371b-qkdp
vulnerability_id VCID-94zg-371b-qkdp
summary Multiple vulnerabilities have been discovered in Oracle Virtualbox, the worst of which could result in root privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2145
reference_id
reference_type
scores
0
value 0.003
scoring_system epss
scoring_elements 0.53332
published_at 2026-04-21T12:55:00Z
1
value 0.003
scoring_system epss
scoring_elements 0.53291
published_at 2026-04-09T12:55:00Z
2
value 0.003
scoring_system epss
scoring_elements 0.53342
published_at 2026-04-11T12:55:00Z
3
value 0.003
scoring_system epss
scoring_elements 0.53326
published_at 2026-04-12T12:55:00Z
4
value 0.003
scoring_system epss
scoring_elements 0.53309
published_at 2026-04-13T12:55:00Z
5
value 0.003
scoring_system epss
scoring_elements 0.53347
published_at 2026-04-16T12:55:00Z
6
value 0.003
scoring_system epss
scoring_elements 0.53352
published_at 2026-04-18T12:55:00Z
7
value 0.003
scoring_system epss
scoring_elements 0.53227
published_at 2026-04-01T12:55:00Z
8
value 0.003
scoring_system epss
scoring_elements 0.53251
published_at 2026-04-02T12:55:00Z
9
value 0.003
scoring_system epss
scoring_elements 0.53277
published_at 2026-04-04T12:55:00Z
10
value 0.003
scoring_system epss
scoring_elements 0.53244
published_at 2026-04-07T12:55:00Z
11
value 0.003
scoring_system epss
scoring_elements 0.53297
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2145
1
reference_url https://security.archlinux.org/ASA-202104-9
reference_id ASA-202104-9
reference_type
scores
url https://security.archlinux.org/ASA-202104-9
2
reference_url https://security.archlinux.org/AVG-1846
reference_id AVG-1846
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1846
3
reference_url https://security.gentoo.org/glsa/202208-36
reference_id GLSA-202208-36
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T18:11:37Z/
url https://security.gentoo.org/glsa/202208-36
4
reference_url https://www.zerodayinitiative.com/advisories/ZDI-21-455/
reference_id ZDI-21-455
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T18:11:37Z/
url https://www.zerodayinitiative.com/advisories/ZDI-21-455/
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.20-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.20-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.20-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2021-2145
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-94zg-371b-qkdp
114
url VCID-96ab-3phb-mqe1
vulnerability_id VCID-96ab-3phb-mqe1
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14700
reference_id
reference_type
scores
0
value 0.00146
scoring_system epss
scoring_elements 0.3487
published_at 2026-04-01T12:55:00Z
1
value 0.00146
scoring_system epss
scoring_elements 0.35068
published_at 2026-04-02T12:55:00Z
2
value 0.00146
scoring_system epss
scoring_elements 0.35052
published_at 2026-04-11T12:55:00Z
3
value 0.00146
scoring_system epss
scoring_elements 0.35016
published_at 2026-04-12T12:55:00Z
4
value 0.00146
scoring_system epss
scoring_elements 0.34993
published_at 2026-04-13T12:55:00Z
5
value 0.00146
scoring_system epss
scoring_elements 0.35034
published_at 2026-04-16T12:55:00Z
6
value 0.00146
scoring_system epss
scoring_elements 0.35019
published_at 2026-04-18T12:55:00Z
7
value 0.00146
scoring_system epss
scoring_elements 0.34973
published_at 2026-04-21T12:55:00Z
8
value 0.00146
scoring_system epss
scoring_elements 0.35095
published_at 2026-04-04T12:55:00Z
9
value 0.00146
scoring_system epss
scoring_elements 0.34975
published_at 2026-04-07T12:55:00Z
10
value 0.00146
scoring_system epss
scoring_elements 0.3502
published_at 2026-04-08T12:55:00Z
11
value 0.00146
scoring_system epss
scoring_elements 0.35048
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14700
1
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:26Z/
url https://security.gentoo.org/glsa/202101-09
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html
reference_id msg00068.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:26Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html
reference_id msg00079.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:26Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html
4
reference_url https://www.zerodayinitiative.com/advisories/ZDI-20-903/
reference_id ZDI-20-903
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:26Z/
url https://www.zerodayinitiative.com/advisories/ZDI-20-903/
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.12-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.12-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.12-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2020-14700
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-96ab-3phb-mqe1
115
url VCID-97tr-vj5r-wubn
vulnerability_id VCID-97tr-vj5r-wubn
summary Unspecified vulnerability in the Oracle VM VirtualBox component before 5.1.4 in Oracle Virtualization allows remote attackers to affect confidentiality and integrity via vectors related to VRDE.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5605
reference_id
reference_type
scores
0
value 0.00217
scoring_system epss
scoring_elements 0.44239
published_at 2026-04-21T12:55:00Z
1
value 0.00217
scoring_system epss
scoring_elements 0.4432
published_at 2026-04-16T12:55:00Z
2
value 0.00217
scoring_system epss
scoring_elements 0.44311
published_at 2026-04-18T12:55:00Z
3
value 0.00217
scoring_system epss
scoring_elements 0.44196
published_at 2026-04-01T12:55:00Z
4
value 0.00217
scoring_system epss
scoring_elements 0.44263
published_at 2026-04-02T12:55:00Z
5
value 0.00217
scoring_system epss
scoring_elements 0.44286
published_at 2026-04-04T12:55:00Z
6
value 0.00217
scoring_system epss
scoring_elements 0.44219
published_at 2026-04-07T12:55:00Z
7
value 0.00217
scoring_system epss
scoring_elements 0.44271
published_at 2026-04-08T12:55:00Z
8
value 0.00217
scoring_system epss
scoring_elements 0.44276
published_at 2026-04-09T12:55:00Z
9
value 0.00217
scoring_system epss
scoring_elements 0.44293
published_at 2026-04-11T12:55:00Z
10
value 0.00217
scoring_system epss
scoring_elements 0.44261
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5605
1
reference_url http://www.securityfocus.com/bid/93685
reference_id 93685
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:44:08Z/
url http://www.securityfocus.com/bid/93685
fixed_packages
0
url pkg:deb/debian/virtualbox@5.1.4-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.1.4-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.1.4-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2016-5605
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-97tr-vj5r-wubn
116
url VCID-98ty-spyd-tka6
vulnerability_id VCID-98ty-spyd-tka6
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are prior to 5.2.24 and prior to 6.0.2. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 7.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H).
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:56:15Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2523
reference_id
reference_type
scores
0
value 0.00136
scoring_system epss
scoring_elements 0.33375
published_at 2026-04-21T12:55:00Z
1
value 0.00136
scoring_system epss
scoring_elements 0.33395
published_at 2026-04-13T12:55:00Z
2
value 0.00136
scoring_system epss
scoring_elements 0.33431
published_at 2026-04-16T12:55:00Z
3
value 0.00136
scoring_system epss
scoring_elements 0.33406
published_at 2026-04-18T12:55:00Z
4
value 0.00136
scoring_system epss
scoring_elements 0.33366
published_at 2026-04-01T12:55:00Z
5
value 0.00136
scoring_system epss
scoring_elements 0.33504
published_at 2026-04-02T12:55:00Z
6
value 0.00136
scoring_system epss
scoring_elements 0.33536
published_at 2026-04-04T12:55:00Z
7
value 0.00136
scoring_system epss
scoring_elements 0.33377
published_at 2026-04-07T12:55:00Z
8
value 0.00136
scoring_system epss
scoring_elements 0.33422
published_at 2026-04-08T12:55:00Z
9
value 0.00136
scoring_system epss
scoring_elements 0.33456
published_at 2026-04-09T12:55:00Z
10
value 0.00136
scoring_system epss
scoring_elements 0.3346
published_at 2026-04-11T12:55:00Z
11
value 0.00136
scoring_system epss
scoring_elements 0.33419
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2523
2
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:56:15Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
3
reference_url http://www.securityfocus.com/bid/106568
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:56:15Z/
url http://www.securityfocus.com/bid/106568
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-2523
reference_id CVE-2019-2523
reference_type
scores
0
value 4.4
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:P/A:P
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-2523
fixed_packages
0
url pkg:deb/debian/virtualbox@5.2.24-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.2.24-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.24-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2019-2523
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-98ty-spyd-tka6
117
url VCID-9dsa-x4gg-kbg1
vulnerability_id VCID-9dsa-x4gg-kbg1
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are prior to 5.2.24 and prior to 6.0.2. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 5.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:40Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:40Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2448
reference_id
reference_type
scores
0
value 0.00158
scoring_system epss
scoring_elements 0.36578
published_at 2026-04-21T12:55:00Z
1
value 0.00158
scoring_system epss
scoring_elements 0.36724
published_at 2026-04-02T12:55:00Z
2
value 0.00158
scoring_system epss
scoring_elements 0.3661
published_at 2026-04-13T12:55:00Z
3
value 0.00158
scoring_system epss
scoring_elements 0.36656
published_at 2026-04-16T12:55:00Z
4
value 0.00158
scoring_system epss
scoring_elements 0.36638
published_at 2026-04-18T12:55:00Z
5
value 0.00158
scoring_system epss
scoring_elements 0.36553
published_at 2026-04-01T12:55:00Z
6
value 0.00158
scoring_system epss
scoring_elements 0.36756
published_at 2026-04-04T12:55:00Z
7
value 0.00158
scoring_system epss
scoring_elements 0.36592
published_at 2026-04-07T12:55:00Z
8
value 0.00158
scoring_system epss
scoring_elements 0.36645
published_at 2026-04-08T12:55:00Z
9
value 0.00158
scoring_system epss
scoring_elements 0.36662
published_at 2026-04-09T12:55:00Z
10
value 0.00158
scoring_system epss
scoring_elements 0.36671
published_at 2026-04-11T12:55:00Z
11
value 0.00158
scoring_system epss
scoring_elements 0.36636
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2448
3
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:40Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
4
reference_url http://www.securityfocus.com/bid/106568
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:40Z/
url http://www.securityfocus.com/bid/106568
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-2448
reference_id CVE-2019-2448
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:N
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2019-2448
fixed_packages
0
url pkg:deb/debian/virtualbox@5.2.24-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.2.24-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.24-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2019-2448
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9dsa-x4gg-kbg1
118
url VCID-9f1p-jj8b-r3fn
vulnerability_id VCID-9f1p-jj8b-r3fn
summary Multiple vulnerabilities have been discovered in Oracle Virtualbox, the worst of which could result in root privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2454
reference_id
reference_type
scores
0
value 0.00239
scoring_system epss
scoring_elements 0.47028
published_at 2026-04-18T12:55:00Z
1
value 0.00239
scoring_system epss
scoring_elements 0.46997
published_at 2026-04-11T12:55:00Z
2
value 0.00239
scoring_system epss
scoring_elements 0.46971
published_at 2026-04-12T12:55:00Z
3
value 0.00239
scoring_system epss
scoring_elements 0.46977
published_at 2026-04-21T12:55:00Z
4
value 0.00239
scoring_system epss
scoring_elements 0.47033
published_at 2026-04-16T12:55:00Z
5
value 0.00239
scoring_system epss
scoring_elements 0.4692
published_at 2026-04-01T12:55:00Z
6
value 0.00239
scoring_system epss
scoring_elements 0.46957
published_at 2026-04-02T12:55:00Z
7
value 0.00239
scoring_system epss
scoring_elements 0.46974
published_at 2026-04-04T12:55:00Z
8
value 0.00239
scoring_system epss
scoring_elements 0.46921
published_at 2026-04-07T12:55:00Z
9
value 0.00239
scoring_system epss
scoring_elements 0.46975
published_at 2026-04-08T12:55:00Z
10
value 0.00239
scoring_system epss
scoring_elements 0.46973
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2454
1
reference_url https://security.archlinux.org/ASA-202107-52
reference_id ASA-202107-52
reference_type
scores
url https://security.archlinux.org/ASA-202107-52
2
reference_url https://security.archlinux.org/AVG-2187
reference_id AVG-2187
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2187
3
reference_url https://security.gentoo.org/glsa/202208-36
reference_id GLSA-202208-36
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-25T19:25:21Z/
url https://security.gentoo.org/glsa/202208-36
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.26-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.26-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.26-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2021-2454
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9f1p-jj8b-r3fn
119
url VCID-9hwa-xmhr-nqf9
vulnerability_id VCID-9hwa-xmhr-nqf9
summary Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 7.0.20. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. Note: This vulnerability applies to Linux hosts only. CVSS 3.1 Base Score 5.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21161
reference_id
reference_type
scores
0
value 0.00078
scoring_system epss
scoring_elements 0.23227
published_at 2026-04-21T12:55:00Z
1
value 0.00078
scoring_system epss
scoring_elements 0.23253
published_at 2026-04-16T12:55:00Z
2
value 0.00078
scoring_system epss
scoring_elements 0.23247
published_at 2026-04-18T12:55:00Z
3
value 0.00078
scoring_system epss
scoring_elements 0.2336
published_at 2026-04-02T12:55:00Z
4
value 0.00078
scoring_system epss
scoring_elements 0.234
published_at 2026-04-04T12:55:00Z
5
value 0.00078
scoring_system epss
scoring_elements 0.23188
published_at 2026-04-07T12:55:00Z
6
value 0.00078
scoring_system epss
scoring_elements 0.23261
published_at 2026-04-08T12:55:00Z
7
value 0.00078
scoring_system epss
scoring_elements 0.23311
published_at 2026-04-09T12:55:00Z
8
value 0.00078
scoring_system epss
scoring_elements 0.23332
published_at 2026-04-11T12:55:00Z
9
value 0.00078
scoring_system epss
scoring_elements 0.23294
published_at 2026-04-12T12:55:00Z
10
value 0.00078
scoring_system epss
scoring_elements 0.23238
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21161
1
reference_url https://www.oracle.com/security-alerts/cpujul2024.html
reference_id cpujul2024.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-23T16:25:51Z/
url https://www.oracle.com/security-alerts/cpujul2024.html
fixed_packages
0
url pkg:deb/debian/virtualbox@7.0.20-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.0.20-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.0.20-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2024-21161
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9hwa-xmhr-nqf9
120
url VCID-9mq9-4pj2-3ygp
vulnerability_id VCID-9mq9-4pj2-3ygp
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are prior to 5.2.24 and prior to 6.0.2. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 5.6 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N).
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:01:55Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:01:55Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2525
reference_id
reference_type
scores
0
value 0.11022
scoring_system epss
scoring_elements 0.93462
published_at 2026-04-21T12:55:00Z
1
value 0.11022
scoring_system epss
scoring_elements 0.93406
published_at 2026-04-02T12:55:00Z
2
value 0.11022
scoring_system epss
scoring_elements 0.93432
published_at 2026-04-13T12:55:00Z
3
value 0.11022
scoring_system epss
scoring_elements 0.93451
published_at 2026-04-16T12:55:00Z
4
value 0.11022
scoring_system epss
scoring_elements 0.93456
published_at 2026-04-18T12:55:00Z
5
value 0.11022
scoring_system epss
scoring_elements 0.93398
published_at 2026-04-01T12:55:00Z
6
value 0.11022
scoring_system epss
scoring_elements 0.93414
published_at 2026-04-07T12:55:00Z
7
value 0.11022
scoring_system epss
scoring_elements 0.93422
published_at 2026-04-08T12:55:00Z
8
value 0.11022
scoring_system epss
scoring_elements 0.93425
published_at 2026-04-09T12:55:00Z
9
value 0.11022
scoring_system epss
scoring_elements 0.93431
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2525
3
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:01:55Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
4
reference_url http://www.securityfocus.com/bid/106568
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:01:55Z/
url http://www.securityfocus.com/bid/106568
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-2525
reference_id CVE-2019-2525
reference_type
scores
0
value 1.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:N/A:N
1
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2019-2525
fixed_packages
0
url pkg:deb/debian/virtualbox@5.2.24-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.2.24-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.24-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2019-2525
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9mq9-4pj2-3ygp
121
url VCID-9nhh-x1t1-uqcq
vulnerability_id VCID-9nhh-x1t1-uqcq
summary Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. Note: This vulnerability applies to Windows VMs only. CVSS 3.1 Base Score 7.1 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-21986
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.05659
published_at 2026-04-21T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.05497
published_at 2026-04-18T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.05489
published_at 2026-04-02T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.05523
published_at 2026-04-07T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.0556
published_at 2026-04-08T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.05584
published_at 2026-04-09T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05557
published_at 2026-04-11T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05544
published_at 2026-04-12T12:55:00Z
8
value 0.00021
scoring_system epss
scoring_elements 0.05537
published_at 2026-04-13T12:55:00Z
9
value 0.00021
scoring_system epss
scoring_elements 0.05487
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-21986
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126117
reference_id 1126117
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126117
2
reference_url https://www.oracle.com/security-alerts/cpujan2026.html
reference_id cpujan2026.html
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-23T18:57:14Z/
url https://www.oracle.com/security-alerts/cpujan2026.html
fixed_packages
0
url pkg:deb/debian/virtualbox@7.2.6-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2026-21986
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9nhh-x1t1-uqcq
122
url VCID-9nw5-sjhs-qkcd
vulnerability_id VCID-9nw5-sjhs-qkcd
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.0.38 and Prior to 5.1.20. Easily "exploitable" vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3563
reference_id
reference_type
scores
0
value 0.00212
scoring_system epss
scoring_elements 0.437
published_at 2026-04-21T12:55:00Z
1
value 0.00212
scoring_system epss
scoring_elements 0.43745
published_at 2026-04-09T12:55:00Z
2
value 0.00212
scoring_system epss
scoring_elements 0.43764
published_at 2026-04-11T12:55:00Z
3
value 0.00212
scoring_system epss
scoring_elements 0.43715
published_at 2026-04-13T12:55:00Z
4
value 0.00212
scoring_system epss
scoring_elements 0.43777
published_at 2026-04-16T12:55:00Z
5
value 0.00212
scoring_system epss
scoring_elements 0.43768
published_at 2026-04-18T12:55:00Z
6
value 0.00212
scoring_system epss
scoring_elements 0.43677
published_at 2026-04-01T12:55:00Z
7
value 0.00212
scoring_system epss
scoring_elements 0.43732
published_at 2026-04-12T12:55:00Z
8
value 0.00212
scoring_system epss
scoring_elements 0.43757
published_at 2026-04-04T12:55:00Z
9
value 0.00212
scoring_system epss
scoring_elements 0.43691
published_at 2026-04-07T12:55:00Z
10
value 0.00212
scoring_system epss
scoring_elements 0.43741
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3563
1
reference_url https://www.exploit-db.com/exploits/41908/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:17Z/
url https://www.exploit-db.com/exploits/41908/
2
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:17Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
3
reference_url http://www.securityfocus.com/bid/97732
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:17Z/
url http://www.securityfocus.com/bid/97732
4
reference_url http://www.securitytracker.com/id/1038288
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:17Z/
url http://www.securitytracker.com/id/1038288
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
6
reference_url https://bugs.chromium.org/p/project-zero/issues/detail?id=1103
reference_id CVE-2017-3563
reference_type exploit
scores
url https://bugs.chromium.org/p/project-zero/issues/detail?id=1103
7
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows_x86-64/local/41908.txt
reference_id CVE-2017-3563
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows_x86-64/local/41908.txt
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-3563
reference_id CVE-2017-3563
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-3563
fixed_packages
0
url pkg:deb/debian/virtualbox@5.1.20-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.1.20-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.1.20-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2017-3563
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9nw5-sjhs-qkcd
123
url VCID-9qg2-42zm-muh3
vulnerability_id VCID-9qg2-42zm-muh3
summary Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is 7.1.10. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-53028
reference_id
reference_type
scores
0
value 0.00038
scoring_system epss
scoring_elements 0.11378
published_at 2026-04-02T12:55:00Z
1
value 0.00038
scoring_system epss
scoring_elements 0.11434
published_at 2026-04-04T12:55:00Z
2
value 0.00038
scoring_system epss
scoring_elements 0.11226
published_at 2026-04-07T12:55:00Z
3
value 0.00038
scoring_system epss
scoring_elements 0.11306
published_at 2026-04-08T12:55:00Z
4
value 0.00038
scoring_system epss
scoring_elements 0.11361
published_at 2026-04-09T12:55:00Z
5
value 0.00039
scoring_system epss
scoring_elements 0.1147
published_at 2026-04-18T12:55:00Z
6
value 0.00039
scoring_system epss
scoring_elements 0.11596
published_at 2026-04-21T12:55:00Z
7
value 0.00039
scoring_system epss
scoring_elements 0.11669
published_at 2026-04-11T12:55:00Z
8
value 0.00039
scoring_system epss
scoring_elements 0.11632
published_at 2026-04-12T12:55:00Z
9
value 0.00039
scoring_system epss
scoring_elements 0.11606
published_at 2026-04-13T12:55:00Z
10
value 0.00039
scoring_system epss
scoring_elements 0.11468
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-53028
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109373
reference_id 1109373
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109373
2
reference_url https://www.oracle.com/security-alerts/cpujul2025.html
reference_id cpujul2025.html
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-16T03:56:08Z/
url https://www.oracle.com/security-alerts/cpujul2025.html
fixed_packages
0
url pkg:deb/debian/virtualbox@7.1.12-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.1.12-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.1.12-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2025-53028
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9qg2-42zm-muh3
124
url VCID-9tnw-s9e9-1ugm
vulnerability_id VCID-9tnw-s9e9-1ugm
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2876
reference_id
reference_type
scores
0
value 0.00151
scoring_system epss
scoring_elements 0.35886
published_at 2026-04-02T12:55:00Z
1
value 0.00151
scoring_system epss
scoring_elements 0.35745
published_at 2026-04-21T12:55:00Z
2
value 0.00151
scoring_system epss
scoring_elements 0.35793
published_at 2026-04-18T12:55:00Z
3
value 0.00151
scoring_system epss
scoring_elements 0.35689
published_at 2026-04-01T12:55:00Z
4
value 0.00151
scoring_system epss
scoring_elements 0.35916
published_at 2026-04-04T12:55:00Z
5
value 0.00151
scoring_system epss
scoring_elements 0.35747
published_at 2026-04-07T12:55:00Z
6
value 0.00151
scoring_system epss
scoring_elements 0.35797
published_at 2026-04-08T12:55:00Z
7
value 0.00151
scoring_system epss
scoring_elements 0.3582
published_at 2026-04-09T12:55:00Z
8
value 0.00151
scoring_system epss
scoring_elements 0.35828
published_at 2026-04-11T12:55:00Z
9
value 0.00151
scoring_system epss
scoring_elements 0.35787
published_at 2026-04-12T12:55:00Z
10
value 0.00151
scoring_system epss
scoring_elements 0.35765
published_at 2026-04-13T12:55:00Z
11
value 0.00151
scoring_system epss
scoring_elements 0.35805
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2876
1
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
reference_id cpujul2019-5072835.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:15:56Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
2
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:15:56Z/
url https://security.gentoo.org/glsa/202101-09
fixed_packages
0
url pkg:deb/debian/virtualbox@6.0.10-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.0.10-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.0.10-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2019-2876
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9tnw-s9e9-1ugm
125
url VCID-9v12-3puz-dfee
vulnerability_id VCID-9v12-3puz-dfee
summary Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.12 and 7.2.2. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-62641
reference_id
reference_type
scores
0
value 0.00031
scoring_system epss
scoring_elements 0.08973
published_at 2026-04-21T12:55:00Z
1
value 0.00031
scoring_system epss
scoring_elements 0.08825
published_at 2026-04-18T12:55:00Z
2
value 0.00031
scoring_system epss
scoring_elements 0.08919
published_at 2026-04-02T12:55:00Z
3
value 0.00031
scoring_system epss
scoring_elements 0.08969
published_at 2026-04-04T12:55:00Z
4
value 0.00031
scoring_system epss
scoring_elements 0.08899
published_at 2026-04-07T12:55:00Z
5
value 0.00031
scoring_system epss
scoring_elements 0.08978
published_at 2026-04-08T12:55:00Z
6
value 0.00031
scoring_system epss
scoring_elements 0.09009
published_at 2026-04-11T12:55:00Z
7
value 0.00031
scoring_system epss
scoring_elements 0.08972
published_at 2026-04-12T12:55:00Z
8
value 0.00031
scoring_system epss
scoring_elements 0.08959
published_at 2026-04-13T12:55:00Z
9
value 0.00031
scoring_system epss
scoring_elements 0.0885
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-62641
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118542
reference_id 1118542
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118542
2
reference_url https://www.oracle.com/security-alerts/cpuoct2025.html
reference_id cpuoct2025.html
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-23T03:55:33Z/
url https://www.oracle.com/security-alerts/cpuoct2025.html
fixed_packages
0
url pkg:deb/debian/virtualbox@7.2.4-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.2.4-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.4-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2025-62641
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9v12-3puz-dfee
126
url VCID-9xpz-a6pw-mqbh
vulnerability_id VCID-9xpz-a6pw-mqbh
summary Unspecified vulnerability in the VirtualBox component in Oracle Virtualization 4.0, 4.1, and 4.2 allows local users to affect integrity and availability via unknown vectors related to Core. NOTE: The previous information was obtained from the January 2013 Oracle CPU. Oracle has not commented on claims from another vendor that this issue is related to an incorrect comparison in the vga_draw_text function in Devices/Graphics/DevVGA.cpp, which can cause VirtualBox to "draw more lines than necessary."
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2013-02/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-02/msg00000.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-0420
reference_id
reference_type
scores
0
value 0.00112
scoring_system epss
scoring_elements 0.2957
published_at 2026-04-21T12:55:00Z
1
value 0.00112
scoring_system epss
scoring_elements 0.29695
published_at 2026-04-01T12:55:00Z
2
value 0.00112
scoring_system epss
scoring_elements 0.29747
published_at 2026-04-02T12:55:00Z
3
value 0.00112
scoring_system epss
scoring_elements 0.29793
published_at 2026-04-04T12:55:00Z
4
value 0.00112
scoring_system epss
scoring_elements 0.29612
published_at 2026-04-07T12:55:00Z
5
value 0.00112
scoring_system epss
scoring_elements 0.29675
published_at 2026-04-08T12:55:00Z
6
value 0.00112
scoring_system epss
scoring_elements 0.29712
published_at 2026-04-09T12:55:00Z
7
value 0.00112
scoring_system epss
scoring_elements 0.29715
published_at 2026-04-11T12:55:00Z
8
value 0.00112
scoring_system epss
scoring_elements 0.29671
published_at 2026-04-12T12:55:00Z
9
value 0.00112
scoring_system epss
scoring_elements 0.2962
published_at 2026-04-13T12:55:00Z
10
value 0.00112
scoring_system epss
scoring_elements 0.29639
published_at 2026-04-16T12:55:00Z
11
value 0.00112
scoring_system epss
scoring_elements 0.29614
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-0420
2
reference_url https://bugzilla.novell.com/show_bug.cgi?id=798776
reference_id
reference_type
scores
url https://bugzilla.novell.com/show_bug.cgi?id=798776
3
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15763
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15763
4
reference_url https://www.virtualbox.org/changeset/44055/vbox
reference_id
reference_type
scores
url https://www.virtualbox.org/changeset/44055/vbox
5
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
6
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698292
reference_id 698292
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698292
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:virtualization:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:virtualization:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:virtualization:4.0:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:virtualization:4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:virtualization:4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:virtualization:4.1:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:virtualization:4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:virtualization:4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:virtualization:4.2:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-0420
reference_id CVE-2013-0420
reference_type
scores
0
value 2.4
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:S/C:N/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-0420
fixed_packages
0
url pkg:deb/debian/virtualbox@4.1.18-dfsg-2?distro=sid
purl pkg:deb/debian/virtualbox@4.1.18-dfsg-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@4.1.18-dfsg-2%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2013-0420
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9xpz-a6pw-mqbh
127
url VCID-a99c-5ky1-jbhm
vulnerability_id VCID-a99c-5ky1-jbhm
summary Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.12 and 7.2.2. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-62588
reference_id
reference_type
scores
0
value 0.00027
scoring_system epss
scoring_elements 0.07771
published_at 2026-04-21T12:55:00Z
1
value 0.00027
scoring_system epss
scoring_elements 0.07622
published_at 2026-04-18T12:55:00Z
2
value 0.00027
scoring_system epss
scoring_elements 0.07651
published_at 2026-04-02T12:55:00Z
3
value 0.00027
scoring_system epss
scoring_elements 0.07694
published_at 2026-04-04T12:55:00Z
4
value 0.00027
scoring_system epss
scoring_elements 0.07663
published_at 2026-04-07T12:55:00Z
5
value 0.00027
scoring_system epss
scoring_elements 0.07723
published_at 2026-04-08T12:55:00Z
6
value 0.00027
scoring_system epss
scoring_elements 0.07742
published_at 2026-04-09T12:55:00Z
7
value 0.00027
scoring_system epss
scoring_elements 0.0774
published_at 2026-04-11T12:55:00Z
8
value 0.00027
scoring_system epss
scoring_elements 0.07726
published_at 2026-04-12T12:55:00Z
9
value 0.00027
scoring_system epss
scoring_elements 0.07711
published_at 2026-04-13T12:55:00Z
10
value 0.00027
scoring_system epss
scoring_elements 0.07635
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-62588
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118542
reference_id 1118542
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118542
2
reference_url https://www.oracle.com/security-alerts/cpuoct2025.html
reference_id cpuoct2025.html
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-23T03:55:30Z/
url https://www.oracle.com/security-alerts/cpuoct2025.html
fixed_packages
0
url pkg:deb/debian/virtualbox@7.2.4-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.2.4-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.4-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2025-62588
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a99c-5ky1-jbhm
128
url VCID-ace3-vcfx-fkby
vulnerability_id VCID-ace3-vcfx-fkby
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14694
reference_id
reference_type
scores
0
value 0.00146
scoring_system epss
scoring_elements 0.3487
published_at 2026-04-01T12:55:00Z
1
value 0.00146
scoring_system epss
scoring_elements 0.35068
published_at 2026-04-02T12:55:00Z
2
value 0.00146
scoring_system epss
scoring_elements 0.35052
published_at 2026-04-11T12:55:00Z
3
value 0.00146
scoring_system epss
scoring_elements 0.35016
published_at 2026-04-12T12:55:00Z
4
value 0.00146
scoring_system epss
scoring_elements 0.34993
published_at 2026-04-13T12:55:00Z
5
value 0.00146
scoring_system epss
scoring_elements 0.35034
published_at 2026-04-16T12:55:00Z
6
value 0.00146
scoring_system epss
scoring_elements 0.35019
published_at 2026-04-18T12:55:00Z
7
value 0.00146
scoring_system epss
scoring_elements 0.34973
published_at 2026-04-21T12:55:00Z
8
value 0.00146
scoring_system epss
scoring_elements 0.35095
published_at 2026-04-04T12:55:00Z
9
value 0.00146
scoring_system epss
scoring_elements 0.34975
published_at 2026-04-07T12:55:00Z
10
value 0.00146
scoring_system epss
scoring_elements 0.3502
published_at 2026-04-08T12:55:00Z
11
value 0.00146
scoring_system epss
scoring_elements 0.35048
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14694
1
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:33Z/
url https://security.gentoo.org/glsa/202101-09
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html
reference_id msg00068.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:33Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html
reference_id msg00079.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:33Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html
4
reference_url https://www.zerodayinitiative.com/advisories/ZDI-20-899/
reference_id ZDI-20-899
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:33Z/
url https://www.zerodayinitiative.com/advisories/ZDI-20-899/
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.12-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.12-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.12-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2020-14694
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ace3-vcfx-fkby
129
url VCID-ajb5-u5rp-5bhr
vulnerability_id VCID-ajb5-u5rp-5bhr
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:13Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2958
reference_id
reference_type
scores
0
value 0.00167
scoring_system epss
scoring_elements 0.37743
published_at 2026-04-01T12:55:00Z
1
value 0.00167
scoring_system epss
scoring_elements 0.37892
published_at 2026-04-09T12:55:00Z
2
value 0.00167
scoring_system epss
scoring_elements 0.37907
published_at 2026-04-11T12:55:00Z
3
value 0.00167
scoring_system epss
scoring_elements 0.37871
published_at 2026-04-12T12:55:00Z
4
value 0.00167
scoring_system epss
scoring_elements 0.37846
published_at 2026-04-13T12:55:00Z
5
value 0.00167
scoring_system epss
scoring_elements 0.37893
published_at 2026-04-16T12:55:00Z
6
value 0.00167
scoring_system epss
scoring_elements 0.37873
published_at 2026-04-18T12:55:00Z
7
value 0.00167
scoring_system epss
scoring_elements 0.3781
published_at 2026-04-21T12:55:00Z
8
value 0.00167
scoring_system epss
scoring_elements 0.37926
published_at 2026-04-02T12:55:00Z
9
value 0.00167
scoring_system epss
scoring_elements 0.37951
published_at 2026-04-04T12:55:00Z
10
value 0.00167
scoring_system epss
scoring_elements 0.37829
published_at 2026-04-07T12:55:00Z
11
value 0.00167
scoring_system epss
scoring_elements 0.37879
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2958
2
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:13Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
3
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2958
reference_id CVE-2020-2958
reference_type
scores
0
value 4.4
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:P/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
2
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-2958
6
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:13Z/
url https://security.gentoo.org/glsa/202101-09
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.6-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.6-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.6-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2020-2958
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ajb5-u5rp-5bhr
130
url VCID-akcu-srak-rqcy
vulnerability_id VCID-akcu-srak-rqcy
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.20. Easily exploitable vulnerability allows low privileged attacker with network access via VRDP to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-3294
reference_id
reference_type
scores
0
value 0.0054
scoring_system epss
scoring_elements 0.67575
published_at 2026-04-07T12:55:00Z
1
value 0.0054
scoring_system epss
scoring_elements 0.67641
published_at 2026-04-21T12:55:00Z
2
value 0.0054
scoring_system epss
scoring_elements 0.67615
published_at 2026-04-13T12:55:00Z
3
value 0.0054
scoring_system epss
scoring_elements 0.6765
published_at 2026-04-16T12:55:00Z
4
value 0.0054
scoring_system epss
scoring_elements 0.67539
published_at 2026-04-01T12:55:00Z
5
value 0.0054
scoring_system epss
scoring_elements 0.67597
published_at 2026-04-04T12:55:00Z
6
value 0.0054
scoring_system epss
scoring_elements 0.67626
published_at 2026-04-08T12:55:00Z
7
value 0.0054
scoring_system epss
scoring_elements 0.67639
published_at 2026-04-09T12:55:00Z
8
value 0.0054
scoring_system epss
scoring_elements 0.67662
published_at 2026-04-18T12:55:00Z
9
value 0.0054
scoring_system epss
scoring_elements 0.67648
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-3294
1
reference_url http://www.securitytracker.com/id/1041887
reference_id 1041887
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:15:54Z/
url http://www.securitytracker.com/id/1041887
2
reference_url http://www.securityfocus.com/bid/105624
reference_id 105624
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:15:54Z/
url http://www.securityfocus.com/bid/105624
fixed_packages
0
url pkg:deb/debian/virtualbox@5.2.20-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.2.20-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.20-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2018-3294
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-akcu-srak-rqcy
131
url VCID-am22-e2qp-abgn
vulnerability_id VCID-am22-e2qp-abgn
summary Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-21956
reference_id
reference_type
scores
0
value 0.00042
scoring_system epss
scoring_elements 0.12831
published_at 2026-04-21T12:55:00Z
1
value 0.00042
scoring_system epss
scoring_elements 0.12729
published_at 2026-04-18T12:55:00Z
2
value 0.00042
scoring_system epss
scoring_elements 0.12967
published_at 2026-04-02T12:55:00Z
3
value 0.00042
scoring_system epss
scoring_elements 0.13016
published_at 2026-04-04T12:55:00Z
4
value 0.00042
scoring_system epss
scoring_elements 0.12816
published_at 2026-04-07T12:55:00Z
5
value 0.00042
scoring_system epss
scoring_elements 0.12895
published_at 2026-04-08T12:55:00Z
6
value 0.00042
scoring_system epss
scoring_elements 0.12945
published_at 2026-04-09T12:55:00Z
7
value 0.00042
scoring_system epss
scoring_elements 0.12903
published_at 2026-04-11T12:55:00Z
8
value 0.00042
scoring_system epss
scoring_elements 0.12868
published_at 2026-04-12T12:55:00Z
9
value 0.00042
scoring_system epss
scoring_elements 0.12822
published_at 2026-04-13T12:55:00Z
10
value 0.00042
scoring_system epss
scoring_elements 0.12726
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-21956
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126117
reference_id 1126117
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126117
2
reference_url https://www.oracle.com/security-alerts/cpujan2026.html
reference_id cpujan2026.html
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-22T04:55:39Z/
url https://www.oracle.com/security-alerts/cpujan2026.html
fixed_packages
0
url pkg:deb/debian/virtualbox@7.2.6-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2026-21956
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-am22-e2qp-abgn
132
url VCID-aps4-nm33-kqft
vulnerability_id VCID-aps4-nm33-kqft
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.0.38 and Prior to 5.1.20. Easily "exploitable" vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS 3.0 Base Score 7.9 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3575
reference_id
reference_type
scores
0
value 0.00525
scoring_system epss
scoring_elements 0.67004
published_at 2026-04-21T12:55:00Z
1
value 0.00525
scoring_system epss
scoring_elements 0.67021
published_at 2026-04-11T12:55:00Z
2
value 0.00525
scoring_system epss
scoring_elements 0.67007
published_at 2026-04-12T12:55:00Z
3
value 0.00525
scoring_system epss
scoring_elements 0.66976
published_at 2026-04-13T12:55:00Z
4
value 0.00525
scoring_system epss
scoring_elements 0.67009
published_at 2026-04-16T12:55:00Z
5
value 0.00525
scoring_system epss
scoring_elements 0.67024
published_at 2026-04-18T12:55:00Z
6
value 0.00525
scoring_system epss
scoring_elements 0.66901
published_at 2026-04-01T12:55:00Z
7
value 0.00525
scoring_system epss
scoring_elements 0.66939
published_at 2026-04-02T12:55:00Z
8
value 0.00525
scoring_system epss
scoring_elements 0.66965
published_at 2026-04-04T12:55:00Z
9
value 0.00525
scoring_system epss
scoring_elements 0.6694
published_at 2026-04-07T12:55:00Z
10
value 0.00525
scoring_system epss
scoring_elements 0.66989
published_at 2026-04-08T12:55:00Z
11
value 0.00525
scoring_system epss
scoring_elements 0.67001
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3575
1
reference_url https://www.exploit-db.com/exploits/41906/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:37Z/
url https://www.exploit-db.com/exploits/41906/
2
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:37Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
3
reference_url http://www.securityfocus.com/bid/97755
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:37Z/
url http://www.securityfocus.com/bid/97755
4
reference_url http://www.securitytracker.com/id/1038288
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:37Z/
url http://www.securitytracker.com/id/1038288
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
6
reference_url https://bugs.chromium.org/p/project-zero/issues/detail?id=1136
reference_id CVE-2017-3575
reference_type exploit
scores
url https://bugs.chromium.org/p/project-zero/issues/detail?id=1136
7
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/41906.txt
reference_id CVE-2017-3575
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/41906.txt
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-3575
reference_id CVE-2017-3575
reference_type
scores
0
value 3.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:P/A:P
1
value 7.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-3575
fixed_packages
0
url pkg:deb/debian/virtualbox@5.1.20-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.1.20-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.1.20-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2017-3575
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-aps4-nm33-kqft
133
url VCID-atbb-6wy4-yqek
vulnerability_id VCID-atbb-6wy4-yqek
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:41:43Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2742
reference_id
reference_type
scores
0
value 0.00165
scoring_system epss
scoring_elements 0.37519
published_at 2026-04-01T12:55:00Z
1
value 0.00165
scoring_system epss
scoring_elements 0.37605
published_at 2026-04-07T12:55:00Z
2
value 0.00165
scoring_system epss
scoring_elements 0.37656
published_at 2026-04-08T12:55:00Z
3
value 0.00165
scoring_system epss
scoring_elements 0.37669
published_at 2026-04-09T12:55:00Z
4
value 0.00165
scoring_system epss
scoring_elements 0.37683
published_at 2026-04-11T12:55:00Z
5
value 0.00165
scoring_system epss
scoring_elements 0.37649
published_at 2026-04-12T12:55:00Z
6
value 0.00165
scoring_system epss
scoring_elements 0.37621
published_at 2026-04-13T12:55:00Z
7
value 0.00165
scoring_system epss
scoring_elements 0.37668
published_at 2026-04-16T12:55:00Z
8
value 0.00165
scoring_system epss
scoring_elements 0.3765
published_at 2026-04-18T12:55:00Z
9
value 0.00165
scoring_system epss
scoring_elements 0.37586
published_at 2026-04-21T12:55:00Z
10
value 0.00165
scoring_system epss
scoring_elements 0.37701
published_at 2026-04-02T12:55:00Z
11
value 0.00165
scoring_system epss
scoring_elements 0.37726
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2742
2
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:41:43Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
3
reference_url https://www.zerodayinitiative.com/advisories/ZDI-20-499/
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:41:43Z/
url https://www.zerodayinitiative.com/advisories/ZDI-20-499/
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2742
reference_id CVE-2020-2742
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
1
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
2
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-2742
7
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:41:43Z/
url https://security.gentoo.org/glsa/202101-09
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.2-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.2-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.2-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2020-2742
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-atbb-6wy4-yqek
134
url VCID-au36-g2mp-gke6
vulnerability_id VCID-au36-g2mp-gke6
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are prior to 5.2.24 and prior to 6.0.2. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 7.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:56:10Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2548
reference_id
reference_type
scores
0
value 0.0386
scoring_system epss
scoring_elements 0.88227
published_at 2026-04-21T12:55:00Z
1
value 0.0386
scoring_system epss
scoring_elements 0.88223
published_at 2026-04-11T12:55:00Z
2
value 0.0386
scoring_system epss
scoring_elements 0.88215
published_at 2026-04-13T12:55:00Z
3
value 0.0386
scoring_system epss
scoring_elements 0.88228
published_at 2026-04-16T12:55:00Z
4
value 0.0386
scoring_system epss
scoring_elements 0.88156
published_at 2026-04-01T12:55:00Z
5
value 0.0386
scoring_system epss
scoring_elements 0.88164
published_at 2026-04-02T12:55:00Z
6
value 0.0386
scoring_system epss
scoring_elements 0.8818
published_at 2026-04-04T12:55:00Z
7
value 0.0386
scoring_system epss
scoring_elements 0.88186
published_at 2026-04-07T12:55:00Z
8
value 0.0386
scoring_system epss
scoring_elements 0.88206
published_at 2026-04-08T12:55:00Z
9
value 0.0386
scoring_system epss
scoring_elements 0.88212
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2548
2
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:56:10Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
3
reference_url http://www.securityfocus.com/bid/106568
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:56:10Z/
url http://www.securityfocus.com/bid/106568
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-2548
reference_id CVE-2019-2548
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-2548
fixed_packages
0
url pkg:deb/debian/virtualbox@5.2.24-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.2.24-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.24-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2019-2548
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-au36-g2mp-gke6
135
url VCID-b2p9-bca1-ukab
vulnerability_id VCID-b2p9-bca1-ukab
summary Multiple vulnerabilities have been discovered in Oracle Virtualbox, the worst of which could result in privilege escalation from a guest to the host.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-39422
reference_id
reference_type
scores
0
value 0.00074
scoring_system epss
scoring_elements 0.2238
published_at 2026-04-21T12:55:00Z
1
value 0.00074
scoring_system epss
scoring_elements 0.22416
published_at 2026-04-13T12:55:00Z
2
value 0.00074
scoring_system epss
scoring_elements 0.22433
published_at 2026-04-16T12:55:00Z
3
value 0.00074
scoring_system epss
scoring_elements 0.2243
published_at 2026-04-18T12:55:00Z
4
value 0.00074
scoring_system epss
scoring_elements 0.22525
published_at 2026-04-02T12:55:00Z
5
value 0.00074
scoring_system epss
scoring_elements 0.22567
published_at 2026-04-04T12:55:00Z
6
value 0.00074
scoring_system epss
scoring_elements 0.22356
published_at 2026-04-07T12:55:00Z
7
value 0.00074
scoring_system epss
scoring_elements 0.22437
published_at 2026-04-08T12:55:00Z
8
value 0.00074
scoring_system epss
scoring_elements 0.22492
published_at 2026-04-09T12:55:00Z
9
value 0.00074
scoring_system epss
scoring_elements 0.22511
published_at 2026-04-11T12:55:00Z
10
value 0.00074
scoring_system epss
scoring_elements 0.2247
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-39422
1
reference_url https://security.gentoo.org/glsa/202212-03
reference_id GLSA-202212-03
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-23T15:25:18Z/
url https://security.gentoo.org/glsa/202212-03
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.38-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.38-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.38-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2022-39422
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b2p9-bca1-ukab
136
url VCID-b4jd-jct3-n3h1
vulnerability_id VCID-b4jd-jct3-n3h1
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2575
reference_id
reference_type
scores
0
value 0.00166
scoring_system epss
scoring_elements 0.37659
published_at 2026-04-21T12:55:00Z
1
value 0.00166
scoring_system epss
scoring_elements 0.37773
published_at 2026-04-02T12:55:00Z
2
value 0.00166
scoring_system epss
scoring_elements 0.3774
published_at 2026-04-16T12:55:00Z
3
value 0.00166
scoring_system epss
scoring_elements 0.37753
published_at 2026-04-11T12:55:00Z
4
value 0.00166
scoring_system epss
scoring_elements 0.37718
published_at 2026-04-12T12:55:00Z
5
value 0.00166
scoring_system epss
scoring_elements 0.37691
published_at 2026-04-13T12:55:00Z
6
value 0.00166
scoring_system epss
scoring_elements 0.3772
published_at 2026-04-18T12:55:00Z
7
value 0.00166
scoring_system epss
scoring_elements 0.37591
published_at 2026-04-01T12:55:00Z
8
value 0.00166
scoring_system epss
scoring_elements 0.37798
published_at 2026-04-04T12:55:00Z
9
value 0.00166
scoring_system epss
scoring_elements 0.37677
published_at 2026-04-07T12:55:00Z
10
value 0.00166
scoring_system epss
scoring_elements 0.37727
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2575
1
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:10Z/
url https://security.gentoo.org/glsa/202101-09
2
reference_url https://www.zerodayinitiative.com/advisories/ZDI-20-582/
reference_id ZDI-20-582
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:10Z/
url https://www.zerodayinitiative.com/advisories/ZDI-20-582/
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.6-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.6-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.6-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2020-2575
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b4jd-jct3-n3h1
137
url VCID-bbt5-dq5n-ebcb
vulnerability_id VCID-bbt5-dq5n-ebcb
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which allows local users to escalate privileges.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5610
reference_id
reference_type
scores
0
value 0.00062
scoring_system epss
scoring_elements 0.19247
published_at 2026-04-21T12:55:00Z
1
value 0.00062
scoring_system epss
scoring_elements 0.19317
published_at 2026-04-12T12:55:00Z
2
value 0.00062
scoring_system epss
scoring_elements 0.19263
published_at 2026-04-13T12:55:00Z
3
value 0.00062
scoring_system epss
scoring_elements 0.19225
published_at 2026-04-16T12:55:00Z
4
value 0.00062
scoring_system epss
scoring_elements 0.19335
published_at 2026-04-01T12:55:00Z
5
value 0.00062
scoring_system epss
scoring_elements 0.19469
published_at 2026-04-02T12:55:00Z
6
value 0.00062
scoring_system epss
scoring_elements 0.19517
published_at 2026-04-04T12:55:00Z
7
value 0.00062
scoring_system epss
scoring_elements 0.19234
published_at 2026-04-18T12:55:00Z
8
value 0.00062
scoring_system epss
scoring_elements 0.19312
published_at 2026-04-08T12:55:00Z
9
value 0.00062
scoring_system epss
scoring_elements 0.19363
published_at 2026-04-09T12:55:00Z
10
value 0.00062
scoring_system epss
scoring_elements 0.19367
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5610
1
reference_url http://www.securityfocus.com/bid/93711
reference_id 93711
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:50Z/
url http://www.securityfocus.com/bid/93711
2
reference_url https://security.gentoo.org/glsa/201612-27
reference_id GLSA-201612-27
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:50Z/
url https://security.gentoo.org/glsa/201612-27
fixed_packages
0
url pkg:deb/debian/virtualbox@5.1.8-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.1.8-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.1.8-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2016-5610
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bbt5-dq5n-ebcb
138
url VCID-bck2-r9jw-ducn
vulnerability_id VCID-bck2-r9jw-ducn
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2015-11/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-11/msg00000.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2015-11/msg00172.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-11/msg00172.html
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4896
reference_id
reference_type
scores
0
value 0.01499
scoring_system epss
scoring_elements 0.8117
published_at 2026-04-18T12:55:00Z
1
value 0.01499
scoring_system epss
scoring_elements 0.81067
published_at 2026-04-01T12:55:00Z
2
value 0.01499
scoring_system epss
scoring_elements 0.81076
published_at 2026-04-02T12:55:00Z
3
value 0.01499
scoring_system epss
scoring_elements 0.811
published_at 2026-04-07T12:55:00Z
4
value 0.01499
scoring_system epss
scoring_elements 0.81128
published_at 2026-04-08T12:55:00Z
5
value 0.01499
scoring_system epss
scoring_elements 0.81134
published_at 2026-04-09T12:55:00Z
6
value 0.01499
scoring_system epss
scoring_elements 0.81152
published_at 2026-04-11T12:55:00Z
7
value 0.01499
scoring_system epss
scoring_elements 0.81138
published_at 2026-04-12T12:55:00Z
8
value 0.01499
scoring_system epss
scoring_elements 0.81131
published_at 2026-04-13T12:55:00Z
9
value 0.01499
scoring_system epss
scoring_elements 0.81168
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4896
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4813
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4896
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4896
5
reference_url http://www.debian.org/security/2015/dsa-3384
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3384
6
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
7
reference_url http://www.securityfocus.com/bid/77198
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77198
8
reference_url http://www.securitytracker.com/id/1033880
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1033880
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-4896
reference_id CVE-2015-4896
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-4896
fixed_packages
0
url pkg:deb/debian/virtualbox@5.0.8-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.0.8-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.0.8-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2015-4896
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bck2-r9jw-ducn
139
url VCID-bgsu-2ev5-yubb
vulnerability_id VCID-bgsu-2ev5-yubb
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could result in privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2119
reference_id
reference_type
scores
0
value 0.03803
scoring_system epss
scoring_elements 0.88104
published_at 2026-04-21T12:55:00Z
1
value 0.03803
scoring_system epss
scoring_elements 0.88083
published_at 2026-04-08T12:55:00Z
2
value 0.03803
scoring_system epss
scoring_elements 0.88089
published_at 2026-04-09T12:55:00Z
3
value 0.03803
scoring_system epss
scoring_elements 0.88099
published_at 2026-04-11T12:55:00Z
4
value 0.03803
scoring_system epss
scoring_elements 0.88092
published_at 2026-04-12T12:55:00Z
5
value 0.03803
scoring_system epss
scoring_elements 0.88093
published_at 2026-04-13T12:55:00Z
6
value 0.03803
scoring_system epss
scoring_elements 0.88106
published_at 2026-04-16T12:55:00Z
7
value 0.03803
scoring_system epss
scoring_elements 0.88035
published_at 2026-04-01T12:55:00Z
8
value 0.03803
scoring_system epss
scoring_elements 0.88045
published_at 2026-04-02T12:55:00Z
9
value 0.03803
scoring_system epss
scoring_elements 0.88058
published_at 2026-04-04T12:55:00Z
10
value 0.03803
scoring_system epss
scoring_elements 0.88064
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2119
1
reference_url https://security.archlinux.org/ASA-202101-37
reference_id ASA-202101-37
reference_type
scores
url https://security.archlinux.org/ASA-202101-37
2
reference_url https://security.archlinux.org/AVG-1483
reference_id AVG-1483
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1483
3
reference_url https://security.gentoo.org/glsa/202101-15
reference_id GLSA-202101-15
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:53:29Z/
url https://security.gentoo.org/glsa/202101-15
4
reference_url https://security.gentoo.org/glsa/202104-08
reference_id GLSA-202104-08
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:53:29Z/
url https://security.gentoo.org/glsa/202104-08
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.18-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.18-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.18-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2021-2119
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bgsu-2ev5-yubb
140
url VCID-bhj1-1vgd-3qe1
vulnerability_id VCID-bhj1-1vgd-3qe1
summary Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 6.1.44 and Prior to 7.0.8. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data as well as unauthorized read access to a subset of Oracle VM VirtualBox accessible data. Note: This vulnerability applies to Windows VMs only. CVSS 3.1 Base Score 4.6 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21998
reference_id
reference_type
scores
0
value 0.00038
scoring_system epss
scoring_elements 0.11444
published_at 2026-04-02T12:55:00Z
1
value 0.00038
scoring_system epss
scoring_elements 0.11374
published_at 2026-04-13T12:55:00Z
2
value 0.00038
scoring_system epss
scoring_elements 0.11233
published_at 2026-04-16T12:55:00Z
3
value 0.00038
scoring_system epss
scoring_elements 0.11235
published_at 2026-04-18T12:55:00Z
4
value 0.00038
scoring_system epss
scoring_elements 0.11503
published_at 2026-04-04T12:55:00Z
5
value 0.00038
scoring_system epss
scoring_elements 0.11291
published_at 2026-04-07T12:55:00Z
6
value 0.00038
scoring_system epss
scoring_elements 0.11373
published_at 2026-04-08T12:55:00Z
7
value 0.00038
scoring_system epss
scoring_elements 0.11431
published_at 2026-04-09T12:55:00Z
8
value 0.00038
scoring_system epss
scoring_elements 0.11437
published_at 2026-04-11T12:55:00Z
9
value 0.00038
scoring_system epss
scoring_elements 0.11404
published_at 2026-04-12T12:55:00Z
10
value 0.00042
scoring_system epss
scoring_elements 0.12916
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21998
fixed_packages
0
url pkg:deb/debian/virtualbox@7.0.8-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.0.8-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.0.8-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2023-21998
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bhj1-1vgd-3qe1
141
url VCID-bjuy-m181-rkbm
vulnerability_id VCID-bjuy-m181-rkbm
summary Multiple vulnerabilities have been discovered in Oracle Virtualbox, the worst of which could result in root privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35545
reference_id
reference_type
scores
0
value 0.00048
scoring_system epss
scoring_elements 0.14627
published_at 2026-04-21T12:55:00Z
1
value 0.00048
scoring_system epss
scoring_elements 0.14756
published_at 2026-04-11T12:55:00Z
2
value 0.00048
scoring_system epss
scoring_elements 0.14665
published_at 2026-04-13T12:55:00Z
3
value 0.00048
scoring_system epss
scoring_elements 0.14559
published_at 2026-04-16T12:55:00Z
4
value 0.00048
scoring_system epss
scoring_elements 0.14564
published_at 2026-04-18T12:55:00Z
5
value 0.00048
scoring_system epss
scoring_elements 0.14719
published_at 2026-04-12T12:55:00Z
6
value 0.00048
scoring_system epss
scoring_elements 0.14769
published_at 2026-04-02T12:55:00Z
7
value 0.00048
scoring_system epss
scoring_elements 0.14844
published_at 2026-04-04T12:55:00Z
8
value 0.00048
scoring_system epss
scoring_elements 0.14649
published_at 2026-04-07T12:55:00Z
9
value 0.00048
scoring_system epss
scoring_elements 0.14739
published_at 2026-04-08T12:55:00Z
10
value 0.00048
scoring_system epss
scoring_elements 0.14798
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35545
1
reference_url https://security.archlinux.org/ASA-202110-3
reference_id ASA-202110-3
reference_type
scores
url https://security.archlinux.org/ASA-202110-3
2
reference_url https://security.archlinux.org/AVG-2476
reference_id AVG-2476
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2476
3
reference_url https://security.gentoo.org/glsa/202208-36
reference_id GLSA-202208-36
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:03Z/
url https://security.gentoo.org/glsa/202208-36
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.28-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.28-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.28-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2021-35545
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bjuy-m181-rkbm
142
url VCID-bmx5-9hrx-5be9
vulnerability_id VCID-bmx5-9hrx-5be9
summary Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-21955
reference_id
reference_type
scores
0
value 0.00042
scoring_system epss
scoring_elements 0.12831
published_at 2026-04-21T12:55:00Z
1
value 0.00042
scoring_system epss
scoring_elements 0.12729
published_at 2026-04-18T12:55:00Z
2
value 0.00042
scoring_system epss
scoring_elements 0.12967
published_at 2026-04-02T12:55:00Z
3
value 0.00042
scoring_system epss
scoring_elements 0.13016
published_at 2026-04-04T12:55:00Z
4
value 0.00042
scoring_system epss
scoring_elements 0.12816
published_at 2026-04-07T12:55:00Z
5
value 0.00042
scoring_system epss
scoring_elements 0.12895
published_at 2026-04-08T12:55:00Z
6
value 0.00042
scoring_system epss
scoring_elements 0.12945
published_at 2026-04-09T12:55:00Z
7
value 0.00042
scoring_system epss
scoring_elements 0.12903
published_at 2026-04-11T12:55:00Z
8
value 0.00042
scoring_system epss
scoring_elements 0.12868
published_at 2026-04-12T12:55:00Z
9
value 0.00042
scoring_system epss
scoring_elements 0.12822
published_at 2026-04-13T12:55:00Z
10
value 0.00042
scoring_system epss
scoring_elements 0.12726
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-21955
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126117
reference_id 1126117
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126117
2
reference_url https://www.oracle.com/security-alerts/cpujan2026.html
reference_id cpujan2026.html
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-22T04:55:37Z/
url https://www.oracle.com/security-alerts/cpujan2026.html
fixed_packages
0
url pkg:deb/debian/virtualbox@7.2.6-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2026-21955
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bmx5-9hrx-5be9
143
url VCID-bpdw-gp87-k3fw
vulnerability_id VCID-bpdw-gp87-k3fw
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2845
reference_id
reference_type
scores
0
value 0.00117
scoring_system epss
scoring_elements 0.30501
published_at 2026-04-21T12:55:00Z
1
value 0.00117
scoring_system epss
scoring_elements 0.3062
published_at 2026-04-11T12:55:00Z
2
value 0.00117
scoring_system epss
scoring_elements 0.30576
published_at 2026-04-12T12:55:00Z
3
value 0.00117
scoring_system epss
scoring_elements 0.30529
published_at 2026-04-13T12:55:00Z
4
value 0.00117
scoring_system epss
scoring_elements 0.30554
published_at 2026-04-16T12:55:00Z
5
value 0.00117
scoring_system epss
scoring_elements 0.30536
published_at 2026-04-18T12:55:00Z
6
value 0.00117
scoring_system epss
scoring_elements 0.3053
published_at 2026-04-01T12:55:00Z
7
value 0.00117
scoring_system epss
scoring_elements 0.30667
published_at 2026-04-02T12:55:00Z
8
value 0.00117
scoring_system epss
scoring_elements 0.30713
published_at 2026-04-04T12:55:00Z
9
value 0.00117
scoring_system epss
scoring_elements 0.30525
published_at 2026-04-07T12:55:00Z
10
value 0.00117
scoring_system epss
scoring_elements 0.30584
published_at 2026-04-08T12:55:00Z
11
value 0.00117
scoring_system epss
scoring_elements 0.30617
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2845
1
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:43Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
2
reference_url http://www.securityfocus.com/bid/103861
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:43Z/
url http://www.securityfocus.com/bid/103861
3
reference_url http://www.securitytracker.com/id/1040707
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:43Z/
url http://www.securitytracker.com/id/1040707
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-2845
reference_id CVE-2018-2845
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
1
value 6.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-2845
6
reference_url https://security.gentoo.org/glsa/201805-08
reference_id GLSA-201805-08
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:43Z/
url https://security.gentoo.org/glsa/201805-08
fixed_packages
0
url pkg:deb/debian/virtualbox@5.2.10-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.2.10-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.10-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2018-2845
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bpdw-gp87-k3fw
144
url VCID-bq98-t2fh-8ud5
vulnerability_id VCID-bq98-t2fh-8ud5
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are prior to 5.2.24 and prior to 6.0.2. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H).
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:02Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:02Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2509
reference_id
reference_type
scores
0
value 0.00171
scoring_system epss
scoring_elements 0.38261
published_at 2026-04-21T12:55:00Z
1
value 0.00171
scoring_system epss
scoring_elements 0.38398
published_at 2026-04-02T12:55:00Z
2
value 0.00171
scoring_system epss
scoring_elements 0.38325
published_at 2026-04-18T12:55:00Z
3
value 0.00171
scoring_system epss
scoring_elements 0.38299
published_at 2026-04-13T12:55:00Z
4
value 0.00171
scoring_system epss
scoring_elements 0.38347
published_at 2026-04-16T12:55:00Z
5
value 0.00171
scoring_system epss
scoring_elements 0.38262
published_at 2026-04-01T12:55:00Z
6
value 0.00171
scoring_system epss
scoring_elements 0.38421
published_at 2026-04-04T12:55:00Z
7
value 0.00171
scoring_system epss
scoring_elements 0.38285
published_at 2026-04-07T12:55:00Z
8
value 0.00171
scoring_system epss
scoring_elements 0.38335
published_at 2026-04-08T12:55:00Z
9
value 0.00171
scoring_system epss
scoring_elements 0.38344
published_at 2026-04-09T12:55:00Z
10
value 0.00171
scoring_system epss
scoring_elements 0.38361
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2509
3
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:02Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
4
reference_url http://www.securityfocus.com/bid/106568
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:02Z/
url http://www.securityfocus.com/bid/106568
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-2509
reference_id CVE-2019-2509
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-2509
fixed_packages
0
url pkg:deb/debian/virtualbox@5.2.24-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.2.24-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.24-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2019-2509
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bq98-t2fh-8ud5
145
url VCID-bqur-e23f-aydg
vulnerability_id VCID-bqur-e23f-aydg
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are prior to 5.2.24 and prior to 6.0.2. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 3.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N).
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:06Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2506
reference_id
reference_type
scores
0
value 0.00114
scoring_system epss
scoring_elements 0.2993
published_at 2026-04-21T12:55:00Z
1
value 0.00114
scoring_system epss
scoring_elements 0.29981
published_at 2026-04-13T12:55:00Z
2
value 0.00114
scoring_system epss
scoring_elements 0.29996
published_at 2026-04-16T12:55:00Z
3
value 0.00114
scoring_system epss
scoring_elements 0.29976
published_at 2026-04-18T12:55:00Z
4
value 0.00114
scoring_system epss
scoring_elements 0.30075
published_at 2026-04-11T12:55:00Z
5
value 0.00114
scoring_system epss
scoring_elements 0.30113
published_at 2026-04-02T12:55:00Z
6
value 0.00114
scoring_system epss
scoring_elements 0.30161
published_at 2026-04-04T12:55:00Z
7
value 0.00114
scoring_system epss
scoring_elements 0.29975
published_at 2026-04-07T12:55:00Z
8
value 0.00114
scoring_system epss
scoring_elements 0.30035
published_at 2026-04-08T12:55:00Z
9
value 0.00114
scoring_system epss
scoring_elements 0.30071
published_at 2026-04-09T12:55:00Z
10
value 0.00114
scoring_system epss
scoring_elements 0.30031
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2506
2
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:06Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
3
reference_url http://www.securityfocus.com/bid/106568
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:06Z/
url http://www.securityfocus.com/bid/106568
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-2506
reference_id CVE-2019-2506
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:N
1
value 3.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2019-2506
fixed_packages
0
url pkg:deb/debian/virtualbox@5.2.24-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.2.24-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.24-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2019-2506
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bqur-e23f-aydg
146
url VCID-brjs-bfrf-jqbw
vulnerability_id VCID-brjs-bfrf-jqbw
summary Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is 7.1.6. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data as well as unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-30712
reference_id
reference_type
scores
0
value 0.00085
scoring_system epss
scoring_elements 0.24574
published_at 2026-04-21T12:55:00Z
1
value 0.00085
scoring_system epss
scoring_elements 0.24597
published_at 2026-04-18T12:55:00Z
2
value 0.00085
scoring_system epss
scoring_elements 0.24748
published_at 2026-04-02T12:55:00Z
3
value 0.00085
scoring_system epss
scoring_elements 0.24787
published_at 2026-04-04T12:55:00Z
4
value 0.00085
scoring_system epss
scoring_elements 0.24559
published_at 2026-04-07T12:55:00Z
5
value 0.00085
scoring_system epss
scoring_elements 0.24629
published_at 2026-04-08T12:55:00Z
6
value 0.00085
scoring_system epss
scoring_elements 0.24676
published_at 2026-04-09T12:55:00Z
7
value 0.00085
scoring_system epss
scoring_elements 0.24691
published_at 2026-04-11T12:55:00Z
8
value 0.00085
scoring_system epss
scoring_elements 0.2465
published_at 2026-04-12T12:55:00Z
9
value 0.00085
scoring_system epss
scoring_elements 0.24593
published_at 2026-04-13T12:55:00Z
10
value 0.00085
scoring_system epss
scoring_elements 0.24606
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-30712
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103582
reference_id 1103582
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103582
2
reference_url https://www.oracle.com/security-alerts/cpuapr2025.html
reference_id cpuapr2025.html
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-16T14:40:52Z/
url https://www.oracle.com/security-alerts/cpuapr2025.html
fixed_packages
0
url pkg:deb/debian/virtualbox@7.0.26-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.0.26-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.0.26-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2025-30712
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-brjs-bfrf-jqbw
147
url VCID-bwcf-n9zd-47gc
vulnerability_id VCID-bwcf-n9zd-47gc
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.1.30. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox as well as unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data and unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 7.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10392
reference_id
reference_type
scores
0
value 0.00053
scoring_system epss
scoring_elements 0.16625
published_at 2026-04-21T12:55:00Z
1
value 0.00053
scoring_system epss
scoring_elements 0.16698
published_at 2026-04-12T12:55:00Z
2
value 0.00053
scoring_system epss
scoring_elements 0.16642
published_at 2026-04-13T12:55:00Z
3
value 0.00053
scoring_system epss
scoring_elements 0.16578
published_at 2026-04-16T12:55:00Z
4
value 0.00053
scoring_system epss
scoring_elements 0.16586
published_at 2026-04-18T12:55:00Z
5
value 0.00053
scoring_system epss
scoring_elements 0.16607
published_at 2026-04-01T12:55:00Z
6
value 0.00053
scoring_system epss
scoring_elements 0.1678
published_at 2026-04-02T12:55:00Z
7
value 0.00053
scoring_system epss
scoring_elements 0.16837
published_at 2026-04-04T12:55:00Z
8
value 0.00053
scoring_system epss
scoring_elements 0.16622
published_at 2026-04-07T12:55:00Z
9
value 0.00053
scoring_system epss
scoring_elements 0.16707
published_at 2026-04-08T12:55:00Z
10
value 0.00053
scoring_system epss
scoring_elements 0.16761
published_at 2026-04-09T12:55:00Z
11
value 0.00053
scoring_system epss
scoring_elements 0.16741
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10392
1
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:26Z/
url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
2
reference_url http://www.securityfocus.com/bid/101368
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:26Z/
url http://www.securityfocus.com/bid/101368
3
reference_url http://www.securitytracker.com/id/1039599
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:26Z/
url http://www.securitytracker.com/id/1039599
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:5.1.28:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:5.1.28:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:5.1.28:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-10392
reference_id CVE-2017-10392
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:P/I:P/A:P
1
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-10392
fixed_packages
0
url pkg:deb/debian/virtualbox@5.1.30-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.1.30-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.1.30-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2017-10392
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bwcf-n9zd-47gc
148
url VCID-bywa-gvfr-c3ga
vulnerability_id VCID-bywa-gvfr-c3ga
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2686
reference_id
reference_type
scores
0
value 0.00178
scoring_system epss
scoring_elements 0.39267
published_at 2026-04-21T12:55:00Z
1
value 0.00178
scoring_system epss
scoring_elements 0.39366
published_at 2026-04-02T12:55:00Z
2
value 0.00178
scoring_system epss
scoring_elements 0.39382
published_at 2026-04-16T12:55:00Z
3
value 0.00178
scoring_system epss
scoring_elements 0.39353
published_at 2026-04-18T12:55:00Z
4
value 0.00178
scoring_system epss
scoring_elements 0.39179
published_at 2026-04-01T12:55:00Z
5
value 0.00178
scoring_system epss
scoring_elements 0.39389
published_at 2026-04-04T12:55:00Z
6
value 0.00178
scoring_system epss
scoring_elements 0.39303
published_at 2026-04-07T12:55:00Z
7
value 0.00178
scoring_system epss
scoring_elements 0.39358
published_at 2026-04-08T12:55:00Z
8
value 0.00178
scoring_system epss
scoring_elements 0.39375
published_at 2026-04-09T12:55:00Z
9
value 0.00178
scoring_system epss
scoring_elements 0.39387
published_at 2026-04-11T12:55:00Z
10
value 0.00178
scoring_system epss
scoring_elements 0.39348
published_at 2026-04-12T12:55:00Z
11
value 0.00178
scoring_system epss
scoring_elements 0.39329
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2686
1
reference_url http://www.securityfocus.com/bid/102690
reference_id 102690
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:55Z/
url http://www.securityfocus.com/bid/102690
2
reference_url http://www.securitytracker.com/id/1040202
reference_id 1040202
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:55Z/
url http://www.securitytracker.com/id/1040202
3
reference_url https://security.gentoo.org/glsa/201802-01
reference_id GLSA-201802-01
reference_type
scores
url https://security.gentoo.org/glsa/201802-01
fixed_packages
0
url pkg:deb/debian/virtualbox@5.2.6-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.2.6-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.6-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2018-2686
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bywa-gvfr-c3ga
149
url VCID-c2nv-y5d9-6kbn
vulnerability_id VCID-c2nv-y5d9-6kbn
summary Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.12 and 7.2.2. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-62587
reference_id
reference_type
scores
0
value 0.00027
scoring_system epss
scoring_elements 0.07771
published_at 2026-04-21T12:55:00Z
1
value 0.00027
scoring_system epss
scoring_elements 0.07622
published_at 2026-04-18T12:55:00Z
2
value 0.00027
scoring_system epss
scoring_elements 0.07651
published_at 2026-04-02T12:55:00Z
3
value 0.00027
scoring_system epss
scoring_elements 0.07694
published_at 2026-04-04T12:55:00Z
4
value 0.00027
scoring_system epss
scoring_elements 0.07663
published_at 2026-04-07T12:55:00Z
5
value 0.00027
scoring_system epss
scoring_elements 0.07723
published_at 2026-04-08T12:55:00Z
6
value 0.00027
scoring_system epss
scoring_elements 0.07742
published_at 2026-04-09T12:55:00Z
7
value 0.00027
scoring_system epss
scoring_elements 0.0774
published_at 2026-04-11T12:55:00Z
8
value 0.00027
scoring_system epss
scoring_elements 0.07726
published_at 2026-04-12T12:55:00Z
9
value 0.00027
scoring_system epss
scoring_elements 0.07711
published_at 2026-04-13T12:55:00Z
10
value 0.00027
scoring_system epss
scoring_elements 0.07635
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-62587
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118542
reference_id 1118542
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118542
2
reference_url https://www.oracle.com/security-alerts/cpuoct2025.html
reference_id cpuoct2025.html
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-23T03:55:29Z/
url https://www.oracle.com/security-alerts/cpuoct2025.html
fixed_packages
0
url pkg:deb/debian/virtualbox@7.2.4-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.2.4-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.4-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2025-62587
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c2nv-y5d9-6kbn
150
url VCID-c5gc-zj9e-x7hs
vulnerability_id VCID-c5gc-zj9e-x7hs
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.2.28 and prior to 6.0.6. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2678
reference_id
reference_type
scores
0
value 0.00149
scoring_system epss
scoring_elements 0.35478
published_at 2026-04-02T12:55:00Z
1
value 0.00149
scoring_system epss
scoring_elements 0.35373
published_at 2026-04-21T12:55:00Z
2
value 0.00149
scoring_system epss
scoring_elements 0.35278
published_at 2026-04-01T12:55:00Z
3
value 0.00149
scoring_system epss
scoring_elements 0.35502
published_at 2026-04-04T12:55:00Z
4
value 0.00149
scoring_system epss
scoring_elements 0.35385
published_at 2026-04-07T12:55:00Z
5
value 0.00149
scoring_system epss
scoring_elements 0.35431
published_at 2026-04-08T12:55:00Z
6
value 0.00149
scoring_system epss
scoring_elements 0.35456
published_at 2026-04-09T12:55:00Z
7
value 0.00149
scoring_system epss
scoring_elements 0.35465
published_at 2026-04-11T12:55:00Z
8
value 0.00149
scoring_system epss
scoring_elements 0.35422
published_at 2026-04-12T12:55:00Z
9
value 0.00149
scoring_system epss
scoring_elements 0.35399
published_at 2026-04-13T12:55:00Z
10
value 0.00149
scoring_system epss
scoring_elements 0.35438
published_at 2026-04-16T12:55:00Z
11
value 0.00149
scoring_system epss
scoring_elements 0.35426
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2678
fixed_packages
0
url pkg:deb/debian/virtualbox@6.0.6-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.0.6-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.0.6-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2019-2678
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c5gc-zj9e-x7hs
151
url VCID-c7w5-yk8d-qkfb
vulnerability_id VCID-c7w5-yk8d-qkfb
summary Multiple vulnerabilities have been discovered in Oracle Virtualbox, the worst of which could result in root privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2280
reference_id
reference_type
scores
0
value 0.00154
scoring_system epss
scoring_elements 0.36107
published_at 2026-04-21T12:55:00Z
1
value 0.00154
scoring_system epss
scoring_elements 0.36158
published_at 2026-04-12T12:55:00Z
2
value 0.00154
scoring_system epss
scoring_elements 0.36132
published_at 2026-04-13T12:55:00Z
3
value 0.00154
scoring_system epss
scoring_elements 0.36174
published_at 2026-04-16T12:55:00Z
4
value 0.00154
scoring_system epss
scoring_elements 0.36159
published_at 2026-04-18T12:55:00Z
5
value 0.00154
scoring_system epss
scoring_elements 0.36058
published_at 2026-04-01T12:55:00Z
6
value 0.00154
scoring_system epss
scoring_elements 0.36253
published_at 2026-04-02T12:55:00Z
7
value 0.00154
scoring_system epss
scoring_elements 0.36286
published_at 2026-04-04T12:55:00Z
8
value 0.00154
scoring_system epss
scoring_elements 0.36122
published_at 2026-04-07T12:55:00Z
9
value 0.00154
scoring_system epss
scoring_elements 0.36171
published_at 2026-04-08T12:55:00Z
10
value 0.00154
scoring_system epss
scoring_elements 0.36189
published_at 2026-04-09T12:55:00Z
11
value 0.00154
scoring_system epss
scoring_elements 0.36195
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2280
1
reference_url https://security.archlinux.org/ASA-202104-9
reference_id ASA-202104-9
reference_type
scores
url https://security.archlinux.org/ASA-202104-9
2
reference_url https://security.archlinux.org/AVG-1846
reference_id AVG-1846
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1846
3
reference_url https://security.gentoo.org/glsa/202208-36
reference_id GLSA-202208-36
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:42:45Z/
url https://security.gentoo.org/glsa/202208-36
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.20-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.20-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.20-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2021-2280
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c7w5-yk8d-qkfb
152
url VCID-c93q-cw62-1ubw
vulnerability_id VCID-c93q-cw62-1ubw
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.1.30. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox as well as unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data and unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 7.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10408
reference_id
reference_type
scores
0
value 0.00051
scoring_system epss
scoring_elements 0.15787
published_at 2026-04-18T12:55:00Z
1
value 0.00051
scoring_system epss
scoring_elements 0.15958
published_at 2026-04-11T12:55:00Z
2
value 0.00051
scoring_system epss
scoring_elements 0.1592
published_at 2026-04-12T12:55:00Z
3
value 0.00051
scoring_system epss
scoring_elements 0.15852
published_at 2026-04-13T12:55:00Z
4
value 0.00051
scoring_system epss
scoring_elements 0.15776
published_at 2026-04-16T12:55:00Z
5
value 0.00051
scoring_system epss
scoring_elements 0.15904
published_at 2026-04-01T12:55:00Z
6
value 0.00051
scoring_system epss
scoring_elements 0.15968
published_at 2026-04-02T12:55:00Z
7
value 0.00051
scoring_system epss
scoring_elements 0.16031
published_at 2026-04-04T12:55:00Z
8
value 0.00051
scoring_system epss
scoring_elements 0.15832
published_at 2026-04-21T12:55:00Z
9
value 0.00051
scoring_system epss
scoring_elements 0.15917
published_at 2026-04-08T12:55:00Z
10
value 0.00051
scoring_system epss
scoring_elements 0.15979
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10408
1
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:10Z/
url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
2
reference_url http://www.securityfocus.com/bid/101371
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:10Z/
url http://www.securityfocus.com/bid/101371
3
reference_url http://www.securitytracker.com/id/1039599
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:10Z/
url http://www.securitytracker.com/id/1039599
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-10408
reference_id CVE-2017-10408
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:P/I:P/A:P
1
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-10408
fixed_packages
0
url pkg:deb/debian/virtualbox@5.1.30-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.1.30-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.1.30-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2017-10408
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c93q-cw62-1ubw
153
url VCID-catz-2uta-3fgf
vulnerability_id VCID-catz-2uta-3fgf
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2860
reference_id
reference_type
scores
0
value 0.00156
scoring_system epss
scoring_elements 0.36352
published_at 2026-04-21T12:55:00Z
1
value 0.00156
scoring_system epss
scoring_elements 0.36441
published_at 2026-04-11T12:55:00Z
2
value 0.00156
scoring_system epss
scoring_elements 0.36406
published_at 2026-04-12T12:55:00Z
3
value 0.00156
scoring_system epss
scoring_elements 0.36384
published_at 2026-04-13T12:55:00Z
4
value 0.00156
scoring_system epss
scoring_elements 0.36425
published_at 2026-04-16T12:55:00Z
5
value 0.00156
scoring_system epss
scoring_elements 0.36408
published_at 2026-04-18T12:55:00Z
6
value 0.00156
scoring_system epss
scoring_elements 0.36316
published_at 2026-04-01T12:55:00Z
7
value 0.00156
scoring_system epss
scoring_elements 0.36492
published_at 2026-04-02T12:55:00Z
8
value 0.00156
scoring_system epss
scoring_elements 0.36526
published_at 2026-04-04T12:55:00Z
9
value 0.00156
scoring_system epss
scoring_elements 0.36364
published_at 2026-04-07T12:55:00Z
10
value 0.00156
scoring_system epss
scoring_elements 0.36414
published_at 2026-04-08T12:55:00Z
11
value 0.00156
scoring_system epss
scoring_elements 0.36434
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2860
1
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:55Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
2
reference_url http://www.securityfocus.com/bid/103860
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:55Z/
url http://www.securityfocus.com/bid/103860
3
reference_url http://www.securitytracker.com/id/1040707
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:55Z/
url http://www.securitytracker.com/id/1040707
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-2860
reference_id CVE-2018-2860
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
1
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-2860
6
reference_url https://security.gentoo.org/glsa/201805-08
reference_id GLSA-201805-08
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:55Z/
url https://security.gentoo.org/glsa/201805-08
fixed_packages
0
url pkg:deb/debian/virtualbox@5.2.10-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.2.10-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.10-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2018-2860
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-catz-2uta-3fgf
154
url VCID-cm61-d57b-1qhq
vulnerability_id VCID-cm61-d57b-1qhq
summary Multiple vulnerabilities have been discovered in Oracle Virtualbox, the worst of which could result in root privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2285
reference_id
reference_type
scores
0
value 0.00182
scoring_system epss
scoring_elements 0.39933
published_at 2026-04-21T12:55:00Z
1
value 0.00182
scoring_system epss
scoring_elements 0.4001
published_at 2026-04-12T12:55:00Z
2
value 0.00182
scoring_system epss
scoring_elements 0.3999
published_at 2026-04-13T12:55:00Z
3
value 0.00182
scoring_system epss
scoring_elements 0.4004
published_at 2026-04-16T12:55:00Z
4
value 0.00182
scoring_system epss
scoring_elements 0.40011
published_at 2026-04-18T12:55:00Z
5
value 0.00182
scoring_system epss
scoring_elements 0.39875
published_at 2026-04-01T12:55:00Z
6
value 0.00182
scoring_system epss
scoring_elements 0.40023
published_at 2026-04-08T12:55:00Z
7
value 0.00182
scoring_system epss
scoring_elements 0.40049
published_at 2026-04-04T12:55:00Z
8
value 0.00182
scoring_system epss
scoring_elements 0.3997
published_at 2026-04-07T12:55:00Z
9
value 0.00182
scoring_system epss
scoring_elements 0.40036
published_at 2026-04-09T12:55:00Z
10
value 0.00182
scoring_system epss
scoring_elements 0.40047
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2285
1
reference_url https://security.archlinux.org/ASA-202104-9
reference_id ASA-202104-9
reference_type
scores
url https://security.archlinux.org/ASA-202104-9
2
reference_url https://security.archlinux.org/AVG-1846
reference_id AVG-1846
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1846
3
reference_url https://security.gentoo.org/glsa/202208-36
reference_id GLSA-202208-36
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:53Z/
url https://security.gentoo.org/glsa/202208-36
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.20-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.20-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.20-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2021-2285
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cm61-d57b-1qhq
155
url VCID-cm69-aycs-kfh2
vulnerability_id VCID-cm69-aycs-kfh2
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could result in privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2111
reference_id
reference_type
scores
0
value 0.00162
scoring_system epss
scoring_elements 0.37026
published_at 2026-04-21T12:55:00Z
1
value 0.00162
scoring_system epss
scoring_elements 0.37083
published_at 2026-04-12T12:55:00Z
2
value 0.00162
scoring_system epss
scoring_elements 0.37055
published_at 2026-04-13T12:55:00Z
3
value 0.00162
scoring_system epss
scoring_elements 0.37101
published_at 2026-04-16T12:55:00Z
4
value 0.00162
scoring_system epss
scoring_elements 0.37084
published_at 2026-04-18T12:55:00Z
5
value 0.00162
scoring_system epss
scoring_elements 0.37007
published_at 2026-04-01T12:55:00Z
6
value 0.00162
scoring_system epss
scoring_elements 0.37183
published_at 2026-04-02T12:55:00Z
7
value 0.00162
scoring_system epss
scoring_elements 0.37212
published_at 2026-04-04T12:55:00Z
8
value 0.00162
scoring_system epss
scoring_elements 0.37043
published_at 2026-04-07T12:55:00Z
9
value 0.00162
scoring_system epss
scoring_elements 0.37094
published_at 2026-04-08T12:55:00Z
10
value 0.00162
scoring_system epss
scoring_elements 0.37106
published_at 2026-04-09T12:55:00Z
11
value 0.00162
scoring_system epss
scoring_elements 0.37117
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2111
1
reference_url https://security.archlinux.org/ASA-202101-37
reference_id ASA-202101-37
reference_type
scores
url https://security.archlinux.org/ASA-202101-37
2
reference_url https://security.archlinux.org/AVG-1483
reference_id AVG-1483
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1483
3
reference_url https://security.gentoo.org/glsa/202101-15
reference_id GLSA-202101-15
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:53:41Z/
url https://security.gentoo.org/glsa/202101-15
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.18-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.18-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.18-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2021-2111
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cm69-aycs-kfh2
156
url VCID-cmjk-znxb-afgy
vulnerability_id VCID-cmjk-znxb-afgy
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2727
reference_id
reference_type
scores
0
value 0.00135
scoring_system epss
scoring_elements 0.33147
published_at 2026-04-21T12:55:00Z
1
value 0.00135
scoring_system epss
scoring_elements 0.33286
published_at 2026-04-02T12:55:00Z
2
value 0.00135
scoring_system epss
scoring_elements 0.33229
published_at 2026-04-11T12:55:00Z
3
value 0.00135
scoring_system epss
scoring_elements 0.33189
published_at 2026-04-12T12:55:00Z
4
value 0.00135
scoring_system epss
scoring_elements 0.33166
published_at 2026-04-13T12:55:00Z
5
value 0.00135
scoring_system epss
scoring_elements 0.33206
published_at 2026-04-16T12:55:00Z
6
value 0.00135
scoring_system epss
scoring_elements 0.33183
published_at 2026-04-18T12:55:00Z
7
value 0.00135
scoring_system epss
scoring_elements 0.33157
published_at 2026-04-01T12:55:00Z
8
value 0.00135
scoring_system epss
scoring_elements 0.33318
published_at 2026-04-04T12:55:00Z
9
value 0.00135
scoring_system epss
scoring_elements 0.3315
published_at 2026-04-07T12:55:00Z
10
value 0.00135
scoring_system epss
scoring_elements 0.33194
published_at 2026-04-08T12:55:00Z
11
value 0.00135
scoring_system epss
scoring_elements 0.33227
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2727
1
reference_url https://security.gentoo.org/glsa/202004-02
reference_id GLSA-202004-02
reference_type
scores
0
value 6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:01:00Z/
url https://security.gentoo.org/glsa/202004-02
2
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value 6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:01:00Z/
url https://security.gentoo.org/glsa/202101-09
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.2-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.2-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.2-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2020-2727
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cmjk-znxb-afgy
157
url VCID-ctc7-nx1g-quh9
vulnerability_id VCID-ctc7-nx1g-quh9
summary Multiple vulnerabilities have been discovered in Oracle Virtualbox, the worst of which could result in root privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2310
reference_id
reference_type
scores
0
value 0.00231
scoring_system epss
scoring_elements 0.45908
published_at 2026-04-21T12:55:00Z
1
value 0.00231
scoring_system epss
scoring_elements 0.45918
published_at 2026-04-08T12:55:00Z
2
value 0.00231
scoring_system epss
scoring_elements 0.45916
published_at 2026-04-13T12:55:00Z
3
value 0.00231
scoring_system epss
scoring_elements 0.45938
published_at 2026-04-11T12:55:00Z
4
value 0.00231
scoring_system epss
scoring_elements 0.45909
published_at 2026-04-12T12:55:00Z
5
value 0.00231
scoring_system epss
scoring_elements 0.45968
published_at 2026-04-16T12:55:00Z
6
value 0.00231
scoring_system epss
scoring_elements 0.45964
published_at 2026-04-18T12:55:00Z
7
value 0.00231
scoring_system epss
scoring_elements 0.45844
published_at 2026-04-01T12:55:00Z
8
value 0.00231
scoring_system epss
scoring_elements 0.45891
published_at 2026-04-02T12:55:00Z
9
value 0.00231
scoring_system epss
scoring_elements 0.45912
published_at 2026-04-04T12:55:00Z
10
value 0.00231
scoring_system epss
scoring_elements 0.45862
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2310
1
reference_url https://security.archlinux.org/ASA-202104-9
reference_id ASA-202104-9
reference_type
scores
url https://security.archlinux.org/ASA-202104-9
2
reference_url https://security.archlinux.org/AVG-1846
reference_id AVG-1846
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1846
3
reference_url https://security.gentoo.org/glsa/202208-36
reference_id GLSA-202208-36
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T13:58:49Z/
url https://security.gentoo.org/glsa/202208-36
4
reference_url https://www.zerodayinitiative.com/advisories/ZDI-21-456/
reference_id ZDI-21-456
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T13:58:49Z/
url https://www.zerodayinitiative.com/advisories/ZDI-21-456/
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.20-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.20-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.20-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2021-2310
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ctc7-nx1g-quh9
158
url VCID-cud1-bcu6-1ydf
vulnerability_id VCID-cud1-bcu6-1ydf
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14695
reference_id
reference_type
scores
0
value 0.00146
scoring_system epss
scoring_elements 0.3487
published_at 2026-04-01T12:55:00Z
1
value 0.00146
scoring_system epss
scoring_elements 0.35068
published_at 2026-04-02T12:55:00Z
2
value 0.00146
scoring_system epss
scoring_elements 0.35052
published_at 2026-04-11T12:55:00Z
3
value 0.00146
scoring_system epss
scoring_elements 0.35016
published_at 2026-04-12T12:55:00Z
4
value 0.00146
scoring_system epss
scoring_elements 0.34993
published_at 2026-04-13T12:55:00Z
5
value 0.00146
scoring_system epss
scoring_elements 0.35034
published_at 2026-04-16T12:55:00Z
6
value 0.00146
scoring_system epss
scoring_elements 0.35019
published_at 2026-04-18T12:55:00Z
7
value 0.00146
scoring_system epss
scoring_elements 0.34973
published_at 2026-04-21T12:55:00Z
8
value 0.00146
scoring_system epss
scoring_elements 0.35095
published_at 2026-04-04T12:55:00Z
9
value 0.00146
scoring_system epss
scoring_elements 0.34975
published_at 2026-04-07T12:55:00Z
10
value 0.00146
scoring_system epss
scoring_elements 0.3502
published_at 2026-04-08T12:55:00Z
11
value 0.00146
scoring_system epss
scoring_elements 0.35048
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14695
1
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:31Z/
url https://security.gentoo.org/glsa/202101-09
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html
reference_id msg00068.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:31Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html
reference_id msg00079.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:31Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html
4
reference_url https://www.zerodayinitiative.com/advisories/ZDI-20-900/
reference_id ZDI-20-900
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:31Z/
url https://www.zerodayinitiative.com/advisories/ZDI-20-900/
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.12-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.12-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.12-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2020-14695
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cud1-bcu6-1ydf
159
url VCID-d3da-xmrq-bfd2
vulnerability_id VCID-d3da-xmrq-bfd2
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2690
reference_id
reference_type
scores
0
value 0.00537
scoring_system epss
scoring_elements 0.67566
published_at 2026-04-21T12:55:00Z
1
value 0.00537
scoring_system epss
scoring_elements 0.67498
published_at 2026-04-02T12:55:00Z
2
value 0.00537
scoring_system epss
scoring_elements 0.67586
published_at 2026-04-11T12:55:00Z
3
value 0.00537
scoring_system epss
scoring_elements 0.67572
published_at 2026-04-12T12:55:00Z
4
value 0.00537
scoring_system epss
scoring_elements 0.67539
published_at 2026-04-13T12:55:00Z
5
value 0.00537
scoring_system epss
scoring_elements 0.67574
published_at 2026-04-16T12:55:00Z
6
value 0.00537
scoring_system epss
scoring_elements 0.67587
published_at 2026-04-18T12:55:00Z
7
value 0.00537
scoring_system epss
scoring_elements 0.67462
published_at 2026-04-01T12:55:00Z
8
value 0.00537
scoring_system epss
scoring_elements 0.67519
published_at 2026-04-04T12:55:00Z
9
value 0.00537
scoring_system epss
scoring_elements 0.67497
published_at 2026-04-07T12:55:00Z
10
value 0.00537
scoring_system epss
scoring_elements 0.67549
published_at 2026-04-08T12:55:00Z
11
value 0.00537
scoring_system epss
scoring_elements 0.67563
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2690
1
reference_url https://security.gentoo.org/glsa/202004-02
reference_id GLSA-202004-02
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:01:46Z/
url https://security.gentoo.org/glsa/202004-02
2
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:01:46Z/
url https://security.gentoo.org/glsa/202101-09
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.2-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.2-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.2-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2020-2690
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d3da-xmrq-bfd2
160
url VCID-d499-x9kv-bydk
vulnerability_id VCID-d499-x9kv-bydk
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0592
reference_id
reference_type
scores
0
value 0.00091
scoring_system epss
scoring_elements 0.25576
published_at 2026-04-21T12:55:00Z
1
value 0.00091
scoring_system epss
scoring_elements 0.25703
published_at 2026-04-01T12:55:00Z
2
value 0.00091
scoring_system epss
scoring_elements 0.25775
published_at 2026-04-02T12:55:00Z
3
value 0.00091
scoring_system epss
scoring_elements 0.25817
published_at 2026-04-04T12:55:00Z
4
value 0.00091
scoring_system epss
scoring_elements 0.25587
published_at 2026-04-07T12:55:00Z
5
value 0.00091
scoring_system epss
scoring_elements 0.2566
published_at 2026-04-08T12:55:00Z
6
value 0.00091
scoring_system epss
scoring_elements 0.25706
published_at 2026-04-09T12:55:00Z
7
value 0.00091
scoring_system epss
scoring_elements 0.25717
published_at 2026-04-11T12:55:00Z
8
value 0.00091
scoring_system epss
scoring_elements 0.25676
published_at 2026-04-12T12:55:00Z
9
value 0.00091
scoring_system epss
scoring_elements 0.25619
published_at 2026-04-13T12:55:00Z
10
value 0.00091
scoring_system epss
scoring_elements 0.2562
published_at 2026-04-16T12:55:00Z
11
value 0.00091
scoring_system epss
scoring_elements 0.25604
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0592
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5307
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8104
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8104
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0495
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0495
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0592
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0592
5
reference_url http://www.debian.org/security/2016/dsa-3454
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3454
6
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
7
reference_url http://www.securityfocus.com/bid/81224
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/81224
8
reference_url http://www.securitytracker.com/id/1034731
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034731
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0592
reference_id CVE-2016-0592
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2016-0592
fixed_packages
0
url pkg:deb/debian/virtualbox@5.0.14-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.0.14-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.0.14-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2016-0592
risk_score 0.9
exploitability 0.5
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d499-x9kv-bydk
161
url VCID-d4fu-pyuk-vfcq
vulnerability_id VCID-d4fu-pyuk-vfcq
summary Multiple vulnerabilities have been discovered in Oracle Virtualbox, the worst of which could result in root privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21394
reference_id
reference_type
scores
0
value 0.00123
scoring_system epss
scoring_elements 0.31459
published_at 2026-04-21T12:55:00Z
1
value 0.00123
scoring_system epss
scoring_elements 0.31559
published_at 2026-04-11T12:55:00Z
2
value 0.00123
scoring_system epss
scoring_elements 0.31517
published_at 2026-04-12T12:55:00Z
3
value 0.00123
scoring_system epss
scoring_elements 0.31479
published_at 2026-04-13T12:55:00Z
4
value 0.00123
scoring_system epss
scoring_elements 0.31512
published_at 2026-04-16T12:55:00Z
5
value 0.00123
scoring_system epss
scoring_elements 0.3149
published_at 2026-04-18T12:55:00Z
6
value 0.00123
scoring_system epss
scoring_elements 0.31609
published_at 2026-04-02T12:55:00Z
7
value 0.00123
scoring_system epss
scoring_elements 0.31653
published_at 2026-04-04T12:55:00Z
8
value 0.00123
scoring_system epss
scoring_elements 0.31473
published_at 2026-04-07T12:55:00Z
9
value 0.00123
scoring_system epss
scoring_elements 0.31525
published_at 2026-04-08T12:55:00Z
10
value 0.00123
scoring_system epss
scoring_elements 0.31555
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21394
1
reference_url https://security.gentoo.org/glsa/202208-36
reference_id GLSA-202208-36
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:43:53Z/
url https://security.gentoo.org/glsa/202208-36
2
reference_url https://www.zerodayinitiative.com/advisories/ZDI-22-128/
reference_id ZDI-22-128
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:43:53Z/
url https://www.zerodayinitiative.com/advisories/ZDI-22-128/
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.32-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.32-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.32-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2022-21394
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d4fu-pyuk-vfcq
162
url VCID-d5gm-n8uu-rfgw
vulnerability_id VCID-d5gm-n8uu-rfgw
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:35Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2907
reference_id
reference_type
scores
0
value 0.00163
scoring_system epss
scoring_elements 0.37214
published_at 2026-04-21T12:55:00Z
1
value 0.00163
scoring_system epss
scoring_elements 0.3737
published_at 2026-04-02T12:55:00Z
2
value 0.00163
scoring_system epss
scoring_elements 0.37397
published_at 2026-04-04T12:55:00Z
3
value 0.00163
scoring_system epss
scoring_elements 0.37225
published_at 2026-04-07T12:55:00Z
4
value 0.00163
scoring_system epss
scoring_elements 0.37276
published_at 2026-04-08T12:55:00Z
5
value 0.00163
scoring_system epss
scoring_elements 0.37289
published_at 2026-04-09T12:55:00Z
6
value 0.00163
scoring_system epss
scoring_elements 0.373
published_at 2026-04-11T12:55:00Z
7
value 0.00163
scoring_system epss
scoring_elements 0.37267
published_at 2026-04-12T12:55:00Z
8
value 0.00163
scoring_system epss
scoring_elements 0.37239
published_at 2026-04-13T12:55:00Z
9
value 0.00163
scoring_system epss
scoring_elements 0.37285
published_at 2026-04-16T12:55:00Z
10
value 0.00163
scoring_system epss
scoring_elements 0.37268
published_at 2026-04-18T12:55:00Z
11
value 0.00163
scoring_system epss
scoring_elements 0.37204
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2907
2
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:35Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
3
reference_url https://www.zerodayinitiative.com/advisories/ZDI-20-509/
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:35Z/
url https://www.zerodayinitiative.com/advisories/ZDI-20-509/
4
reference_url https://www.zerodayinitiative.com/advisories/ZDI-20-510/
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:35Z/
url https://www.zerodayinitiative.com/advisories/ZDI-20-510/
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2907
reference_id CVE-2020-2907
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
2
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-2907
8
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:35Z/
url https://security.gentoo.org/glsa/202101-09
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.6-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.6-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.6-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2020-2907
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d5gm-n8uu-rfgw
163
url VCID-d9ub-1pgd-bfc2
vulnerability_id VCID-d9ub-1pgd-bfc2
summary Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-21983
reference_id
reference_type
scores
0
value 0.00029
scoring_system epss
scoring_elements 0.0819
published_at 2026-04-21T12:55:00Z
1
value 0.00029
scoring_system epss
scoring_elements 0.08031
published_at 2026-04-18T12:55:00Z
2
value 0.00029
scoring_system epss
scoring_elements 0.08113
published_at 2026-04-02T12:55:00Z
3
value 0.00029
scoring_system epss
scoring_elements 0.08155
published_at 2026-04-04T12:55:00Z
4
value 0.00029
scoring_system epss
scoring_elements 0.08102
published_at 2026-04-07T12:55:00Z
5
value 0.00029
scoring_system epss
scoring_elements 0.08161
published_at 2026-04-08T12:55:00Z
6
value 0.00029
scoring_system epss
scoring_elements 0.08183
published_at 2026-04-09T12:55:00Z
7
value 0.00029
scoring_system epss
scoring_elements 0.08177
published_at 2026-04-11T12:55:00Z
8
value 0.00029
scoring_system epss
scoring_elements 0.08157
published_at 2026-04-12T12:55:00Z
9
value 0.00029
scoring_system epss
scoring_elements 0.0814
published_at 2026-04-13T12:55:00Z
10
value 0.00029
scoring_system epss
scoring_elements 0.08046
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-21983
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126117
reference_id 1126117
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126117
2
reference_url https://www.oracle.com/security-alerts/cpujan2026.html
reference_id cpujan2026.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-22T04:55:23Z/
url https://www.oracle.com/security-alerts/cpujan2026.html
fixed_packages
0
url pkg:deb/debian/virtualbox@7.2.6-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2026-21983
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d9ub-1pgd-bfc2
164
url VCID-dc9p-tdf1-h7ad
vulnerability_id VCID-dc9p-tdf1-h7ad
summary x86: CPU lockup during exception delivery
references
0
reference_url http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=54a20552e1eae07aa240fa370a0293e006b5faed
reference_id
reference_type
scores
url http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=54a20552e1eae07aa240fa370a0293e006b5faed
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172187.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172187.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172300.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172300.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172435.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172435.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html
8
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html
9
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
10
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html
11
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00053.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00053.html
12
reference_url http://rhn.redhat.com/errata/RHSA-2015-2636.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2636.html
13
reference_url http://rhn.redhat.com/errata/RHSA-2015-2645.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2645.html
14
reference_url http://rhn.redhat.com/errata/RHSA-2016-0046.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0046.html
15
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5307.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5307.json
16
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-5307
reference_id
reference_type
scores
0
value 0.00096
scoring_system epss
scoring_elements 0.26524
published_at 2026-04-21T12:55:00Z
1
value 0.00096
scoring_system epss
scoring_elements 0.2659
published_at 2026-04-16T12:55:00Z
2
value 0.00096
scoring_system epss
scoring_elements 0.26692
published_at 2026-04-01T12:55:00Z
3
value 0.00096
scoring_system epss
scoring_elements 0.26738
published_at 2026-04-02T12:55:00Z
4
value 0.00096
scoring_system epss
scoring_elements 0.2678
published_at 2026-04-04T12:55:00Z
5
value 0.00096
scoring_system epss
scoring_elements 0.26563
published_at 2026-04-18T12:55:00Z
6
value 0.00096
scoring_system epss
scoring_elements 0.26631
published_at 2026-04-08T12:55:00Z
7
value 0.00096
scoring_system epss
scoring_elements 0.26682
published_at 2026-04-09T12:55:00Z
8
value 0.00096
scoring_system epss
scoring_elements 0.26686
published_at 2026-04-11T12:55:00Z
9
value 0.00096
scoring_system epss
scoring_elements 0.26642
published_at 2026-04-12T12:55:00Z
10
value 0.00096
scoring_system epss
scoring_elements 0.26583
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-5307
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3259
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3259
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3340
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5307
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6654
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6654
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7311
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7311
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7812
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7813
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7814
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7833
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7872
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7872
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7969
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7969
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7970
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7970
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7971
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7971
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7972
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7972
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7990
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7990
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8104
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8104
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0495
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0495
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0592
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0592
35
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
36
reference_url https://github.com/torvalds/linux/commit/54a20552e1eae07aa240fa370a0293e006b5faed
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/54a20552e1eae07aa240fa370a0293e006b5faed
37
reference_url https://kb.juniper.net/JSA10783
reference_id
reference_type
scores
url https://kb.juniper.net/JSA10783
38
reference_url http://support.citrix.com/article/CTX202583
reference_id
reference_type
scores
url http://support.citrix.com/article/CTX202583
39
reference_url http://www.debian.org/security/2015/dsa-3396
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3396
40
reference_url http://www.debian.org/security/2015/dsa-3414
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3414
41
reference_url http://www.debian.org/security/2016/dsa-3454
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3454
42
reference_url http://www.openwall.com/lists/oss-security/2015/11/10/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/11/10/6
43
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
44
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
45
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
46
reference_url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
47
reference_url http://www.securityfocus.com/bid/77528
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77528
48
reference_url http://www.securitytracker.com/id/1034105
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034105
49
reference_url http://www.ubuntu.com/usn/USN-2800-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2800-1
50
reference_url http://www.ubuntu.com/usn/USN-2801-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2801-1
51
reference_url http://www.ubuntu.com/usn/USN-2802-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2802-1
52
reference_url http://www.ubuntu.com/usn/USN-2803-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2803-1
53
reference_url http://www.ubuntu.com/usn/USN-2804-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2804-1
54
reference_url http://www.ubuntu.com/usn/USN-2805-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2805-1
55
reference_url http://www.ubuntu.com/usn/USN-2806-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2806-1
56
reference_url http://www.ubuntu.com/usn/USN-2807-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2807-1
57
reference_url http://xenbits.xen.org/xsa/advisory-156.html
reference_id
reference_type
scores
url http://xenbits.xen.org/xsa/advisory-156.html
58
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1277172
reference_id 1277172
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1277172
59
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823620
reference_id 823620
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823620
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.3:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.2:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.3:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.4:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.3:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.5.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.5:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.1:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.2:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.3:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.4:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.5:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.6:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-5307
reference_id CVE-2015-5307
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2015-5307
90
reference_url https://access.redhat.com/errata/RHSA-2015:2552
reference_id RHSA-2015:2552
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2552
91
reference_url https://access.redhat.com/errata/RHSA-2015:2587
reference_id RHSA-2015:2587
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2587
92
reference_url https://access.redhat.com/errata/RHSA-2015:2636
reference_id RHSA-2015:2636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2636
93
reference_url https://access.redhat.com/errata/RHSA-2015:2645
reference_id RHSA-2015:2645
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2645
94
reference_url https://access.redhat.com/errata/RHSA-2016:0004
reference_id RHSA-2016:0004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0004
95
reference_url https://access.redhat.com/errata/RHSA-2016:0024
reference_id RHSA-2016:0024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0024
96
reference_url https://access.redhat.com/errata/RHSA-2016:0046
reference_id RHSA-2016:0046
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0046
97
reference_url https://usn.ubuntu.com/2800-1/
reference_id USN-2800-1
reference_type
scores
url https://usn.ubuntu.com/2800-1/
98
reference_url https://usn.ubuntu.com/2801-1/
reference_id USN-2801-1
reference_type
scores
url https://usn.ubuntu.com/2801-1/
99
reference_url https://usn.ubuntu.com/2802-1/
reference_id USN-2802-1
reference_type
scores
url https://usn.ubuntu.com/2802-1/
100
reference_url https://usn.ubuntu.com/2803-1/
reference_id USN-2803-1
reference_type
scores
url https://usn.ubuntu.com/2803-1/
101
reference_url https://usn.ubuntu.com/2804-1/
reference_id USN-2804-1
reference_type
scores
url https://usn.ubuntu.com/2804-1/
102
reference_url https://usn.ubuntu.com/2805-1/
reference_id USN-2805-1
reference_type
scores
url https://usn.ubuntu.com/2805-1/
103
reference_url https://usn.ubuntu.com/2806-1/
reference_id USN-2806-1
reference_type
scores
url https://usn.ubuntu.com/2806-1/
104
reference_url https://usn.ubuntu.com/2807-1/
reference_id USN-2807-1
reference_type
scores
url https://usn.ubuntu.com/2807-1/
105
reference_url https://xenbits.xen.org/xsa/advisory-156.html
reference_id XSA-156
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-156.html
fixed_packages
0
url pkg:deb/debian/virtualbox@5.0.10-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.0.10-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.0.10-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2015-5307
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dc9p-tdf1-h7ad
165
url VCID-dcc4-hs9f-j7dd
vulnerability_id VCID-dcc4-hs9f-j7dd
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which allows local users to escalate privileges.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-6589
reference_id
reference_type
scores
0
value 0.00113
scoring_system epss
scoring_elements 0.29925
published_at 2026-04-01T12:55:00Z
1
value 0.00113
scoring_system epss
scoring_elements 0.29967
published_at 2026-04-02T12:55:00Z
2
value 0.00113
scoring_system epss
scoring_elements 0.30015
published_at 2026-04-04T12:55:00Z
3
value 0.00113
scoring_system epss
scoring_elements 0.29828
published_at 2026-04-07T12:55:00Z
4
value 0.00113
scoring_system epss
scoring_elements 0.29891
published_at 2026-04-08T12:55:00Z
5
value 0.00113
scoring_system epss
scoring_elements 0.29926
published_at 2026-04-09T12:55:00Z
6
value 0.00113
scoring_system epss
scoring_elements 0.29931
published_at 2026-04-11T12:55:00Z
7
value 0.00113
scoring_system epss
scoring_elements 0.29886
published_at 2026-04-12T12:55:00Z
8
value 0.00113
scoring_system epss
scoring_elements 0.29836
published_at 2026-04-13T12:55:00Z
9
value 0.00113
scoring_system epss
scoring_elements 0.29853
published_at 2026-04-16T12:55:00Z
10
value 0.00113
scoring_system epss
scoring_elements 0.29833
published_at 2026-04-18T12:55:00Z
11
value 0.00113
scoring_system epss
scoring_elements 0.29787
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-6589
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775888
reference_id 775888
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775888
2
reference_url https://security.gentoo.org/glsa/201612-27
reference_id GLSA-201612-27
reference_type
scores
url https://security.gentoo.org/glsa/201612-27
fixed_packages
0
url pkg:deb/debian/virtualbox@4.3.18-dfsg-2?distro=sid
purl pkg:deb/debian/virtualbox@4.3.18-dfsg-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@4.3.18-dfsg-2%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2014-6589
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dcc4-hs9f-j7dd
166
url VCID-dedn-32wh-qkb2
vulnerability_id VCID-dedn-32wh-qkb2
summary Core: From CVEorg collector
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21248.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21248.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21248
reference_id
reference_type
scores
0
value 0.00027
scoring_system epss
scoring_elements 0.07792
published_at 2026-04-21T12:55:00Z
1
value 0.00027
scoring_system epss
scoring_elements 0.07656
published_at 2026-04-16T12:55:00Z
2
value 0.00027
scoring_system epss
scoring_elements 0.07643
published_at 2026-04-18T12:55:00Z
3
value 0.00027
scoring_system epss
scoring_elements 0.07685
published_at 2026-04-02T12:55:00Z
4
value 0.00027
scoring_system epss
scoring_elements 0.07717
published_at 2026-04-04T12:55:00Z
5
value 0.00027
scoring_system epss
scoring_elements 0.07683
published_at 2026-04-07T12:55:00Z
6
value 0.00027
scoring_system epss
scoring_elements 0.07742
published_at 2026-04-08T12:55:00Z
7
value 0.00027
scoring_system epss
scoring_elements 0.0776
published_at 2026-04-11T12:55:00Z
8
value 0.00027
scoring_system epss
scoring_elements 0.07747
published_at 2026-04-12T12:55:00Z
9
value 0.00027
scoring_system epss
scoring_elements 0.0773
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21248
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085440
reference_id 1085440
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085440
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2318928
reference_id 2318928
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2318928
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.0.22:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.1.2:*:*:*:*:*:*:*
fixed_packages
0
url pkg:deb/debian/virtualbox@7.0.26-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.0.26-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.0.26-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2024-21248
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dedn-32wh-qkb2
167
url VCID-dfw3-akg3-t7d7
vulnerability_id VCID-dfw3-akg3-t7d7
summary Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is 7.1.10. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-53027
reference_id
reference_type
scores
0
value 0.00038
scoring_system epss
scoring_elements 0.11378
published_at 2026-04-02T12:55:00Z
1
value 0.00038
scoring_system epss
scoring_elements 0.11434
published_at 2026-04-04T12:55:00Z
2
value 0.00038
scoring_system epss
scoring_elements 0.11226
published_at 2026-04-07T12:55:00Z
3
value 0.00038
scoring_system epss
scoring_elements 0.11306
published_at 2026-04-08T12:55:00Z
4
value 0.00038
scoring_system epss
scoring_elements 0.11361
published_at 2026-04-09T12:55:00Z
5
value 0.00039
scoring_system epss
scoring_elements 0.1147
published_at 2026-04-18T12:55:00Z
6
value 0.00039
scoring_system epss
scoring_elements 0.11596
published_at 2026-04-21T12:55:00Z
7
value 0.00039
scoring_system epss
scoring_elements 0.11669
published_at 2026-04-11T12:55:00Z
8
value 0.00039
scoring_system epss
scoring_elements 0.11632
published_at 2026-04-12T12:55:00Z
9
value 0.00039
scoring_system epss
scoring_elements 0.11606
published_at 2026-04-13T12:55:00Z
10
value 0.00039
scoring_system epss
scoring_elements 0.11468
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-53027
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109373
reference_id 1109373
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109373
2
reference_url https://www.oracle.com/security-alerts/cpujul2025.html
reference_id cpujul2025.html
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-16T03:56:09Z/
url https://www.oracle.com/security-alerts/cpujul2025.html
fixed_packages
0
url pkg:deb/debian/virtualbox@7.1.12-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.1.12-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.1.12-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2025-53027
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dfw3-akg3-t7d7
168
url VCID-dhj9-zmhu-afe9
vulnerability_id VCID-dhj9-zmhu-afe9
summary Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle VM VirtualBox accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 4.6 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:L).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-21981
reference_id
reference_type
scores
0
value 0.00019
scoring_system epss
scoring_elements 0.04957
published_at 2026-04-21T12:55:00Z
1
value 0.00019
scoring_system epss
scoring_elements 0.04813
published_at 2026-04-18T12:55:00Z
2
value 0.00019
scoring_system epss
scoring_elements 0.04816
published_at 2026-04-02T12:55:00Z
3
value 0.00019
scoring_system epss
scoring_elements 0.04841
published_at 2026-04-04T12:55:00Z
4
value 0.00019
scoring_system epss
scoring_elements 0.04859
published_at 2026-04-07T12:55:00Z
5
value 0.00019
scoring_system epss
scoring_elements 0.04897
published_at 2026-04-08T12:55:00Z
6
value 0.00019
scoring_system epss
scoring_elements 0.04913
published_at 2026-04-09T12:55:00Z
7
value 0.00019
scoring_system epss
scoring_elements 0.04896
published_at 2026-04-11T12:55:00Z
8
value 0.00019
scoring_system epss
scoring_elements 0.04876
published_at 2026-04-12T12:55:00Z
9
value 0.00019
scoring_system epss
scoring_elements 0.04856
published_at 2026-04-13T12:55:00Z
10
value 0.00019
scoring_system epss
scoring_elements 0.04804
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-21981
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126117
reference_id 1126117
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126117
2
reference_url https://www.oracle.com/security-alerts/cpujan2026.html
reference_id cpujan2026.html
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-21T14:30:49Z/
url https://www.oracle.com/security-alerts/cpujan2026.html
fixed_packages
0
url pkg:deb/debian/virtualbox@7.2.6-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2026-21981
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dhj9-zmhu-afe9
169
url VCID-dkdd-7m85-kuc7
vulnerability_id VCID-dkdd-7m85-kuc7
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are prior to 5.2.24 and prior to 6.0.2. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 3.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N).
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:14Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2501
reference_id
reference_type
scores
0
value 0.00098
scoring_system epss
scoring_elements 0.26978
published_at 2026-04-21T12:55:00Z
1
value 0.00098
scoring_system epss
scoring_elements 0.27031
published_at 2026-04-13T12:55:00Z
2
value 0.00098
scoring_system epss
scoring_elements 0.2704
published_at 2026-04-16T12:55:00Z
3
value 0.00098
scoring_system epss
scoring_elements 0.27015
published_at 2026-04-18T12:55:00Z
4
value 0.00098
scoring_system epss
scoring_elements 0.27144
published_at 2026-04-01T12:55:00Z
5
value 0.00098
scoring_system epss
scoring_elements 0.27185
published_at 2026-04-02T12:55:00Z
6
value 0.00098
scoring_system epss
scoring_elements 0.27221
published_at 2026-04-04T12:55:00Z
7
value 0.00098
scoring_system epss
scoring_elements 0.27014
published_at 2026-04-07T12:55:00Z
8
value 0.00098
scoring_system epss
scoring_elements 0.27083
published_at 2026-04-08T12:55:00Z
9
value 0.00098
scoring_system epss
scoring_elements 0.27129
published_at 2026-04-09T12:55:00Z
10
value 0.00098
scoring_system epss
scoring_elements 0.27132
published_at 2026-04-11T12:55:00Z
11
value 0.00098
scoring_system epss
scoring_elements 0.27089
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2501
2
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:14Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
3
reference_url http://www.securityfocus.com/bid/106568
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:14Z/
url http://www.securityfocus.com/bid/106568
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-2501
reference_id CVE-2019-2501
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:N
1
value 3.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2019-2501
fixed_packages
0
url pkg:deb/debian/virtualbox@5.2.24-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.2.24-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.24-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2019-2501
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dkdd-7m85-kuc7
170
url VCID-dktf-rdh8-w7bf
vulnerability_id VCID-dktf-rdh8-w7bf
summary Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.32. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle VM VirtualBox accessible data. Note: This vulnerability applies to Windows systems only. CVSS 3.1 Base Score 3.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21295
reference_id
reference_type
scores
0
value 0.00047
scoring_system epss
scoring_elements 0.1462
published_at 2026-04-21T12:55:00Z
1
value 0.00047
scoring_system epss
scoring_elements 0.14556
published_at 2026-04-18T12:55:00Z
2
value 0.00047
scoring_system epss
scoring_elements 0.14763
published_at 2026-04-02T12:55:00Z
3
value 0.00047
scoring_system epss
scoring_elements 0.14839
published_at 2026-04-04T12:55:00Z
4
value 0.00047
scoring_system epss
scoring_elements 0.14642
published_at 2026-04-07T12:55:00Z
5
value 0.00047
scoring_system epss
scoring_elements 0.14731
published_at 2026-04-08T12:55:00Z
6
value 0.00047
scoring_system epss
scoring_elements 0.1479
published_at 2026-04-09T12:55:00Z
7
value 0.00047
scoring_system epss
scoring_elements 0.14749
published_at 2026-04-11T12:55:00Z
8
value 0.00047
scoring_system epss
scoring_elements 0.14711
published_at 2026-04-12T12:55:00Z
9
value 0.00047
scoring_system epss
scoring_elements 0.14657
published_at 2026-04-13T12:55:00Z
10
value 0.00047
scoring_system epss
scoring_elements 0.1455
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21295
fixed_packages
0
url pkg:deb/debian/virtualbox@0?distro=sid
purl pkg:deb/debian/virtualbox@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@0%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2022-21295
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dktf-rdh8-w7bf
171
url VCID-dn5h-hfy6-sfaq
vulnerability_id VCID-dn5h-hfy6-sfaq
summary Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-21987
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.03162
published_at 2026-04-21T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.03042
published_at 2026-04-18T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.03086
published_at 2026-04-02T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.031
published_at 2026-04-04T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.03101
published_at 2026-04-07T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.03105
published_at 2026-04-08T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.0313
published_at 2026-04-09T12:55:00Z
7
value 0.00015
scoring_system epss
scoring_elements 0.03093
published_at 2026-04-11T12:55:00Z
8
value 0.00015
scoring_system epss
scoring_elements 0.03069
published_at 2026-04-12T12:55:00Z
9
value 0.00015
scoring_system epss
scoring_elements 0.03057
published_at 2026-04-13T12:55:00Z
10
value 0.00015
scoring_system epss
scoring_elements 0.03033
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-21987
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126117
reference_id 1126117
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126117
2
reference_url https://www.oracle.com/security-alerts/cpujan2026.html
reference_id cpujan2026.html
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-22T04:55:21Z/
url https://www.oracle.com/security-alerts/cpujan2026.html
fixed_packages
0
url pkg:deb/debian/virtualbox@7.2.6-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2026-21987
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dn5h-hfy6-sfaq
172
url VCID-dqvw-8yu6-gub8
vulnerability_id VCID-dqvw-8yu6-gub8
summary Multiple vulnerabilities have been discovered in Oracle Virtualbox, the worst of which could result in root privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2312
reference_id
reference_type
scores
0
value 0.00059
scoring_system epss
scoring_elements 0.18544
published_at 2026-04-21T12:55:00Z
1
value 0.00059
scoring_system epss
scoring_elements 0.1876
published_at 2026-04-02T12:55:00Z
2
value 0.00059
scoring_system epss
scoring_elements 0.18571
published_at 2026-04-13T12:55:00Z
3
value 0.00059
scoring_system epss
scoring_elements 0.18514
published_at 2026-04-16T12:55:00Z
4
value 0.00059
scoring_system epss
scoring_elements 0.18524
published_at 2026-04-18T12:55:00Z
5
value 0.00059
scoring_system epss
scoring_elements 0.18623
published_at 2026-04-01T12:55:00Z
6
value 0.00059
scoring_system epss
scoring_elements 0.18814
published_at 2026-04-04T12:55:00Z
7
value 0.00059
scoring_system epss
scoring_elements 0.18531
published_at 2026-04-07T12:55:00Z
8
value 0.00059
scoring_system epss
scoring_elements 0.18611
published_at 2026-04-08T12:55:00Z
9
value 0.00059
scoring_system epss
scoring_elements 0.18666
published_at 2026-04-09T12:55:00Z
10
value 0.00059
scoring_system epss
scoring_elements 0.1867
published_at 2026-04-11T12:55:00Z
11
value 0.00059
scoring_system epss
scoring_elements 0.18622
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2312
1
reference_url https://security.gentoo.org/glsa/202208-36
reference_id GLSA-202208-36
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:32Z/
url https://security.gentoo.org/glsa/202208-36
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.20-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.20-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.20-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2021-2312
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dqvw-8yu6-gub8
173
url VCID-dss7-vc8q-mbg9
vulnerability_id VCID-dss7-vc8q-mbg9
summary Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 6.1.44 and Prior to 7.0.8. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data as well as unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 3.6 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21999
reference_id
reference_type
scores
0
value 0.00059
scoring_system epss
scoring_elements 0.18547
published_at 2026-04-02T12:55:00Z
1
value 0.00059
scoring_system epss
scoring_elements 0.18348
published_at 2026-04-13T12:55:00Z
2
value 0.00059
scoring_system epss
scoring_elements 0.18292
published_at 2026-04-16T12:55:00Z
3
value 0.00059
scoring_system epss
scoring_elements 0.18304
published_at 2026-04-18T12:55:00Z
4
value 0.00059
scoring_system epss
scoring_elements 0.18602
published_at 2026-04-04T12:55:00Z
5
value 0.00059
scoring_system epss
scoring_elements 0.18311
published_at 2026-04-07T12:55:00Z
6
value 0.00059
scoring_system epss
scoring_elements 0.18394
published_at 2026-04-08T12:55:00Z
7
value 0.00059
scoring_system epss
scoring_elements 0.18446
published_at 2026-04-11T12:55:00Z
8
value 0.00059
scoring_system epss
scoring_elements 0.18398
published_at 2026-04-12T12:55:00Z
9
value 0.00062
scoring_system epss
scoring_elements 0.19177
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21999
fixed_packages
0
url pkg:deb/debian/virtualbox@7.0.8-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.0.8-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.0.8-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2023-21999
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dss7-vc8q-mbg9
174
url VCID-dud3-fxh1-jybc
vulnerability_id VCID-dud3-fxh1-jybc
summary Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 7.0.16. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. Note: This vulnerability applies to Linux hosts only. CVSS 3.1 Base Score 7.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21103
reference_id
reference_type
scores
0
value 0.002
scoring_system epss
scoring_elements 0.42019
published_at 2026-04-21T12:55:00Z
1
value 0.002
scoring_system epss
scoring_elements 0.42065
published_at 2026-04-13T12:55:00Z
2
value 0.002
scoring_system epss
scoring_elements 0.42116
published_at 2026-04-16T12:55:00Z
3
value 0.002
scoring_system epss
scoring_elements 0.42076
published_at 2026-04-02T12:55:00Z
4
value 0.002
scoring_system epss
scoring_elements 0.42104
published_at 2026-04-04T12:55:00Z
5
value 0.002
scoring_system epss
scoring_elements 0.42041
published_at 2026-04-07T12:55:00Z
6
value 0.002
scoring_system epss
scoring_elements 0.42093
published_at 2026-04-08T12:55:00Z
7
value 0.002
scoring_system epss
scoring_elements 0.42105
published_at 2026-04-09T12:55:00Z
8
value 0.002
scoring_system epss
scoring_elements 0.42127
published_at 2026-04-11T12:55:00Z
9
value 0.002
scoring_system epss
scoring_elements 0.4209
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21103
1
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.0.16:*:*:*:*:*:*:*
2
reference_url https://www.oracle.com/security-alerts/cpuapr2024.html
reference_id cpuapr2024.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-19T04:01:14Z/
url https://www.oracle.com/security-alerts/cpuapr2024.html
fixed_packages
0
url pkg:deb/debian/virtualbox@7.0.16-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.0.16-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.0.16-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2024-21103
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dud3-fxh1-jybc
175
url VCID-dwcj-32w6-8fb3
vulnerability_id VCID-dwcj-32w6-8fb3
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which allows local users to escalate privileges.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-6590
reference_id
reference_type
scores
0
value 0.00113
scoring_system epss
scoring_elements 0.29925
published_at 2026-04-01T12:55:00Z
1
value 0.00113
scoring_system epss
scoring_elements 0.29967
published_at 2026-04-02T12:55:00Z
2
value 0.00113
scoring_system epss
scoring_elements 0.30015
published_at 2026-04-04T12:55:00Z
3
value 0.00113
scoring_system epss
scoring_elements 0.29828
published_at 2026-04-07T12:55:00Z
4
value 0.00113
scoring_system epss
scoring_elements 0.29891
published_at 2026-04-08T12:55:00Z
5
value 0.00113
scoring_system epss
scoring_elements 0.29926
published_at 2026-04-09T12:55:00Z
6
value 0.00113
scoring_system epss
scoring_elements 0.29931
published_at 2026-04-11T12:55:00Z
7
value 0.00113
scoring_system epss
scoring_elements 0.29886
published_at 2026-04-12T12:55:00Z
8
value 0.00113
scoring_system epss
scoring_elements 0.29836
published_at 2026-04-13T12:55:00Z
9
value 0.00113
scoring_system epss
scoring_elements 0.29853
published_at 2026-04-16T12:55:00Z
10
value 0.00113
scoring_system epss
scoring_elements 0.29833
published_at 2026-04-18T12:55:00Z
11
value 0.00113
scoring_system epss
scoring_elements 0.29787
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-6590
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775888
reference_id 775888
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775888
2
reference_url https://security.gentoo.org/glsa/201612-27
reference_id GLSA-201612-27
reference_type
scores
url https://security.gentoo.org/glsa/201612-27
fixed_packages
0
url pkg:deb/debian/virtualbox@4.3.18-dfsg-2?distro=sid
purl pkg:deb/debian/virtualbox@4.3.18-dfsg-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@4.3.18-dfsg-2%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2014-6590
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dwcj-32w6-8fb3
176
url VCID-e1gx-4c87-wqf3
vulnerability_id VCID-e1gx-4c87-wqf3
summary Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is 7.1.10. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-53026
reference_id
reference_type
scores
0
value 0.0003
scoring_system epss
scoring_elements 0.08673
published_at 2026-04-21T12:55:00Z
1
value 0.0003
scoring_system epss
scoring_elements 0.08521
published_at 2026-04-18T12:55:00Z
2
value 0.0003
scoring_system epss
scoring_elements 0.08423
published_at 2026-04-02T12:55:00Z
3
value 0.0003
scoring_system epss
scoring_elements 0.08477
published_at 2026-04-04T12:55:00Z
4
value 0.0003
scoring_system epss
scoring_elements 0.08396
published_at 2026-04-07T12:55:00Z
5
value 0.0003
scoring_system epss
scoring_elements 0.08468
published_at 2026-04-08T12:55:00Z
6
value 0.0003
scoring_system epss
scoring_elements 0.08487
published_at 2026-04-09T12:55:00Z
7
value 0.0003
scoring_system epss
scoring_elements 0.0868
published_at 2026-04-11T12:55:00Z
8
value 0.0003
scoring_system epss
scoring_elements 0.08657
published_at 2026-04-12T12:55:00Z
9
value 0.0003
scoring_system epss
scoring_elements 0.08644
published_at 2026-04-13T12:55:00Z
10
value 0.0003
scoring_system epss
scoring_elements 0.08534
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-53026
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109373
reference_id 1109373
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109373
2
reference_url https://www.oracle.com/security-alerts/cpujul2025.html
reference_id cpujul2025.html
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-15T20:20:15Z/
url https://www.oracle.com/security-alerts/cpujul2025.html
fixed_packages
0
url pkg:deb/debian/virtualbox@7.1.12-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.1.12-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.1.12-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2025-53026
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e1gx-4c87-wqf3
177
url VCID-e56x-6vc2-4qgk
vulnerability_id VCID-e56x-6vc2-4qgk
summary Multiple vulnerabilities have been discovered in Oracle Virtualbox, the worst of which could result in root privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2443
reference_id
reference_type
scores
0
value 0.00053
scoring_system epss
scoring_elements 0.16467
published_at 2026-04-21T12:55:00Z
1
value 0.00053
scoring_system epss
scoring_elements 0.16527
published_at 2026-04-12T12:55:00Z
2
value 0.00053
scoring_system epss
scoring_elements 0.16469
published_at 2026-04-13T12:55:00Z
3
value 0.00053
scoring_system epss
scoring_elements 0.1641
published_at 2026-04-16T12:55:00Z
4
value 0.00053
scoring_system epss
scoring_elements 0.16431
published_at 2026-04-18T12:55:00Z
5
value 0.00053
scoring_system epss
scoring_elements 0.16402
published_at 2026-04-01T12:55:00Z
6
value 0.00053
scoring_system epss
scoring_elements 0.16583
published_at 2026-04-02T12:55:00Z
7
value 0.00053
scoring_system epss
scoring_elements 0.16646
published_at 2026-04-04T12:55:00Z
8
value 0.00053
scoring_system epss
scoring_elements 0.16446
published_at 2026-04-07T12:55:00Z
9
value 0.00053
scoring_system epss
scoring_elements 0.16532
published_at 2026-04-08T12:55:00Z
10
value 0.00053
scoring_system epss
scoring_elements 0.16586
published_at 2026-04-09T12:55:00Z
11
value 0.00053
scoring_system epss
scoring_elements 0.16567
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2443
1
reference_url https://security.archlinux.org/ASA-202107-52
reference_id ASA-202107-52
reference_type
scores
url https://security.archlinux.org/ASA-202107-52
2
reference_url https://security.archlinux.org/AVG-2187
reference_id AVG-2187
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2187
3
reference_url https://security.gentoo.org/glsa/202208-36
reference_id GLSA-202208-36
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:25Z/
url https://security.gentoo.org/glsa/202208-36
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.26-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.26-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.26-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2021-2443
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e56x-6vc2-4qgk
178
url VCID-e7tk-fpb8-yugw
vulnerability_id VCID-e7tk-fpb8-yugw
summary Multiple vulnerabilities have been discovered in Oracle Virtualbox, the worst of which could result in root privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2281
reference_id
reference_type
scores
0
value 0.00171
scoring_system epss
scoring_elements 0.38359
published_at 2026-04-21T12:55:00Z
1
value 0.00171
scoring_system epss
scoring_elements 0.38458
published_at 2026-04-11T12:55:00Z
2
value 0.00171
scoring_system epss
scoring_elements 0.38421
published_at 2026-04-12T12:55:00Z
3
value 0.00171
scoring_system epss
scoring_elements 0.38395
published_at 2026-04-13T12:55:00Z
4
value 0.00171
scoring_system epss
scoring_elements 0.38423
published_at 2026-04-18T12:55:00Z
5
value 0.00171
scoring_system epss
scoring_elements 0.3836
published_at 2026-04-01T12:55:00Z
6
value 0.00171
scoring_system epss
scoring_elements 0.38497
published_at 2026-04-02T12:55:00Z
7
value 0.00171
scoring_system epss
scoring_elements 0.38521
published_at 2026-04-04T12:55:00Z
8
value 0.00171
scoring_system epss
scoring_elements 0.38384
published_at 2026-04-07T12:55:00Z
9
value 0.00171
scoring_system epss
scoring_elements 0.38435
published_at 2026-04-08T12:55:00Z
10
value 0.00171
scoring_system epss
scoring_elements 0.38443
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2281
1
reference_url https://security.archlinux.org/ASA-202104-9
reference_id ASA-202104-9
reference_type
scores
url https://security.archlinux.org/ASA-202104-9
2
reference_url https://security.archlinux.org/AVG-1846
reference_id AVG-1846
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1846
3
reference_url https://security.gentoo.org/glsa/202208-36
reference_id GLSA-202208-36
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:42:44Z/
url https://security.gentoo.org/glsa/202208-36
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.20-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.20-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.20-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2021-2281
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e7tk-fpb8-yugw
179
url VCID-eebz-f2ee-8qan
vulnerability_id VCID-eebz-f2ee-8qan
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2678
reference_id
reference_type
scores
0
value 0.00144
scoring_system epss
scoring_elements 0.34672
published_at 2026-04-21T12:55:00Z
1
value 0.00144
scoring_system epss
scoring_elements 0.34776
published_at 2026-04-02T12:55:00Z
2
value 0.00144
scoring_system epss
scoring_elements 0.34755
published_at 2026-04-11T12:55:00Z
3
value 0.00144
scoring_system epss
scoring_elements 0.34716
published_at 2026-04-12T12:55:00Z
4
value 0.00144
scoring_system epss
scoring_elements 0.34692
published_at 2026-04-13T12:55:00Z
5
value 0.00144
scoring_system epss
scoring_elements 0.34727
published_at 2026-04-16T12:55:00Z
6
value 0.00144
scoring_system epss
scoring_elements 0.34712
published_at 2026-04-18T12:55:00Z
7
value 0.00144
scoring_system epss
scoring_elements 0.34563
published_at 2026-04-01T12:55:00Z
8
value 0.00144
scoring_system epss
scoring_elements 0.34802
published_at 2026-04-04T12:55:00Z
9
value 0.00144
scoring_system epss
scoring_elements 0.3468
published_at 2026-04-07T12:55:00Z
10
value 0.00144
scoring_system epss
scoring_elements 0.34724
published_at 2026-04-08T12:55:00Z
11
value 0.00144
scoring_system epss
scoring_elements 0.34751
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2678
1
reference_url https://security.gentoo.org/glsa/202004-02
reference_id GLSA-202004-02
reference_type
scores
0
value 6.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:03Z/
url https://security.gentoo.org/glsa/202004-02
2
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value 6.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:02:03Z/
url https://security.gentoo.org/glsa/202101-09
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.2-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.2-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.2-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2020-2678
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-eebz-f2ee-8qan
180
url VCID-ejgu-35ae-7ydr
vulnerability_id VCID-ejgu-35ae-7ydr
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could result in privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2126
reference_id
reference_type
scores
0
value 0.00154
scoring_system epss
scoring_elements 0.36038
published_at 2026-04-21T12:55:00Z
1
value 0.00154
scoring_system epss
scoring_elements 0.3609
published_at 2026-04-12T12:55:00Z
2
value 0.00154
scoring_system epss
scoring_elements 0.36064
published_at 2026-04-13T12:55:00Z
3
value 0.00154
scoring_system epss
scoring_elements 0.36105
published_at 2026-04-16T12:55:00Z
4
value 0.00154
scoring_system epss
scoring_elements 0.36091
published_at 2026-04-18T12:55:00Z
5
value 0.00154
scoring_system epss
scoring_elements 0.35995
published_at 2026-04-01T12:55:00Z
6
value 0.00154
scoring_system epss
scoring_elements 0.36189
published_at 2026-04-02T12:55:00Z
7
value 0.00154
scoring_system epss
scoring_elements 0.36219
published_at 2026-04-04T12:55:00Z
8
value 0.00154
scoring_system epss
scoring_elements 0.36054
published_at 2026-04-07T12:55:00Z
9
value 0.00154
scoring_system epss
scoring_elements 0.36104
published_at 2026-04-08T12:55:00Z
10
value 0.00154
scoring_system epss
scoring_elements 0.36122
published_at 2026-04-09T12:55:00Z
11
value 0.00154
scoring_system epss
scoring_elements 0.36129
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2126
1
reference_url https://security.archlinux.org/ASA-202101-37
reference_id ASA-202101-37
reference_type
scores
url https://security.archlinux.org/ASA-202101-37
2
reference_url https://security.archlinux.org/AVG-1483
reference_id AVG-1483
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1483
3
reference_url https://security.gentoo.org/glsa/202101-15
reference_id GLSA-202101-15
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:53:15Z/
url https://security.gentoo.org/glsa/202101-15
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.18-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.18-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.18-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2021-2126
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ejgu-35ae-7ydr
181
url VCID-eqve-qqdp-13ah
vulnerability_id VCID-eqve-qqdp-13ah
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14650
reference_id
reference_type
scores
0
value 0.00146
scoring_system epss
scoring_elements 0.3487
published_at 2026-04-01T12:55:00Z
1
value 0.00146
scoring_system epss
scoring_elements 0.35068
published_at 2026-04-02T12:55:00Z
2
value 0.00146
scoring_system epss
scoring_elements 0.35052
published_at 2026-04-11T12:55:00Z
3
value 0.00146
scoring_system epss
scoring_elements 0.35016
published_at 2026-04-12T12:55:00Z
4
value 0.00146
scoring_system epss
scoring_elements 0.34993
published_at 2026-04-13T12:55:00Z
5
value 0.00146
scoring_system epss
scoring_elements 0.35034
published_at 2026-04-16T12:55:00Z
6
value 0.00146
scoring_system epss
scoring_elements 0.35019
published_at 2026-04-18T12:55:00Z
7
value 0.00146
scoring_system epss
scoring_elements 0.34973
published_at 2026-04-21T12:55:00Z
8
value 0.00146
scoring_system epss
scoring_elements 0.35095
published_at 2026-04-04T12:55:00Z
9
value 0.00146
scoring_system epss
scoring_elements 0.34975
published_at 2026-04-07T12:55:00Z
10
value 0.00146
scoring_system epss
scoring_elements 0.3502
published_at 2026-04-08T12:55:00Z
11
value 0.00146
scoring_system epss
scoring_elements 0.35048
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14650
1
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:57:31Z/
url https://security.gentoo.org/glsa/202101-09
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html
reference_id msg00068.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:57:31Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html
reference_id msg00079.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:57:31Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html
4
reference_url https://www.zerodayinitiative.com/advisories/ZDI-20-892/
reference_id ZDI-20-892
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:57:31Z/
url https://www.zerodayinitiative.com/advisories/ZDI-20-892/
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.12-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.12-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.12-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2020-14650
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-eqve-qqdp-13ah
182
url VCID-eqxt-m8mj-27f7
vulnerability_id VCID-eqxt-m8mj-27f7
summary Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is 7.1.10. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-53024
reference_id
reference_type
scores
0
value 0.00038
scoring_system epss
scoring_elements 0.11378
published_at 2026-04-02T12:55:00Z
1
value 0.00038
scoring_system epss
scoring_elements 0.11434
published_at 2026-04-04T12:55:00Z
2
value 0.00038
scoring_system epss
scoring_elements 0.11226
published_at 2026-04-07T12:55:00Z
3
value 0.00038
scoring_system epss
scoring_elements 0.11306
published_at 2026-04-08T12:55:00Z
4
value 0.00038
scoring_system epss
scoring_elements 0.11361
published_at 2026-04-09T12:55:00Z
5
value 0.00039
scoring_system epss
scoring_elements 0.1147
published_at 2026-04-18T12:55:00Z
6
value 0.00039
scoring_system epss
scoring_elements 0.11596
published_at 2026-04-21T12:55:00Z
7
value 0.00039
scoring_system epss
scoring_elements 0.11669
published_at 2026-04-11T12:55:00Z
8
value 0.00039
scoring_system epss
scoring_elements 0.11632
published_at 2026-04-12T12:55:00Z
9
value 0.00039
scoring_system epss
scoring_elements 0.11606
published_at 2026-04-13T12:55:00Z
10
value 0.00039
scoring_system epss
scoring_elements 0.11468
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-53024
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109373
reference_id 1109373
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109373
2
reference_url https://www.oracle.com/security-alerts/cpujul2025.html
reference_id cpujul2025.html
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-16T03:56:10Z/
url https://www.oracle.com/security-alerts/cpujul2025.html
fixed_packages
0
url pkg:deb/debian/virtualbox@7.1.12-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.1.12-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.1.12-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2025-53024
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-eqxt-m8mj-27f7
183
url VCID-eum3-cpfq-gfeh
vulnerability_id VCID-eum3-cpfq-gfeh
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2836
reference_id
reference_type
scores
0
value 0.00135
scoring_system epss
scoring_elements 0.33171
published_at 2026-04-21T12:55:00Z
1
value 0.00135
scoring_system epss
scoring_elements 0.33253
published_at 2026-04-11T12:55:00Z
2
value 0.00135
scoring_system epss
scoring_elements 0.33213
published_at 2026-04-12T12:55:00Z
3
value 0.00135
scoring_system epss
scoring_elements 0.33189
published_at 2026-04-13T12:55:00Z
4
value 0.00135
scoring_system epss
scoring_elements 0.33229
published_at 2026-04-16T12:55:00Z
5
value 0.00135
scoring_system epss
scoring_elements 0.33207
published_at 2026-04-18T12:55:00Z
6
value 0.00135
scoring_system epss
scoring_elements 0.3318
published_at 2026-04-01T12:55:00Z
7
value 0.00135
scoring_system epss
scoring_elements 0.33307
published_at 2026-04-02T12:55:00Z
8
value 0.00135
scoring_system epss
scoring_elements 0.3334
published_at 2026-04-04T12:55:00Z
9
value 0.00135
scoring_system epss
scoring_elements 0.33173
published_at 2026-04-07T12:55:00Z
10
value 0.00135
scoring_system epss
scoring_elements 0.33216
published_at 2026-04-08T12:55:00Z
11
value 0.00135
scoring_system epss
scoring_elements 0.33249
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2836
1
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:48Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
2
reference_url http://www.securityfocus.com/bid/103858
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:48Z/
url http://www.securityfocus.com/bid/103858
3
reference_url http://www.securitytracker.com/id/1040707
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:48Z/
url http://www.securitytracker.com/id/1040707
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-2836
reference_id CVE-2018-2836
reference_type
scores
0
value 4.4
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:P/A:P
1
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-2836
6
reference_url https://security.gentoo.org/glsa/201805-08
reference_id GLSA-201805-08
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:48Z/
url https://security.gentoo.org/glsa/201805-08
fixed_packages
0
url pkg:deb/debian/virtualbox@5.2.10-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.2.10-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.10-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2018-2836
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-eum3-cpfq-gfeh
184
url VCID-ey8n-hxv6-9yhp
vulnerability_id VCID-ey8n-hxv6-9yhp
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-5892
reference_id
reference_type
scores
0
value 0.00064
scoring_system epss
scoring_elements 0.19826
published_at 2026-04-01T12:55:00Z
1
value 0.00064
scoring_system epss
scoring_elements 0.19973
published_at 2026-04-02T12:55:00Z
2
value 0.00064
scoring_system epss
scoring_elements 0.20031
published_at 2026-04-04T12:55:00Z
3
value 0.00064
scoring_system epss
scoring_elements 0.19758
published_at 2026-04-07T12:55:00Z
4
value 0.00064
scoring_system epss
scoring_elements 0.19838
published_at 2026-04-08T12:55:00Z
5
value 0.00064
scoring_system epss
scoring_elements 0.19891
published_at 2026-04-09T12:55:00Z
6
value 0.00064
scoring_system epss
scoring_elements 0.19899
published_at 2026-04-11T12:55:00Z
7
value 0.00064
scoring_system epss
scoring_elements 0.19855
published_at 2026-04-12T12:55:00Z
8
value 0.00064
scoring_system epss
scoring_elements 0.19797
published_at 2026-04-13T12:55:00Z
9
value 0.00064
scoring_system epss
scoring_elements 0.19769
published_at 2026-04-16T12:55:00Z
10
value 0.00064
scoring_system epss
scoring_elements 0.19772
published_at 2026-04-18T12:55:00Z
11
value 0.00064
scoring_system epss
scoring_elements 0.19784
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-5892
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5892
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5892
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0404
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0404
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0406
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0406
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0407
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0407
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=735410
reference_id 735410
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=735410
6
reference_url https://security.gentoo.org/glsa/201401-13
reference_id GLSA-201401-13
reference_type
scores
url https://security.gentoo.org/glsa/201401-13
fixed_packages
0
url pkg:deb/debian/virtualbox@4.3.6-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@4.3.6-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@4.3.6-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2013-5892
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ey8n-hxv6-9yhp
185
url VCID-ezds-9crc-1ue9
vulnerability_id VCID-ezds-9crc-1ue9
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2835
reference_id
reference_type
scores
0
value 0.00135
scoring_system epss
scoring_elements 0.33171
published_at 2026-04-21T12:55:00Z
1
value 0.00135
scoring_system epss
scoring_elements 0.33253
published_at 2026-04-11T12:55:00Z
2
value 0.00135
scoring_system epss
scoring_elements 0.33213
published_at 2026-04-12T12:55:00Z
3
value 0.00135
scoring_system epss
scoring_elements 0.33189
published_at 2026-04-13T12:55:00Z
4
value 0.00135
scoring_system epss
scoring_elements 0.33229
published_at 2026-04-16T12:55:00Z
5
value 0.00135
scoring_system epss
scoring_elements 0.33207
published_at 2026-04-18T12:55:00Z
6
value 0.00135
scoring_system epss
scoring_elements 0.3318
published_at 2026-04-01T12:55:00Z
7
value 0.00135
scoring_system epss
scoring_elements 0.33307
published_at 2026-04-02T12:55:00Z
8
value 0.00135
scoring_system epss
scoring_elements 0.3334
published_at 2026-04-04T12:55:00Z
9
value 0.00135
scoring_system epss
scoring_elements 0.33173
published_at 2026-04-07T12:55:00Z
10
value 0.00135
scoring_system epss
scoring_elements 0.33216
published_at 2026-04-08T12:55:00Z
11
value 0.00135
scoring_system epss
scoring_elements 0.33249
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2835
1
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:43Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
2
reference_url http://www.securityfocus.com/bid/103857
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:43Z/
url http://www.securityfocus.com/bid/103857
3
reference_url http://www.securitytracker.com/id/1040707
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:43Z/
url http://www.securitytracker.com/id/1040707
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-2835
reference_id CVE-2018-2835
reference_type
scores
0
value 4.4
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:P/A:P
1
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-2835
6
reference_url https://security.gentoo.org/glsa/201805-08
reference_id GLSA-201805-08
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:43Z/
url https://security.gentoo.org/glsa/201805-08
fixed_packages
0
url pkg:deb/debian/virtualbox@5.2.10-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.2.10-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.10-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2018-2835
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ezds-9crc-1ue9
186
url VCID-f16m-ykmk-a7by
vulnerability_id VCID-f16m-ykmk-a7by
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could result in privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14886
reference_id
reference_type
scores
0
value 0.0014
scoring_system epss
scoring_elements 0.3419
published_at 2026-04-21T12:55:00Z
1
value 0.0014
scoring_system epss
scoring_elements 0.343
published_at 2026-04-02T12:55:00Z
2
value 0.0014
scoring_system epss
scoring_elements 0.34265
published_at 2026-04-09T12:55:00Z
3
value 0.0014
scoring_system epss
scoring_elements 0.34266
published_at 2026-04-11T12:55:00Z
4
value 0.0014
scoring_system epss
scoring_elements 0.34225
published_at 2026-04-12T12:55:00Z
5
value 0.0014
scoring_system epss
scoring_elements 0.34201
published_at 2026-04-13T12:55:00Z
6
value 0.0014
scoring_system epss
scoring_elements 0.34224
published_at 2026-04-18T12:55:00Z
7
value 0.0014
scoring_system epss
scoring_elements 0.33961
published_at 2026-04-01T12:55:00Z
8
value 0.0014
scoring_system epss
scoring_elements 0.34329
published_at 2026-04-04T12:55:00Z
9
value 0.0014
scoring_system epss
scoring_elements 0.34193
published_at 2026-04-07T12:55:00Z
10
value 0.0014
scoring_system epss
scoring_elements 0.34236
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14886
1
reference_url https://security.gentoo.org/glsa/202101-15
reference_id GLSA-202101-15
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:42:59Z/
url https://security.gentoo.org/glsa/202101-15
2
reference_url https://www.zerodayinitiative.com/advisories/ZDI-20-1280/
reference_id ZDI-20-1280
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:42:59Z/
url https://www.zerodayinitiative.com/advisories/ZDI-20-1280/
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.16-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.16-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.16-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2020-14886
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f16m-ykmk-a7by
187
url VCID-f19n-sjcc-g3dc
vulnerability_id VCID-f19n-sjcc-g3dc
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2874
reference_id
reference_type
scores
0
value 0.00151
scoring_system epss
scoring_elements 0.35886
published_at 2026-04-02T12:55:00Z
1
value 0.00151
scoring_system epss
scoring_elements 0.35745
published_at 2026-04-21T12:55:00Z
2
value 0.00151
scoring_system epss
scoring_elements 0.35793
published_at 2026-04-18T12:55:00Z
3
value 0.00151
scoring_system epss
scoring_elements 0.35689
published_at 2026-04-01T12:55:00Z
4
value 0.00151
scoring_system epss
scoring_elements 0.35916
published_at 2026-04-04T12:55:00Z
5
value 0.00151
scoring_system epss
scoring_elements 0.35747
published_at 2026-04-07T12:55:00Z
6
value 0.00151
scoring_system epss
scoring_elements 0.35797
published_at 2026-04-08T12:55:00Z
7
value 0.00151
scoring_system epss
scoring_elements 0.3582
published_at 2026-04-09T12:55:00Z
8
value 0.00151
scoring_system epss
scoring_elements 0.35828
published_at 2026-04-11T12:55:00Z
9
value 0.00151
scoring_system epss
scoring_elements 0.35787
published_at 2026-04-12T12:55:00Z
10
value 0.00151
scoring_system epss
scoring_elements 0.35765
published_at 2026-04-13T12:55:00Z
11
value 0.00151
scoring_system epss
scoring_elements 0.35805
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2874
1
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
reference_id cpujul2019-5072835.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:15:59Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
2
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:15:59Z/
url https://security.gentoo.org/glsa/202101-09
fixed_packages
0
url pkg:deb/debian/virtualbox@6.0.10-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.0.10-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.0.10-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2019-2874
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f19n-sjcc-g3dc
188
url VCID-f1vr-5vj5-7kgz
vulnerability_id VCID-f1vr-5vj5-7kgz
summary Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 6.1.46 and Prior to 7.0.10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via RDP to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22018
reference_id
reference_type
scores
0
value 0.00577
scoring_system epss
scoring_elements 0.68748
published_at 2026-04-02T12:55:00Z
1
value 0.00577
scoring_system epss
scoring_elements 0.68769
published_at 2026-04-04T12:55:00Z
2
value 0.00577
scoring_system epss
scoring_elements 0.68747
published_at 2026-04-07T12:55:00Z
3
value 0.00577
scoring_system epss
scoring_elements 0.68798
published_at 2026-04-08T12:55:00Z
4
value 0.00577
scoring_system epss
scoring_elements 0.68817
published_at 2026-04-09T12:55:00Z
5
value 0.00577
scoring_system epss
scoring_elements 0.6884
published_at 2026-04-11T12:55:00Z
6
value 0.00792
scoring_system epss
scoring_elements 0.73955
published_at 2026-04-16T12:55:00Z
7
value 0.00792
scoring_system epss
scoring_elements 0.73956
published_at 2026-04-21T12:55:00Z
8
value 0.00792
scoring_system epss
scoring_elements 0.73964
published_at 2026-04-18T12:55:00Z
9
value 0.00792
scoring_system epss
scoring_elements 0.73922
published_at 2026-04-12T12:55:00Z
10
value 0.00792
scoring_system epss
scoring_elements 0.73914
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22018
1
reference_url https://www.oracle.com/security-alerts/cpujul2023.html
reference_id cpujul2023.html
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-13T17:48:46Z/
url https://www.oracle.com/security-alerts/cpujul2023.html
fixed_packages
0
url pkg:deb/debian/virtualbox@7.0.10-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.0.10-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.0.10-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2023-22018
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f1vr-5vj5-7kgz
189
url VCID-f352-rez5-9uc4
vulnerability_id VCID-f352-rez5-9uc4
summary Multiple vulnerabilities have been discovered in Oracle Virtualbox, the worst of which could result in privilege escalation from a guest to the host.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-39425
reference_id
reference_type
scores
0
value 0.08294
scoring_system epss
scoring_elements 0.92267
published_at 2026-04-18T12:55:00Z
1
value 0.08294
scoring_system epss
scoring_elements 0.92228
published_at 2026-04-02T12:55:00Z
2
value 0.08294
scoring_system epss
scoring_elements 0.92258
published_at 2026-04-11T12:55:00Z
3
value 0.08294
scoring_system epss
scoring_elements 0.92259
published_at 2026-04-12T12:55:00Z
4
value 0.08294
scoring_system epss
scoring_elements 0.92256
published_at 2026-04-13T12:55:00Z
5
value 0.08294
scoring_system epss
scoring_elements 0.92268
published_at 2026-04-21T12:55:00Z
6
value 0.08294
scoring_system epss
scoring_elements 0.92234
published_at 2026-04-04T12:55:00Z
7
value 0.08294
scoring_system epss
scoring_elements 0.92238
published_at 2026-04-07T12:55:00Z
8
value 0.08294
scoring_system epss
scoring_elements 0.92249
published_at 2026-04-08T12:55:00Z
9
value 0.08294
scoring_system epss
scoring_elements 0.92253
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-39425
1
reference_url https://security.gentoo.org/glsa/202212-03
reference_id GLSA-202212-03
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-17T14:19:43Z/
url https://security.gentoo.org/glsa/202212-03
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.40-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.40-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.40-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2022-39425
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f352-rez5-9uc4
190
url VCID-f4aa-tt4d-fudf
vulnerability_id VCID-f4aa-tt4d-fudf
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.16. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-3090
reference_id
reference_type
scores
0
value 0.0045
scoring_system epss
scoring_elements 0.63669
published_at 2026-04-21T12:55:00Z
1
value 0.0045
scoring_system epss
scoring_elements 0.63687
published_at 2026-04-11T12:55:00Z
2
value 0.0045
scoring_system epss
scoring_elements 0.63639
published_at 2026-04-13T12:55:00Z
3
value 0.0045
scoring_system epss
scoring_elements 0.63676
published_at 2026-04-16T12:55:00Z
4
value 0.0045
scoring_system epss
scoring_elements 0.63686
published_at 2026-04-18T12:55:00Z
5
value 0.0045
scoring_system epss
scoring_elements 0.63559
published_at 2026-04-01T12:55:00Z
6
value 0.0045
scoring_system epss
scoring_elements 0.63619
published_at 2026-04-02T12:55:00Z
7
value 0.0045
scoring_system epss
scoring_elements 0.63645
published_at 2026-04-04T12:55:00Z
8
value 0.0045
scoring_system epss
scoring_elements 0.63604
published_at 2026-04-07T12:55:00Z
9
value 0.0045
scoring_system epss
scoring_elements 0.63656
published_at 2026-04-08T12:55:00Z
10
value 0.0045
scoring_system epss
scoring_elements 0.63672
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-3090
1
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:23Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
2
reference_url http://www.securityfocus.com/bid/104764
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:23Z/
url http://www.securityfocus.com/bid/104764
3
reference_url http://www.securitytracker.com/id/1041296
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:23Z/
url http://www.securitytracker.com/id/1041296
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-3090
reference_id CVE-2018-3090
reference_type
scores
0
value 4.4
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:P/A:P
1
value 8.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-3090
fixed_packages
0
url pkg:deb/debian/virtualbox@5.2.16-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.2.16-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.16-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2018-3090
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f4aa-tt4d-fudf
191
url VCID-f847-mc3r-mke3
vulnerability_id VCID-f847-mc3r-mke3
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are prior to 5.2.24 and prior to 6.0.2. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N).
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:01:26Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:01:26Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2555
reference_id
reference_type
scores
0
value 0.00116
scoring_system epss
scoring_elements 0.30247
published_at 2026-04-21T12:55:00Z
1
value 0.00116
scoring_system epss
scoring_elements 0.30433
published_at 2026-04-02T12:55:00Z
2
value 0.00116
scoring_system epss
scoring_elements 0.30294
published_at 2026-04-13T12:55:00Z
3
value 0.00116
scoring_system epss
scoring_elements 0.30309
published_at 2026-04-16T12:55:00Z
4
value 0.00116
scoring_system epss
scoring_elements 0.30292
published_at 2026-04-18T12:55:00Z
5
value 0.00116
scoring_system epss
scoring_elements 0.30403
published_at 2026-04-01T12:55:00Z
6
value 0.00116
scoring_system epss
scoring_elements 0.30478
published_at 2026-04-04T12:55:00Z
7
value 0.00116
scoring_system epss
scoring_elements 0.30288
published_at 2026-04-07T12:55:00Z
8
value 0.00116
scoring_system epss
scoring_elements 0.30347
published_at 2026-04-08T12:55:00Z
9
value 0.00116
scoring_system epss
scoring_elements 0.30382
published_at 2026-04-09T12:55:00Z
10
value 0.00116
scoring_system epss
scoring_elements 0.30384
published_at 2026-04-11T12:55:00Z
11
value 0.00116
scoring_system epss
scoring_elements 0.30341
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2555
3
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:01:26Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
4
reference_url http://www.securityfocus.com/bid/106568
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:01:26Z/
url http://www.securityfocus.com/bid/106568
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-2555
reference_id CVE-2019-2555
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:N
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2019-2555
fixed_packages
0
url pkg:deb/debian/virtualbox@5.2.24-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.2.24-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.24-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2019-2555
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f847-mc3r-mke3
192
url VCID-f8a4-p5xx-sqab
vulnerability_id VCID-f8a4-p5xx-sqab
summary Multiple vulnerabilities have been discovered in Oracle Virtualbox, the worst of which could result in root privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2296
reference_id
reference_type
scores
0
value 0.00092
scoring_system epss
scoring_elements 0.25818
published_at 2026-04-21T12:55:00Z
1
value 0.00092
scoring_system epss
scoring_elements 0.25956
published_at 2026-04-09T12:55:00Z
2
value 0.00092
scoring_system epss
scoring_elements 0.25966
published_at 2026-04-11T12:55:00Z
3
value 0.00092
scoring_system epss
scoring_elements 0.25921
published_at 2026-04-12T12:55:00Z
4
value 0.00092
scoring_system epss
scoring_elements 0.25862
published_at 2026-04-13T12:55:00Z
5
value 0.00092
scoring_system epss
scoring_elements 0.25866
published_at 2026-04-16T12:55:00Z
6
value 0.00092
scoring_system epss
scoring_elements 0.25847
published_at 2026-04-18T12:55:00Z
7
value 0.00092
scoring_system epss
scoring_elements 0.25945
published_at 2026-04-01T12:55:00Z
8
value 0.00092
scoring_system epss
scoring_elements 0.26027
published_at 2026-04-02T12:55:00Z
9
value 0.00092
scoring_system epss
scoring_elements 0.26069
published_at 2026-04-04T12:55:00Z
10
value 0.00092
scoring_system epss
scoring_elements 0.25835
published_at 2026-04-07T12:55:00Z
11
value 0.00092
scoring_system epss
scoring_elements 0.25904
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2296
1
reference_url https://security.archlinux.org/ASA-202104-9
reference_id ASA-202104-9
reference_type
scores
url https://security.archlinux.org/ASA-202104-9
2
reference_url https://security.archlinux.org/AVG-1846
reference_id AVG-1846
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1846
3
reference_url https://security.gentoo.org/glsa/202208-36
reference_id GLSA-202208-36
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:47Z/
url https://security.gentoo.org/glsa/202208-36
4
reference_url https://www.zerodayinitiative.com/advisories/ZDI-21-459/
reference_id ZDI-21-459
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:47Z/
url https://www.zerodayinitiative.com/advisories/ZDI-21-459/
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.20-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.20-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.20-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2021-2296
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f8a4-p5xx-sqab
193
url VCID-farh-f8xm-sqg6
vulnerability_id VCID-farh-f8xm-sqg6
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could result in privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14872
reference_id
reference_type
scores
0
value 0.00047
scoring_system epss
scoring_elements 0.14328
published_at 2026-04-21T12:55:00Z
1
value 0.00047
scoring_system epss
scoring_elements 0.14493
published_at 2026-04-02T12:55:00Z
2
value 0.00047
scoring_system epss
scoring_elements 0.14365
published_at 2026-04-13T12:55:00Z
3
value 0.00047
scoring_system epss
scoring_elements 0.14257
published_at 2026-04-16T12:55:00Z
4
value 0.00047
scoring_system epss
scoring_elements 0.14258
published_at 2026-04-18T12:55:00Z
5
value 0.00047
scoring_system epss
scoring_elements 0.1443
published_at 2026-04-01T12:55:00Z
6
value 0.00047
scoring_system epss
scoring_elements 0.14564
published_at 2026-04-04T12:55:00Z
7
value 0.00047
scoring_system epss
scoring_elements 0.14372
published_at 2026-04-07T12:55:00Z
8
value 0.00047
scoring_system epss
scoring_elements 0.14456
published_at 2026-04-08T12:55:00Z
9
value 0.00047
scoring_system epss
scoring_elements 0.1451
published_at 2026-04-09T12:55:00Z
10
value 0.00047
scoring_system epss
scoring_elements 0.1446
published_at 2026-04-11T12:55:00Z
11
value 0.00047
scoring_system epss
scoring_elements 0.14423
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14872
1
reference_url https://security.gentoo.org/glsa/202101-15
reference_id GLSA-202101-15
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T19:53:54Z/
url https://security.gentoo.org/glsa/202101-15
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.16-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.16-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.16-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2020-14872
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-farh-f8xm-sqg6
194
url VCID-ffa4-1vba-zbbc
vulnerability_id VCID-ffa4-1vba-zbbc
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are prior to 5.2.24 and prior to 6.0.2. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 5.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:43Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:43Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2446
reference_id
reference_type
scores
0
value 0.00158
scoring_system epss
scoring_elements 0.36578
published_at 2026-04-21T12:55:00Z
1
value 0.00158
scoring_system epss
scoring_elements 0.36724
published_at 2026-04-02T12:55:00Z
2
value 0.00158
scoring_system epss
scoring_elements 0.3661
published_at 2026-04-13T12:55:00Z
3
value 0.00158
scoring_system epss
scoring_elements 0.36656
published_at 2026-04-16T12:55:00Z
4
value 0.00158
scoring_system epss
scoring_elements 0.36638
published_at 2026-04-18T12:55:00Z
5
value 0.00158
scoring_system epss
scoring_elements 0.36553
published_at 2026-04-01T12:55:00Z
6
value 0.00158
scoring_system epss
scoring_elements 0.36756
published_at 2026-04-04T12:55:00Z
7
value 0.00158
scoring_system epss
scoring_elements 0.36592
published_at 2026-04-07T12:55:00Z
8
value 0.00158
scoring_system epss
scoring_elements 0.36645
published_at 2026-04-08T12:55:00Z
9
value 0.00158
scoring_system epss
scoring_elements 0.36662
published_at 2026-04-09T12:55:00Z
10
value 0.00158
scoring_system epss
scoring_elements 0.36671
published_at 2026-04-11T12:55:00Z
11
value 0.00158
scoring_system epss
scoring_elements 0.36636
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2446
3
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:43Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
4
reference_url http://www.securityfocus.com/bid/106568
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:43Z/
url http://www.securityfocus.com/bid/106568
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-2446
reference_id CVE-2019-2446
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:N
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2019-2446
fixed_packages
0
url pkg:deb/debian/virtualbox@5.2.24-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.2.24-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.24-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2019-2446
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ffa4-1vba-zbbc
195
url VCID-fg1p-7ap7-2bbc
vulnerability_id VCID-fg1p-7ap7-2bbc
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2859
reference_id
reference_type
scores
0
value 0.00147
scoring_system epss
scoring_elements 0.35132
published_at 2026-04-02T12:55:00Z
1
value 0.00147
scoring_system epss
scoring_elements 0.35032
published_at 2026-04-21T12:55:00Z
2
value 0.00147
scoring_system epss
scoring_elements 0.35079
published_at 2026-04-18T12:55:00Z
3
value 0.00147
scoring_system epss
scoring_elements 0.34933
published_at 2026-04-01T12:55:00Z
4
value 0.00147
scoring_system epss
scoring_elements 0.35161
published_at 2026-04-04T12:55:00Z
5
value 0.00147
scoring_system epss
scoring_elements 0.3504
published_at 2026-04-07T12:55:00Z
6
value 0.00147
scoring_system epss
scoring_elements 0.35084
published_at 2026-04-08T12:55:00Z
7
value 0.00147
scoring_system epss
scoring_elements 0.35111
published_at 2026-04-09T12:55:00Z
8
value 0.00147
scoring_system epss
scoring_elements 0.35115
published_at 2026-04-11T12:55:00Z
9
value 0.00147
scoring_system epss
scoring_elements 0.35082
published_at 2026-04-12T12:55:00Z
10
value 0.00147
scoring_system epss
scoring_elements 0.35057
published_at 2026-04-13T12:55:00Z
11
value 0.00147
scoring_system epss
scoring_elements 0.35093
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2859
1
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
reference_id cpujul2019-5072835.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:16:39Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
2
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:16:39Z/
url https://security.gentoo.org/glsa/202101-09
fixed_packages
0
url pkg:deb/debian/virtualbox@6.0.10-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.0.10-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.0.10-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2019-2859
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fg1p-7ap7-2bbc
196
url VCID-fhuf-7749-u7dd
vulnerability_id VCID-fhuf-7749-u7dd
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-3290
reference_id
reference_type
scores
0
value 0.0045
scoring_system epss
scoring_elements 0.63619
published_at 2026-04-02T12:55:00Z
1
value 0.0045
scoring_system epss
scoring_elements 0.63669
published_at 2026-04-21T12:55:00Z
2
value 0.0045
scoring_system epss
scoring_elements 0.63676
published_at 2026-04-16T12:55:00Z
3
value 0.0045
scoring_system epss
scoring_elements 0.63686
published_at 2026-04-18T12:55:00Z
4
value 0.0045
scoring_system epss
scoring_elements 0.63559
published_at 2026-04-01T12:55:00Z
5
value 0.0045
scoring_system epss
scoring_elements 0.63645
published_at 2026-04-04T12:55:00Z
6
value 0.0045
scoring_system epss
scoring_elements 0.63604
published_at 2026-04-07T12:55:00Z
7
value 0.0045
scoring_system epss
scoring_elements 0.63656
published_at 2026-04-08T12:55:00Z
8
value 0.0045
scoring_system epss
scoring_elements 0.63672
published_at 2026-04-12T12:55:00Z
9
value 0.0045
scoring_system epss
scoring_elements 0.63687
published_at 2026-04-11T12:55:00Z
10
value 0.0045
scoring_system epss
scoring_elements 0.63639
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-3290
1
reference_url http://www.securitytracker.com/id/1041887
reference_id 1041887
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:00Z/
url http://www.securitytracker.com/id/1041887
2
reference_url http://www.securityfocus.com/bid/105619
reference_id 105619
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:00Z/
url http://www.securityfocus.com/bid/105619
fixed_packages
0
url pkg:deb/debian/virtualbox@5.2.20-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.2.20-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.20-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2018-3290
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fhuf-7749-u7dd
197
url VCID-fppm-1b8g-zfg9
vulnerability_id VCID-fppm-1b8g-zfg9
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2704
reference_id
reference_type
scores
0
value 0.00123
scoring_system epss
scoring_elements 0.31474
published_at 2026-04-21T12:55:00Z
1
value 0.00123
scoring_system epss
scoring_elements 0.31623
published_at 2026-04-02T12:55:00Z
2
value 0.00123
scoring_system epss
scoring_elements 0.31573
published_at 2026-04-11T12:55:00Z
3
value 0.00123
scoring_system epss
scoring_elements 0.31531
published_at 2026-04-12T12:55:00Z
4
value 0.00123
scoring_system epss
scoring_elements 0.31494
published_at 2026-04-13T12:55:00Z
5
value 0.00123
scoring_system epss
scoring_elements 0.31527
published_at 2026-04-16T12:55:00Z
6
value 0.00123
scoring_system epss
scoring_elements 0.31505
published_at 2026-04-18T12:55:00Z
7
value 0.00123
scoring_system epss
scoring_elements 0.31486
published_at 2026-04-01T12:55:00Z
8
value 0.00123
scoring_system epss
scoring_elements 0.31668
published_at 2026-04-04T12:55:00Z
9
value 0.00123
scoring_system epss
scoring_elements 0.31487
published_at 2026-04-07T12:55:00Z
10
value 0.00123
scoring_system epss
scoring_elements 0.31539
published_at 2026-04-08T12:55:00Z
11
value 0.00123
scoring_system epss
scoring_elements 0.31569
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2704
1
reference_url https://security.gentoo.org/glsa/202004-02
reference_id GLSA-202004-02
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:01:32Z/
url https://security.gentoo.org/glsa/202004-02
2
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:01:32Z/
url https://security.gentoo.org/glsa/202101-09
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.2-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.2-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.2-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2020-2704
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fppm-1b8g-zfg9
198
url VCID-frtc-w4gw-pugj
vulnerability_id VCID-frtc-w4gw-pugj
summary Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.12 and 7.2.2. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-62590
reference_id
reference_type
scores
0
value 0.00027
scoring_system epss
scoring_elements 0.07771
published_at 2026-04-21T12:55:00Z
1
value 0.00027
scoring_system epss
scoring_elements 0.07622
published_at 2026-04-18T12:55:00Z
2
value 0.00027
scoring_system epss
scoring_elements 0.07651
published_at 2026-04-02T12:55:00Z
3
value 0.00027
scoring_system epss
scoring_elements 0.07694
published_at 2026-04-04T12:55:00Z
4
value 0.00027
scoring_system epss
scoring_elements 0.07663
published_at 2026-04-07T12:55:00Z
5
value 0.00027
scoring_system epss
scoring_elements 0.07723
published_at 2026-04-08T12:55:00Z
6
value 0.00027
scoring_system epss
scoring_elements 0.07742
published_at 2026-04-09T12:55:00Z
7
value 0.00027
scoring_system epss
scoring_elements 0.0774
published_at 2026-04-11T12:55:00Z
8
value 0.00027
scoring_system epss
scoring_elements 0.07726
published_at 2026-04-12T12:55:00Z
9
value 0.00027
scoring_system epss
scoring_elements 0.07711
published_at 2026-04-13T12:55:00Z
10
value 0.00027
scoring_system epss
scoring_elements 0.07635
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-62590
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118542
reference_id 1118542
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118542
2
reference_url https://www.oracle.com/security-alerts/cpuoct2025.html
reference_id cpuoct2025.html
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-23T03:55:32Z/
url https://www.oracle.com/security-alerts/cpuoct2025.html
fixed_packages
0
url pkg:deb/debian/virtualbox@7.2.4-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.2.4-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.4-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2025-62590
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-frtc-w4gw-pugj
199
url VCID-fuce-smna-wych
vulnerability_id VCID-fuce-smna-wych
summary Multiple vulnerabilities have been discovered in Oracle Virtualbox, the worst of which could result in root privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2309
reference_id
reference_type
scores
0
value 0.00093
scoring_system epss
scoring_elements 0.26018
published_at 2026-04-21T12:55:00Z
1
value 0.00093
scoring_system epss
scoring_elements 0.26166
published_at 2026-04-09T12:55:00Z
2
value 0.00093
scoring_system epss
scoring_elements 0.26174
published_at 2026-04-11T12:55:00Z
3
value 0.00093
scoring_system epss
scoring_elements 0.26129
published_at 2026-04-12T12:55:00Z
4
value 0.00093
scoring_system epss
scoring_elements 0.2607
published_at 2026-04-13T12:55:00Z
5
value 0.00093
scoring_system epss
scoring_elements 0.26074
published_at 2026-04-16T12:55:00Z
6
value 0.00093
scoring_system epss
scoring_elements 0.26052
published_at 2026-04-18T12:55:00Z
7
value 0.00093
scoring_system epss
scoring_elements 0.2616
published_at 2026-04-01T12:55:00Z
8
value 0.00093
scoring_system epss
scoring_elements 0.26241
published_at 2026-04-02T12:55:00Z
9
value 0.00093
scoring_system epss
scoring_elements 0.26281
published_at 2026-04-04T12:55:00Z
10
value 0.00093
scoring_system epss
scoring_elements 0.26051
published_at 2026-04-07T12:55:00Z
11
value 0.00093
scoring_system epss
scoring_elements 0.26117
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2309
1
reference_url https://security.archlinux.org/ASA-202104-9
reference_id ASA-202104-9
reference_type
scores
url https://security.archlinux.org/ASA-202104-9
2
reference_url https://security.archlinux.org/AVG-1846
reference_id AVG-1846
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1846
3
reference_url https://security.gentoo.org/glsa/202208-36
reference_id GLSA-202208-36
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T13:58:52Z/
url https://security.gentoo.org/glsa/202208-36
4
reference_url https://www.zerodayinitiative.com/advisories/ZDI-21-461/
reference_id ZDI-21-461
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T13:58:52Z/
url https://www.zerodayinitiative.com/advisories/ZDI-21-461/
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.20-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.20-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.20-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2021-2309
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fuce-smna-wych
200
url VCID-fuqf-teut-wugw
vulnerability_id VCID-fuqf-teut-wugw
summary Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-21957
reference_id
reference_type
scores
0
value 0.00029
scoring_system epss
scoring_elements 0.0819
published_at 2026-04-21T12:55:00Z
1
value 0.00029
scoring_system epss
scoring_elements 0.08031
published_at 2026-04-18T12:55:00Z
2
value 0.00029
scoring_system epss
scoring_elements 0.08113
published_at 2026-04-02T12:55:00Z
3
value 0.00029
scoring_system epss
scoring_elements 0.08155
published_at 2026-04-04T12:55:00Z
4
value 0.00029
scoring_system epss
scoring_elements 0.08102
published_at 2026-04-07T12:55:00Z
5
value 0.00029
scoring_system epss
scoring_elements 0.08161
published_at 2026-04-08T12:55:00Z
6
value 0.00029
scoring_system epss
scoring_elements 0.08183
published_at 2026-04-09T12:55:00Z
7
value 0.00029
scoring_system epss
scoring_elements 0.08177
published_at 2026-04-11T12:55:00Z
8
value 0.00029
scoring_system epss
scoring_elements 0.08157
published_at 2026-04-12T12:55:00Z
9
value 0.00029
scoring_system epss
scoring_elements 0.0814
published_at 2026-04-13T12:55:00Z
10
value 0.00029
scoring_system epss
scoring_elements 0.08046
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-21957
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126117
reference_id 1126117
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126117
2
reference_url https://www.oracle.com/security-alerts/cpujan2026.html
reference_id cpujan2026.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-22T04:55:40Z/
url https://www.oracle.com/security-alerts/cpujan2026.html
fixed_packages
0
url pkg:deb/debian/virtualbox@7.2.6-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2026-21957
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fuqf-teut-wugw
201
url VCID-fv28-4e9k-pqhv
vulnerability_id VCID-fv28-4e9k-pqhv
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14675
reference_id
reference_type
scores
0
value 0.00124
scoring_system epss
scoring_elements 0.31559
published_at 2026-04-01T12:55:00Z
1
value 0.00124
scoring_system epss
scoring_elements 0.31696
published_at 2026-04-02T12:55:00Z
2
value 0.00124
scoring_system epss
scoring_elements 0.31643
published_at 2026-04-11T12:55:00Z
3
value 0.00124
scoring_system epss
scoring_elements 0.31601
published_at 2026-04-12T12:55:00Z
4
value 0.00124
scoring_system epss
scoring_elements 0.31565
published_at 2026-04-13T12:55:00Z
5
value 0.00124
scoring_system epss
scoring_elements 0.316
published_at 2026-04-16T12:55:00Z
6
value 0.00124
scoring_system epss
scoring_elements 0.31577
published_at 2026-04-18T12:55:00Z
7
value 0.00124
scoring_system epss
scoring_elements 0.31545
published_at 2026-04-21T12:55:00Z
8
value 0.00124
scoring_system epss
scoring_elements 0.3174
published_at 2026-04-04T12:55:00Z
9
value 0.00124
scoring_system epss
scoring_elements 0.31558
published_at 2026-04-07T12:55:00Z
10
value 0.00124
scoring_system epss
scoring_elements 0.3161
published_at 2026-04-08T12:55:00Z
11
value 0.00124
scoring_system epss
scoring_elements 0.31639
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14675
1
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:48Z/
url https://security.gentoo.org/glsa/202101-09
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html
reference_id msg00068.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:48Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html
reference_id msg00079.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:48Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html
4
reference_url https://www.zerodayinitiative.com/advisories/ZDI-20-895/
reference_id ZDI-20-895
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:48Z/
url https://www.zerodayinitiative.com/advisories/ZDI-20-895/
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.12-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.12-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.12-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2020-14675
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fv28-4e9k-pqhv
202
url VCID-fv7j-1ank-mffg
vulnerability_id VCID-fv7j-1ank-mffg
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which allows local users to escalate privileges.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5608
reference_id
reference_type
scores
0
value 0.00056
scoring_system epss
scoring_elements 0.17531
published_at 2026-04-21T12:55:00Z
1
value 0.00056
scoring_system epss
scoring_elements 0.17542
published_at 2026-04-13T12:55:00Z
2
value 0.00056
scoring_system epss
scoring_elements 0.17487
published_at 2026-04-16T12:55:00Z
3
value 0.00056
scoring_system epss
scoring_elements 0.17495
published_at 2026-04-18T12:55:00Z
4
value 0.00056
scoring_system epss
scoring_elements 0.17541
published_at 2026-04-01T12:55:00Z
5
value 0.00056
scoring_system epss
scoring_elements 0.17704
published_at 2026-04-02T12:55:00Z
6
value 0.00056
scoring_system epss
scoring_elements 0.17751
published_at 2026-04-04T12:55:00Z
7
value 0.00056
scoring_system epss
scoring_elements 0.17473
published_at 2026-04-07T12:55:00Z
8
value 0.00056
scoring_system epss
scoring_elements 0.17563
published_at 2026-04-08T12:55:00Z
9
value 0.00056
scoring_system epss
scoring_elements 0.17623
published_at 2026-04-09T12:55:00Z
10
value 0.00056
scoring_system epss
scoring_elements 0.17641
published_at 2026-04-11T12:55:00Z
11
value 0.00056
scoring_system epss
scoring_elements 0.17594
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5608
1
reference_url http://www.securityfocus.com/bid/93718
reference_id 93718
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:53Z/
url http://www.securityfocus.com/bid/93718
2
reference_url https://security.gentoo.org/glsa/201612-27
reference_id GLSA-201612-27
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:53Z/
url https://security.gentoo.org/glsa/201612-27
fixed_packages
0
url pkg:deb/debian/virtualbox@5.1.8-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.1.8-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.1.8-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2016-5608
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fv7j-1ank-mffg
203
url VCID-g2r7-1vm7-a7h2
vulnerability_id VCID-g2r7-1vm7-a7h2
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are prior to 5.2.24 and prior to 6.0.2. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 7.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H).
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:56:13Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2526
reference_id
reference_type
scores
0
value 0.00136
scoring_system epss
scoring_elements 0.33375
published_at 2026-04-21T12:55:00Z
1
value 0.00136
scoring_system epss
scoring_elements 0.33395
published_at 2026-04-13T12:55:00Z
2
value 0.00136
scoring_system epss
scoring_elements 0.33431
published_at 2026-04-16T12:55:00Z
3
value 0.00136
scoring_system epss
scoring_elements 0.33406
published_at 2026-04-18T12:55:00Z
4
value 0.00136
scoring_system epss
scoring_elements 0.33366
published_at 2026-04-01T12:55:00Z
5
value 0.00136
scoring_system epss
scoring_elements 0.33504
published_at 2026-04-02T12:55:00Z
6
value 0.00136
scoring_system epss
scoring_elements 0.33536
published_at 2026-04-04T12:55:00Z
7
value 0.00136
scoring_system epss
scoring_elements 0.33377
published_at 2026-04-07T12:55:00Z
8
value 0.00136
scoring_system epss
scoring_elements 0.33422
published_at 2026-04-08T12:55:00Z
9
value 0.00136
scoring_system epss
scoring_elements 0.33456
published_at 2026-04-09T12:55:00Z
10
value 0.00136
scoring_system epss
scoring_elements 0.3346
published_at 2026-04-11T12:55:00Z
11
value 0.00136
scoring_system epss
scoring_elements 0.33419
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2526
2
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:56:13Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
3
reference_url http://www.securityfocus.com/bid/106568
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:56:13Z/
url http://www.securityfocus.com/bid/106568
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-2526
reference_id CVE-2019-2526
reference_type
scores
0
value 4.4
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:P/A:P
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-2526
fixed_packages
0
url pkg:deb/debian/virtualbox@5.2.24-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.2.24-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.24-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2019-2526
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g2r7-1vm7-a7h2
204
url VCID-g2rq-w5bs-2qab
vulnerability_id VCID-g2rq-w5bs-2qab
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2926
reference_id
reference_type
scores
0
value 0.00149
scoring_system epss
scoring_elements 0.35371
published_at 2026-04-21T12:55:00Z
1
value 0.00174
scoring_system epss
scoring_elements 0.38792
published_at 2026-04-07T12:55:00Z
2
value 0.00174
scoring_system epss
scoring_elements 0.38868
published_at 2026-04-11T12:55:00Z
3
value 0.00174
scoring_system epss
scoring_elements 0.38831
published_at 2026-04-12T12:55:00Z
4
value 0.00174
scoring_system epss
scoring_elements 0.38803
published_at 2026-04-13T12:55:00Z
5
value 0.00174
scoring_system epss
scoring_elements 0.3885
published_at 2026-04-16T12:55:00Z
6
value 0.00174
scoring_system epss
scoring_elements 0.38828
published_at 2026-04-18T12:55:00Z
7
value 0.00174
scoring_system epss
scoring_elements 0.38842
published_at 2026-04-02T12:55:00Z
8
value 0.00174
scoring_system epss
scoring_elements 0.38862
published_at 2026-04-04T12:55:00Z
9
value 0.00174
scoring_system epss
scoring_elements 0.38704
published_at 2026-04-01T12:55:00Z
10
value 0.00174
scoring_system epss
scoring_elements 0.38844
published_at 2026-04-08T12:55:00Z
11
value 0.00174
scoring_system epss
scoring_elements 0.38855
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2926
1
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:15:11Z/
url http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
2
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
3
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-2926
reference_id CVE-2019-2926
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
1
value 2.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
url https://nvd.nist.gov/vuln/detail/CVE-2019-2926
4
reference_url https://security.gentoo.org/glsa/202004-02
reference_id GLSA-202004-02
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:15:11Z/
url https://security.gentoo.org/glsa/202004-02
5
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:15:11Z/
url https://security.gentoo.org/glsa/202101-09
fixed_packages
0
url pkg:deb/debian/virtualbox@6.0.14-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.0.14-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.0.14-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2019-2926
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g2rq-w5bs-2qab
205
url VCID-g4su-dvz9-5qhm
vulnerability_id VCID-g4su-dvz9-5qhm
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2864
reference_id
reference_type
scores
0
value 0.0016
scoring_system epss
scoring_elements 0.37041
published_at 2026-04-02T12:55:00Z
1
value 0.0016
scoring_system epss
scoring_elements 0.36882
published_at 2026-04-21T12:55:00Z
2
value 0.0016
scoring_system epss
scoring_elements 0.36942
published_at 2026-04-18T12:55:00Z
3
value 0.0016
scoring_system epss
scoring_elements 0.36871
published_at 2026-04-01T12:55:00Z
4
value 0.0016
scoring_system epss
scoring_elements 0.37074
published_at 2026-04-04T12:55:00Z
5
value 0.0016
scoring_system epss
scoring_elements 0.36902
published_at 2026-04-07T12:55:00Z
6
value 0.0016
scoring_system epss
scoring_elements 0.36953
published_at 2026-04-08T12:55:00Z
7
value 0.0016
scoring_system epss
scoring_elements 0.36966
published_at 2026-04-09T12:55:00Z
8
value 0.0016
scoring_system epss
scoring_elements 0.36974
published_at 2026-04-11T12:55:00Z
9
value 0.0016
scoring_system epss
scoring_elements 0.36939
published_at 2026-04-12T12:55:00Z
10
value 0.0016
scoring_system epss
scoring_elements 0.36913
published_at 2026-04-13T12:55:00Z
11
value 0.0016
scoring_system epss
scoring_elements 0.36958
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2864
1
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
reference_id cpujul2019-5072835.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:16:37Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
2
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:16:37Z/
url https://security.gentoo.org/glsa/202101-09
fixed_packages
0
url pkg:deb/debian/virtualbox@6.0.10-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.0.10-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.0.10-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2019-2864
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g4su-dvz9-5qhm
206
url VCID-ge84-ygny-wqe3
vulnerability_id VCID-ge84-ygny-wqe3
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0377
reference_id
reference_type
scores
0
value 0.00105
scoring_system epss
scoring_elements 0.2865
published_at 2026-04-01T12:55:00Z
1
value 0.00105
scoring_system epss
scoring_elements 0.28734
published_at 2026-04-02T12:55:00Z
2
value 0.00105
scoring_system epss
scoring_elements 0.28782
published_at 2026-04-04T12:55:00Z
3
value 0.00105
scoring_system epss
scoring_elements 0.28589
published_at 2026-04-07T12:55:00Z
4
value 0.00105
scoring_system epss
scoring_elements 0.28654
published_at 2026-04-08T12:55:00Z
5
value 0.00105
scoring_system epss
scoring_elements 0.28695
published_at 2026-04-09T12:55:00Z
6
value 0.00105
scoring_system epss
scoring_elements 0.28696
published_at 2026-04-11T12:55:00Z
7
value 0.00105
scoring_system epss
scoring_elements 0.28652
published_at 2026-04-12T12:55:00Z
8
value 0.00105
scoring_system epss
scoring_elements 0.28605
published_at 2026-04-13T12:55:00Z
9
value 0.00105
scoring_system epss
scoring_elements 0.28625
published_at 2026-04-16T12:55:00Z
10
value 0.00105
scoring_system epss
scoring_elements 0.286
published_at 2026-04-18T12:55:00Z
11
value 0.00105
scoring_system epss
scoring_elements 0.28551
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0377
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0377
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0377
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0418
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0418
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775888
reference_id 775888
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775888
4
reference_url https://security.gentoo.org/glsa/201612-27
reference_id GLSA-201612-27
reference_type
scores
url https://security.gentoo.org/glsa/201612-27
fixed_packages
0
url pkg:deb/debian/virtualbox@4.3.2-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@4.3.2-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@4.3.2-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2015-0377
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ge84-ygny-wqe3
207
url VCID-gf6q-h34j-1uak
vulnerability_id VCID-gf6q-h34j-1uak
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:27Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2911
reference_id
reference_type
scores
0
value 0.00165
scoring_system epss
scoring_elements 0.37586
published_at 2026-04-21T12:55:00Z
1
value 0.00165
scoring_system epss
scoring_elements 0.37605
published_at 2026-04-07T12:55:00Z
2
value 0.00165
scoring_system epss
scoring_elements 0.37656
published_at 2026-04-08T12:55:00Z
3
value 0.00165
scoring_system epss
scoring_elements 0.37669
published_at 2026-04-09T12:55:00Z
4
value 0.00165
scoring_system epss
scoring_elements 0.37683
published_at 2026-04-11T12:55:00Z
5
value 0.00165
scoring_system epss
scoring_elements 0.37649
published_at 2026-04-12T12:55:00Z
6
value 0.00165
scoring_system epss
scoring_elements 0.37621
published_at 2026-04-13T12:55:00Z
7
value 0.00165
scoring_system epss
scoring_elements 0.37668
published_at 2026-04-16T12:55:00Z
8
value 0.00165
scoring_system epss
scoring_elements 0.3765
published_at 2026-04-18T12:55:00Z
9
value 0.00165
scoring_system epss
scoring_elements 0.37519
published_at 2026-04-01T12:55:00Z
10
value 0.00165
scoring_system epss
scoring_elements 0.37701
published_at 2026-04-02T12:55:00Z
11
value 0.00165
scoring_system epss
scoring_elements 0.37726
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2911
2
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:27Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
3
reference_url https://www.zerodayinitiative.com/advisories/ZDI-20-551/
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:27Z/
url https://www.zerodayinitiative.com/advisories/ZDI-20-551/
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2911
reference_id CVE-2020-2911
reference_type
scores
0
value 4.4
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:P/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
2
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-2911
7
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:27Z/
url https://security.gentoo.org/glsa/202101-09
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.6-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.6-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.6-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2020-2911
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gf6q-h34j-1uak
208
url VCID-gguv-hvra-23ff
vulnerability_id VCID-gguv-hvra-23ff
summary Multiple vulnerabilities have been discovered in Oracle Virtualbox, the worst of which could result in root privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2282
reference_id
reference_type
scores
0
value 0.00154
scoring_system epss
scoring_elements 0.36107
published_at 2026-04-21T12:55:00Z
1
value 0.00154
scoring_system epss
scoring_elements 0.36158
published_at 2026-04-12T12:55:00Z
2
value 0.00154
scoring_system epss
scoring_elements 0.36132
published_at 2026-04-13T12:55:00Z
3
value 0.00154
scoring_system epss
scoring_elements 0.36174
published_at 2026-04-16T12:55:00Z
4
value 0.00154
scoring_system epss
scoring_elements 0.36159
published_at 2026-04-18T12:55:00Z
5
value 0.00154
scoring_system epss
scoring_elements 0.36058
published_at 2026-04-01T12:55:00Z
6
value 0.00154
scoring_system epss
scoring_elements 0.36253
published_at 2026-04-02T12:55:00Z
7
value 0.00154
scoring_system epss
scoring_elements 0.36286
published_at 2026-04-04T12:55:00Z
8
value 0.00154
scoring_system epss
scoring_elements 0.36122
published_at 2026-04-07T12:55:00Z
9
value 0.00154
scoring_system epss
scoring_elements 0.36171
published_at 2026-04-08T12:55:00Z
10
value 0.00154
scoring_system epss
scoring_elements 0.36189
published_at 2026-04-09T12:55:00Z
11
value 0.00154
scoring_system epss
scoring_elements 0.36195
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2282
1
reference_url https://security.archlinux.org/ASA-202104-9
reference_id ASA-202104-9
reference_type
scores
url https://security.archlinux.org/ASA-202104-9
2
reference_url https://security.archlinux.org/AVG-1846
reference_id AVG-1846
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1846
3
reference_url https://security.gentoo.org/glsa/202208-36
reference_id GLSA-202208-36
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:42:42Z/
url https://security.gentoo.org/glsa/202208-36
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.20-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.20-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.20-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2021-2282
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gguv-hvra-23ff
209
url VCID-gjku-jvzb-dkca
vulnerability_id VCID-gjku-jvzb-dkca
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2844
reference_id
reference_type
scores
0
value 0.03312
scoring_system epss
scoring_elements 0.87269
published_at 2026-04-21T12:55:00Z
1
value 0.03312
scoring_system epss
scoring_elements 0.87254
published_at 2026-04-09T12:55:00Z
2
value 0.03312
scoring_system epss
scoring_elements 0.87267
published_at 2026-04-11T12:55:00Z
3
value 0.03312
scoring_system epss
scoring_elements 0.87261
published_at 2026-04-12T12:55:00Z
4
value 0.03312
scoring_system epss
scoring_elements 0.87256
published_at 2026-04-13T12:55:00Z
5
value 0.03312
scoring_system epss
scoring_elements 0.87272
published_at 2026-04-16T12:55:00Z
6
value 0.03312
scoring_system epss
scoring_elements 0.87276
published_at 2026-04-18T12:55:00Z
7
value 0.03312
scoring_system epss
scoring_elements 0.87204
published_at 2026-04-01T12:55:00Z
8
value 0.03312
scoring_system epss
scoring_elements 0.87214
published_at 2026-04-02T12:55:00Z
9
value 0.03312
scoring_system epss
scoring_elements 0.8723
published_at 2026-04-04T12:55:00Z
10
value 0.03312
scoring_system epss
scoring_elements 0.87227
published_at 2026-04-07T12:55:00Z
11
value 0.03312
scoring_system epss
scoring_elements 0.87247
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2844
1
reference_url https://www.voidsecurity.in/2018/08/from-compiler-optimization-to-code.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:59Z/
url https://www.voidsecurity.in/2018/08/from-compiler-optimization-to-code.html
2
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:59Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
3
reference_url http://www.securityfocus.com/bid/103855
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:59Z/
url http://www.securityfocus.com/bid/103855
4
reference_url http://www.securitytracker.com/id/1040707
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:59Z/
url http://www.securitytracker.com/id/1040707
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-2844
reference_id CVE-2018-2844
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-2844
7
reference_url https://security.gentoo.org/glsa/201805-08
reference_id GLSA-201805-08
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:59Z/
url https://security.gentoo.org/glsa/201805-08
fixed_packages
0
url pkg:deb/debian/virtualbox@5.2.10-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.2.10-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.10-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2018-2844
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gjku-jvzb-dkca
210
url VCID-gm8u-k7vg-fbes
vulnerability_id VCID-gm8u-k7vg-fbes
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are prior to 5.2.24 and prior to 6.0.2. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N).
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:01:25Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:01:25Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2556
reference_id
reference_type
scores
0
value 0.00098
scoring_system epss
scoring_elements 0.26942
published_at 2026-04-21T12:55:00Z
1
value 0.00098
scoring_system epss
scoring_elements 0.27151
published_at 2026-04-02T12:55:00Z
2
value 0.00098
scoring_system epss
scoring_elements 0.26995
published_at 2026-04-13T12:55:00Z
3
value 0.00098
scoring_system epss
scoring_elements 0.27004
published_at 2026-04-16T12:55:00Z
4
value 0.00098
scoring_system epss
scoring_elements 0.26978
published_at 2026-04-18T12:55:00Z
5
value 0.00098
scoring_system epss
scoring_elements 0.2711
published_at 2026-04-01T12:55:00Z
6
value 0.00098
scoring_system epss
scoring_elements 0.27187
published_at 2026-04-04T12:55:00Z
7
value 0.00098
scoring_system epss
scoring_elements 0.26979
published_at 2026-04-07T12:55:00Z
8
value 0.00098
scoring_system epss
scoring_elements 0.27047
published_at 2026-04-08T12:55:00Z
9
value 0.00098
scoring_system epss
scoring_elements 0.27093
published_at 2026-04-09T12:55:00Z
10
value 0.00098
scoring_system epss
scoring_elements 0.27096
published_at 2026-04-11T12:55:00Z
11
value 0.00098
scoring_system epss
scoring_elements 0.27052
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2556
3
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:01:25Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
4
reference_url http://www.securityfocus.com/bid/106568
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:01:25Z/
url http://www.securityfocus.com/bid/106568
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-2556
reference_id CVE-2019-2556
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:N
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2019-2556
fixed_packages
0
url pkg:deb/debian/virtualbox@5.2.24-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.2.24-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.24-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2019-2556
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gm8u-k7vg-fbes
211
url VCID-gs15-h2mg-a3ap
vulnerability_id VCID-gs15-h2mg-a3ap
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.16. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-3087
reference_id
reference_type
scores
0
value 0.0045
scoring_system epss
scoring_elements 0.63669
published_at 2026-04-21T12:55:00Z
1
value 0.0045
scoring_system epss
scoring_elements 0.63687
published_at 2026-04-11T12:55:00Z
2
value 0.0045
scoring_system epss
scoring_elements 0.63639
published_at 2026-04-13T12:55:00Z
3
value 0.0045
scoring_system epss
scoring_elements 0.63676
published_at 2026-04-16T12:55:00Z
4
value 0.0045
scoring_system epss
scoring_elements 0.63686
published_at 2026-04-18T12:55:00Z
5
value 0.0045
scoring_system epss
scoring_elements 0.63559
published_at 2026-04-01T12:55:00Z
6
value 0.0045
scoring_system epss
scoring_elements 0.63619
published_at 2026-04-02T12:55:00Z
7
value 0.0045
scoring_system epss
scoring_elements 0.63645
published_at 2026-04-04T12:55:00Z
8
value 0.0045
scoring_system epss
scoring_elements 0.63604
published_at 2026-04-07T12:55:00Z
9
value 0.0045
scoring_system epss
scoring_elements 0.63656
published_at 2026-04-08T12:55:00Z
10
value 0.0045
scoring_system epss
scoring_elements 0.63672
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-3087
1
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:26Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
2
reference_url http://www.securityfocus.com/bid/104764
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:26Z/
url http://www.securityfocus.com/bid/104764
3
reference_url http://www.securitytracker.com/id/1041296
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:26Z/
url http://www.securitytracker.com/id/1041296
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-3087
reference_id CVE-2018-3087
reference_type
scores
0
value 4.4
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:P/A:P
1
value 8.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-3087
fixed_packages
0
url pkg:deb/debian/virtualbox@5.2.16-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.2.16-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.16-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2018-3087
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gs15-h2mg-a3ap
212
url VCID-gvqc-29xp-7qcn
vulnerability_id VCID-gvqc-29xp-7qcn
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:31Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2959
reference_id
reference_type
scores
0
value 0.01335
scoring_system epss
scoring_elements 0.79929
published_at 2026-04-01T12:55:00Z
1
value 0.01335
scoring_system epss
scoring_elements 0.79983
published_at 2026-04-09T12:55:00Z
2
value 0.01335
scoring_system epss
scoring_elements 0.80003
published_at 2026-04-11T12:55:00Z
3
value 0.01335
scoring_system epss
scoring_elements 0.79986
published_at 2026-04-12T12:55:00Z
4
value 0.01335
scoring_system epss
scoring_elements 0.79979
published_at 2026-04-13T12:55:00Z
5
value 0.01335
scoring_system epss
scoring_elements 0.80006
published_at 2026-04-16T12:55:00Z
6
value 0.01335
scoring_system epss
scoring_elements 0.80007
published_at 2026-04-18T12:55:00Z
7
value 0.01335
scoring_system epss
scoring_elements 0.80009
published_at 2026-04-21T12:55:00Z
8
value 0.01335
scoring_system epss
scoring_elements 0.79935
published_at 2026-04-02T12:55:00Z
9
value 0.01335
scoring_system epss
scoring_elements 0.79956
published_at 2026-04-04T12:55:00Z
10
value 0.01335
scoring_system epss
scoring_elements 0.79945
published_at 2026-04-07T12:55:00Z
11
value 0.01335
scoring_system epss
scoring_elements 0.79974
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2959
2
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:31Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
3
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2959
reference_id CVE-2020-2959
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 8.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
2
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-2959
6
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value 8.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:53:31Z/
url https://security.gentoo.org/glsa/202101-09
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.6-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.6-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.6-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2020-2959
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gvqc-29xp-7qcn
213
url VCID-gwa7-c3nu-77ey
vulnerability_id VCID-gwa7-c3nu-77ey
summary Multiple vulnerabilities have been discovered in Oracle Virtualbox, the worst of which could result in privilege escalation from a guest to the host.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21627
reference_id
reference_type
scores
0
value 0.00111
scoring_system epss
scoring_elements 0.29373
published_at 2026-04-21T12:55:00Z
1
value 0.00111
scoring_system epss
scoring_elements 0.29426
published_at 2026-04-13T12:55:00Z
2
value 0.00111
scoring_system epss
scoring_elements 0.29446
published_at 2026-04-16T12:55:00Z
3
value 0.00111
scoring_system epss
scoring_elements 0.29418
published_at 2026-04-18T12:55:00Z
4
value 0.00111
scoring_system epss
scoring_elements 0.29546
published_at 2026-04-02T12:55:00Z
5
value 0.00111
scoring_system epss
scoring_elements 0.29595
published_at 2026-04-04T12:55:00Z
6
value 0.00111
scoring_system epss
scoring_elements 0.29416
published_at 2026-04-07T12:55:00Z
7
value 0.00111
scoring_system epss
scoring_elements 0.29479
published_at 2026-04-08T12:55:00Z
8
value 0.00111
scoring_system epss
scoring_elements 0.29519
published_at 2026-04-09T12:55:00Z
9
value 0.00111
scoring_system epss
scoring_elements 0.29523
published_at 2026-04-11T12:55:00Z
10
value 0.00111
scoring_system epss
scoring_elements 0.29478
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21627
1
reference_url https://security.gentoo.org/glsa/202212-03
reference_id GLSA-202212-03
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:53Z/
url https://security.gentoo.org/glsa/202212-03
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.40-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.40-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.40-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2022-21627
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gwa7-c3nu-77ey
214
url VCID-gx18-8hyk-m7es
vulnerability_id VCID-gx18-8hyk-m7es
summary Oracle VM VirtualBox: From CVEorg collector
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21253.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21253.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21253
reference_id
reference_type
scores
0
value 0.00028
scoring_system epss
scoring_elements 0.07763
published_at 2026-04-18T12:55:00Z
1
value 0.00028
scoring_system epss
scoring_elements 0.07872
published_at 2026-04-13T12:55:00Z
2
value 0.00028
scoring_system epss
scoring_elements 0.07786
published_at 2026-04-16T12:55:00Z
3
value 0.00028
scoring_system epss
scoring_elements 0.07832
published_at 2026-04-02T12:55:00Z
4
value 0.00028
scoring_system epss
scoring_elements 0.0788
published_at 2026-04-04T12:55:00Z
5
value 0.00028
scoring_system epss
scoring_elements 0.07834
published_at 2026-04-07T12:55:00Z
6
value 0.00028
scoring_system epss
scoring_elements 0.07891
published_at 2026-04-08T12:55:00Z
7
value 0.00028
scoring_system epss
scoring_elements 0.07915
published_at 2026-04-21T12:55:00Z
8
value 0.00028
scoring_system epss
scoring_elements 0.07902
published_at 2026-04-11T12:55:00Z
9
value 0.00028
scoring_system epss
scoring_elements 0.07886
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21253
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085440
reference_id 1085440
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085440
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2318893
reference_id 2318893
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2318893
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.0.22:*:*:*:*:*:*:*
fixed_packages
0
url pkg:deb/debian/virtualbox@7.0.26-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.0.26-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.0.26-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2024-21253
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gx18-8hyk-m7es
215
url VCID-ha1c-82ym-fqah
vulnerability_id VCID-ha1c-82ym-fqah
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.1.24. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox as well as unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 6.7 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10235
reference_id
reference_type
scores
0
value 0.0231
scoring_system epss
scoring_elements 0.84789
published_at 2026-04-21T12:55:00Z
1
value 0.0231
scoring_system epss
scoring_elements 0.8471
published_at 2026-04-02T12:55:00Z
2
value 0.0231
scoring_system epss
scoring_elements 0.8479
published_at 2026-04-16T12:55:00Z
3
value 0.0231
scoring_system epss
scoring_elements 0.84791
published_at 2026-04-18T12:55:00Z
4
value 0.0231
scoring_system epss
scoring_elements 0.84695
published_at 2026-04-01T12:55:00Z
5
value 0.0231
scoring_system epss
scoring_elements 0.8473
published_at 2026-04-04T12:55:00Z
6
value 0.0231
scoring_system epss
scoring_elements 0.84731
published_at 2026-04-07T12:55:00Z
7
value 0.0231
scoring_system epss
scoring_elements 0.84754
published_at 2026-04-08T12:55:00Z
8
value 0.0231
scoring_system epss
scoring_elements 0.8476
published_at 2026-04-09T12:55:00Z
9
value 0.0231
scoring_system epss
scoring_elements 0.84778
published_at 2026-04-11T12:55:00Z
10
value 0.0231
scoring_system epss
scoring_elements 0.84774
published_at 2026-04-12T12:55:00Z
11
value 0.0231
scoring_system epss
scoring_elements 0.84768
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10235
1
reference_url http://www.securitytracker.com/id/1038929
reference_id 1038929
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:49:15Z/
url http://www.securitytracker.com/id/1038929
2
reference_url http://www.securityfocus.com/bid/99705
reference_id 99705
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:49:15Z/
url http://www.securityfocus.com/bid/99705
fixed_packages
0
url pkg:deb/debian/virtualbox@5.1.24-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.1.24-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.1.24-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2017-10235
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ha1c-82ym-fqah
216
url VCID-hcm2-8xf7-nubu
vulnerability_id VCID-hcm2-8xf7-nubu
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2693
reference_id
reference_type
scores
0
value 0.00152
scoring_system epss
scoring_elements 0.35825
published_at 2026-04-21T12:55:00Z
1
value 0.00152
scoring_system epss
scoring_elements 0.35974
published_at 2026-04-02T12:55:00Z
2
value 0.00152
scoring_system epss
scoring_elements 0.35912
published_at 2026-04-11T12:55:00Z
3
value 0.00152
scoring_system epss
scoring_elements 0.3587
published_at 2026-04-12T12:55:00Z
4
value 0.00152
scoring_system epss
scoring_elements 0.35847
published_at 2026-04-13T12:55:00Z
5
value 0.00152
scoring_system epss
scoring_elements 0.35887
published_at 2026-04-16T12:55:00Z
6
value 0.00152
scoring_system epss
scoring_elements 0.35874
published_at 2026-04-18T12:55:00Z
7
value 0.00152
scoring_system epss
scoring_elements 0.35784
published_at 2026-04-01T12:55:00Z
8
value 0.00152
scoring_system epss
scoring_elements 0.36003
published_at 2026-04-04T12:55:00Z
9
value 0.00152
scoring_system epss
scoring_elements 0.35834
published_at 2026-04-07T12:55:00Z
10
value 0.00152
scoring_system epss
scoring_elements 0.35884
published_at 2026-04-08T12:55:00Z
11
value 0.00152
scoring_system epss
scoring_elements 0.35907
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2693
1
reference_url https://security.gentoo.org/glsa/202004-02
reference_id GLSA-202004-02
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:01:41Z/
url https://security.gentoo.org/glsa/202004-02
2
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:01:41Z/
url https://security.gentoo.org/glsa/202101-09
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.2-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.2-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.2-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2020-2693
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hcm2-8xf7-nubu
217
url VCID-hdd2-3z2m-g3c6
vulnerability_id VCID-hdd2-3z2m-g3c6
summary Multiple vulnerabilities have been discovered in Oracle Virtualbox, the worst of which could result in root privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21465
reference_id
reference_type
scores
0
value 0.00162
scoring_system epss
scoring_elements 0.37026
published_at 2026-04-21T12:55:00Z
1
value 0.00162
scoring_system epss
scoring_elements 0.37183
published_at 2026-04-02T12:55:00Z
2
value 0.00162
scoring_system epss
scoring_elements 0.37117
published_at 2026-04-11T12:55:00Z
3
value 0.00162
scoring_system epss
scoring_elements 0.37083
published_at 2026-04-12T12:55:00Z
4
value 0.00162
scoring_system epss
scoring_elements 0.37055
published_at 2026-04-13T12:55:00Z
5
value 0.00162
scoring_system epss
scoring_elements 0.37101
published_at 2026-04-16T12:55:00Z
6
value 0.00162
scoring_system epss
scoring_elements 0.37084
published_at 2026-04-18T12:55:00Z
7
value 0.00162
scoring_system epss
scoring_elements 0.37212
published_at 2026-04-04T12:55:00Z
8
value 0.00162
scoring_system epss
scoring_elements 0.37043
published_at 2026-04-07T12:55:00Z
9
value 0.00162
scoring_system epss
scoring_elements 0.37094
published_at 2026-04-08T12:55:00Z
10
value 0.00162
scoring_system epss
scoring_elements 0.37106
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21465
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://security.gentoo.org/glsa/202208-36
reference_id GLSA-202208-36
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:54Z/
url https://security.gentoo.org/glsa/202208-36
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.34-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.34-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.34-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2022-21465
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hdd2-3z2m-g3c6
218
url VCID-hhjz-qsx1-jfcq
vulnerability_id VCID-hhjz-qsx1-jfcq
summary Multiple vulnerabilities have been discovered in Oracle Virtualbox, the worst of which could result in privilege escalation from a guest to the host.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-39426
reference_id
reference_type
scores
0
value 0.02635
scoring_system epss
scoring_elements 0.85719
published_at 2026-04-21T12:55:00Z
1
value 0.02635
scoring_system epss
scoring_elements 0.85635
published_at 2026-04-02T12:55:00Z
2
value 0.02635
scoring_system epss
scoring_elements 0.85701
published_at 2026-04-12T12:55:00Z
3
value 0.02635
scoring_system epss
scoring_elements 0.85697
published_at 2026-04-13T12:55:00Z
4
value 0.02635
scoring_system epss
scoring_elements 0.8572
published_at 2026-04-16T12:55:00Z
5
value 0.02635
scoring_system epss
scoring_elements 0.85725
published_at 2026-04-18T12:55:00Z
6
value 0.02635
scoring_system epss
scoring_elements 0.85653
published_at 2026-04-04T12:55:00Z
7
value 0.02635
scoring_system epss
scoring_elements 0.8566
published_at 2026-04-07T12:55:00Z
8
value 0.02635
scoring_system epss
scoring_elements 0.85679
published_at 2026-04-08T12:55:00Z
9
value 0.02635
scoring_system epss
scoring_elements 0.8569
published_at 2026-04-09T12:55:00Z
10
value 0.02635
scoring_system epss
scoring_elements 0.85705
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-39426
1
reference_url https://security.gentoo.org/glsa/202212-03
reference_id GLSA-202212-03
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-17T14:08:13Z/
url https://security.gentoo.org/glsa/202212-03
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.40-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.40-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.40-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2022-39426
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hhjz-qsx1-jfcq
219
url VCID-hkxu-su3z-9fbv
vulnerability_id VCID-hkxu-su3z-9fbv
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which might allow unauthorized changes to some critical or all
    accessible data.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5545
reference_id
reference_type
scores
0
value 0.00571
scoring_system epss
scoring_elements 0.68665
published_at 2026-04-21T12:55:00Z
1
value 0.00571
scoring_system epss
scoring_elements 0.68635
published_at 2026-04-13T12:55:00Z
2
value 0.00571
scoring_system epss
scoring_elements 0.68674
published_at 2026-04-16T12:55:00Z
3
value 0.00571
scoring_system epss
scoring_elements 0.68685
published_at 2026-04-18T12:55:00Z
4
value 0.00571
scoring_system epss
scoring_elements 0.68571
published_at 2026-04-01T12:55:00Z
5
value 0.00571
scoring_system epss
scoring_elements 0.68589
published_at 2026-04-02T12:55:00Z
6
value 0.00571
scoring_system epss
scoring_elements 0.68607
published_at 2026-04-04T12:55:00Z
7
value 0.00571
scoring_system epss
scoring_elements 0.68584
published_at 2026-04-07T12:55:00Z
8
value 0.00571
scoring_system epss
scoring_elements 0.68636
published_at 2026-04-08T12:55:00Z
9
value 0.00571
scoring_system epss
scoring_elements 0.68654
published_at 2026-04-09T12:55:00Z
10
value 0.00571
scoring_system epss
scoring_elements 0.68678
published_at 2026-04-11T12:55:00Z
11
value 0.00571
scoring_system epss
scoring_elements 0.68664
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5545
1
reference_url http://www.securitytracker.com/id/1037638
reference_id 1037638
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:34Z/
url http://www.securitytracker.com/id/1037638
2
reference_url http://www.securityfocus.com/bid/95590
reference_id 95590
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:34Z/
url http://www.securityfocus.com/bid/95590
3
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
reference_id cpujan2017-2881727.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:34Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
4
reference_url https://security.gentoo.org/glsa/201702-08
reference_id GLSA-201702-08
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:34Z/
url https://security.gentoo.org/glsa/201702-08
fixed_packages
0
url pkg:deb/debian/virtualbox@5.1.14-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.1.14-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.1.14-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2016-5545
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hkxu-su3z-9fbv
220
url VCID-hp2a-p953-hye3
vulnerability_id VCID-hp2a-p953-hye3
summary Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 7.0.20. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21141
reference_id
reference_type
scores
0
value 0.0025
scoring_system epss
scoring_elements 0.48408
published_at 2026-04-21T12:55:00Z
1
value 0.0025
scoring_system epss
scoring_elements 0.48458
published_at 2026-04-16T12:55:00Z
2
value 0.0025
scoring_system epss
scoring_elements 0.48453
published_at 2026-04-18T12:55:00Z
3
value 0.0025
scoring_system epss
scoring_elements 0.48374
published_at 2026-04-02T12:55:00Z
4
value 0.0025
scoring_system epss
scoring_elements 0.48395
published_at 2026-04-04T12:55:00Z
5
value 0.0025
scoring_system epss
scoring_elements 0.48348
published_at 2026-04-07T12:55:00Z
6
value 0.0025
scoring_system epss
scoring_elements 0.48403
published_at 2026-04-08T12:55:00Z
7
value 0.0025
scoring_system epss
scoring_elements 0.48397
published_at 2026-04-09T12:55:00Z
8
value 0.0025
scoring_system epss
scoring_elements 0.48421
published_at 2026-04-11T12:55:00Z
9
value 0.0025
scoring_system epss
scoring_elements 0.48396
published_at 2026-04-12T12:55:00Z
10
value 0.0025
scoring_system epss
scoring_elements 0.48407
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21141
1
reference_url https://www.oracle.com/security-alerts/cpujul2024.html
reference_id cpujul2024.html
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-19T03:55:26Z/
url https://www.oracle.com/security-alerts/cpujul2024.html
fixed_packages
0
url pkg:deb/debian/virtualbox@7.0.20-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.0.20-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.0.20-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2024-21141
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hp2a-p953-hye3
221
url VCID-hq6c-htk8-zkft
vulnerability_id VCID-hq6c-htk8-zkft
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2688
reference_id
reference_type
scores
0
value 0.00178
scoring_system epss
scoring_elements 0.39267
published_at 2026-04-21T12:55:00Z
1
value 0.00178
scoring_system epss
scoring_elements 0.39366
published_at 2026-04-02T12:55:00Z
2
value 0.00178
scoring_system epss
scoring_elements 0.39382
published_at 2026-04-16T12:55:00Z
3
value 0.00178
scoring_system epss
scoring_elements 0.39353
published_at 2026-04-18T12:55:00Z
4
value 0.00178
scoring_system epss
scoring_elements 0.39179
published_at 2026-04-01T12:55:00Z
5
value 0.00178
scoring_system epss
scoring_elements 0.39389
published_at 2026-04-04T12:55:00Z
6
value 0.00178
scoring_system epss
scoring_elements 0.39303
published_at 2026-04-07T12:55:00Z
7
value 0.00178
scoring_system epss
scoring_elements 0.39358
published_at 2026-04-08T12:55:00Z
8
value 0.00178
scoring_system epss
scoring_elements 0.39375
published_at 2026-04-09T12:55:00Z
9
value 0.00178
scoring_system epss
scoring_elements 0.39387
published_at 2026-04-11T12:55:00Z
10
value 0.00178
scoring_system epss
scoring_elements 0.39348
published_at 2026-04-12T12:55:00Z
11
value 0.00178
scoring_system epss
scoring_elements 0.39329
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2688
1
reference_url http://www.securityfocus.com/bid/102692
reference_id 102692
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:02Z/
url http://www.securityfocus.com/bid/102692
2
reference_url http://www.securitytracker.com/id/1040202
reference_id 1040202
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:02Z/
url http://www.securitytracker.com/id/1040202
3
reference_url https://security.gentoo.org/glsa/201802-01
reference_id GLSA-201802-01
reference_type
scores
url https://security.gentoo.org/glsa/201802-01
fixed_packages
0
url pkg:deb/debian/virtualbox@5.2.6-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.2.6-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.6-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2018-2688
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hq6c-htk8-zkft
222
url VCID-j15t-knfd-tfd1
vulnerability_id VCID-j15t-knfd-tfd1
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.2.28 and prior to 6.0.6. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2696
reference_id
reference_type
scores
0
value 0.00139
scoring_system epss
scoring_elements 0.34061
published_at 2026-04-02T12:55:00Z
1
value 0.00139
scoring_system epss
scoring_elements 0.33944
published_at 2026-04-21T12:55:00Z
2
value 0.00139
scoring_system epss
scoring_elements 0.33718
published_at 2026-04-01T12:55:00Z
3
value 0.00139
scoring_system epss
scoring_elements 0.34092
published_at 2026-04-04T12:55:00Z
4
value 0.00139
scoring_system epss
scoring_elements 0.3395
published_at 2026-04-07T12:55:00Z
5
value 0.00139
scoring_system epss
scoring_elements 0.33991
published_at 2026-04-16T12:55:00Z
6
value 0.00139
scoring_system epss
scoring_elements 0.34023
published_at 2026-04-11T12:55:00Z
7
value 0.00139
scoring_system epss
scoring_elements 0.3398
published_at 2026-04-12T12:55:00Z
8
value 0.00139
scoring_system epss
scoring_elements 0.33956
published_at 2026-04-13T12:55:00Z
9
value 0.00139
scoring_system epss
scoring_elements 0.33977
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2696
fixed_packages
0
url pkg:deb/debian/virtualbox@6.0.6-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.0.6-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.0.6-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2019-2696
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j15t-knfd-tfd1
223
url VCID-j47a-mqs9-1kfg
vulnerability_id VCID-j47a-mqs9-1kfg
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.1.24. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle VM VirtualBox accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.0 Base Score 5.2 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:L).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10209
reference_id
reference_type
scores
0
value 0.00058
scoring_system epss
scoring_elements 0.18004
published_at 2026-04-21T12:55:00Z
1
value 0.00058
scoring_system epss
scoring_elements 0.18202
published_at 2026-04-02T12:55:00Z
2
value 0.00058
scoring_system epss
scoring_elements 0.17961
published_at 2026-04-16T12:55:00Z
3
value 0.00058
scoring_system epss
scoring_elements 0.17972
published_at 2026-04-18T12:55:00Z
4
value 0.00058
scoring_system epss
scoring_elements 0.18039
published_at 2026-04-01T12:55:00Z
5
value 0.00058
scoring_system epss
scoring_elements 0.18256
published_at 2026-04-04T12:55:00Z
6
value 0.00058
scoring_system epss
scoring_elements 0.17957
published_at 2026-04-07T12:55:00Z
7
value 0.00058
scoring_system epss
scoring_elements 0.18042
published_at 2026-04-08T12:55:00Z
8
value 0.00058
scoring_system epss
scoring_elements 0.18104
published_at 2026-04-09T12:55:00Z
9
value 0.00058
scoring_system epss
scoring_elements 0.18112
published_at 2026-04-11T12:55:00Z
10
value 0.00058
scoring_system epss
scoring_elements 0.18069
published_at 2026-04-12T12:55:00Z
11
value 0.00058
scoring_system epss
scoring_elements 0.18019
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10209
1
reference_url http://www.securitytracker.com/id/1038929
reference_id 1038929
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:50:17Z/
url http://www.securitytracker.com/id/1038929
2
reference_url http://www.securityfocus.com/bid/99709
reference_id 99709
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:50:17Z/
url http://www.securityfocus.com/bid/99709
fixed_packages
0
url pkg:deb/debian/virtualbox@5.1.24-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.1.24-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.1.24-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2017-10209
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j47a-mqs9-1kfg
224
url VCID-j5x9-e1ds-wfb9
vulnerability_id VCID-j5x9-e1ds-wfb9
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are prior to 5.2.24 and prior to 6.0.2. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N).
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:01:27Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:01:27Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2554
reference_id
reference_type
scores
0
value 0.00116
scoring_system epss
scoring_elements 0.30247
published_at 2026-04-21T12:55:00Z
1
value 0.00116
scoring_system epss
scoring_elements 0.30433
published_at 2026-04-02T12:55:00Z
2
value 0.00116
scoring_system epss
scoring_elements 0.30294
published_at 2026-04-13T12:55:00Z
3
value 0.00116
scoring_system epss
scoring_elements 0.30309
published_at 2026-04-16T12:55:00Z
4
value 0.00116
scoring_system epss
scoring_elements 0.30292
published_at 2026-04-18T12:55:00Z
5
value 0.00116
scoring_system epss
scoring_elements 0.30403
published_at 2026-04-01T12:55:00Z
6
value 0.00116
scoring_system epss
scoring_elements 0.30478
published_at 2026-04-04T12:55:00Z
7
value 0.00116
scoring_system epss
scoring_elements 0.30288
published_at 2026-04-07T12:55:00Z
8
value 0.00116
scoring_system epss
scoring_elements 0.30347
published_at 2026-04-08T12:55:00Z
9
value 0.00116
scoring_system epss
scoring_elements 0.30382
published_at 2026-04-09T12:55:00Z
10
value 0.00116
scoring_system epss
scoring_elements 0.30384
published_at 2026-04-11T12:55:00Z
11
value 0.00116
scoring_system epss
scoring_elements 0.30341
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2554
3
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:01:27Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
4
reference_url http://www.securityfocus.com/bid/106568
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:01:27Z/
url http://www.securityfocus.com/bid/106568
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-2554
reference_id CVE-2019-2554
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:N
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2019-2554
fixed_packages
0
url pkg:deb/debian/virtualbox@5.2.24-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.2.24-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.24-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2019-2554
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j5x9-e1ds-wfb9
225
url VCID-j65j-xs5w-muaj
vulnerability_id VCID-j65j-xs5w-muaj
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2726
reference_id
reference_type
scores
0
value 0.00167
scoring_system epss
scoring_elements 0.3781
published_at 2026-04-21T12:55:00Z
1
value 0.00167
scoring_system epss
scoring_elements 0.37926
published_at 2026-04-02T12:55:00Z
2
value 0.00167
scoring_system epss
scoring_elements 0.37907
published_at 2026-04-11T12:55:00Z
3
value 0.00167
scoring_system epss
scoring_elements 0.37871
published_at 2026-04-12T12:55:00Z
4
value 0.00167
scoring_system epss
scoring_elements 0.37846
published_at 2026-04-13T12:55:00Z
5
value 0.00167
scoring_system epss
scoring_elements 0.37893
published_at 2026-04-16T12:55:00Z
6
value 0.00167
scoring_system epss
scoring_elements 0.37873
published_at 2026-04-18T12:55:00Z
7
value 0.00167
scoring_system epss
scoring_elements 0.37743
published_at 2026-04-01T12:55:00Z
8
value 0.00167
scoring_system epss
scoring_elements 0.37951
published_at 2026-04-04T12:55:00Z
9
value 0.00167
scoring_system epss
scoring_elements 0.37829
published_at 2026-04-07T12:55:00Z
10
value 0.00167
scoring_system epss
scoring_elements 0.37879
published_at 2026-04-08T12:55:00Z
11
value 0.00167
scoring_system epss
scoring_elements 0.37892
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2726
1
reference_url https://security.gentoo.org/glsa/202004-02
reference_id GLSA-202004-02
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:41:54Z/
url https://security.gentoo.org/glsa/202004-02
2
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:41:54Z/
url https://security.gentoo.org/glsa/202101-09
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.2-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.2-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.2-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2020-2726
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j65j-xs5w-muaj
226
url VCID-jefu-asf7-7bex
vulnerability_id VCID-jefu-asf7-7bex
summary Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 6.1.44 and Prior to 7.0.8. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data as well as unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 4.6 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22001
reference_id
reference_type
scores
0
value 0.00041
scoring_system epss
scoring_elements 0.12703
published_at 2026-04-02T12:55:00Z
1
value 0.00041
scoring_system epss
scoring_elements 0.12568
published_at 2026-04-13T12:55:00Z
2
value 0.00041
scoring_system epss
scoring_elements 0.12474
published_at 2026-04-16T12:55:00Z
3
value 0.00041
scoring_system epss
scoring_elements 0.12481
published_at 2026-04-18T12:55:00Z
4
value 0.00041
scoring_system epss
scoring_elements 0.12749
published_at 2026-04-04T12:55:00Z
5
value 0.00041
scoring_system epss
scoring_elements 0.12556
published_at 2026-04-07T12:55:00Z
6
value 0.00041
scoring_system epss
scoring_elements 0.12635
published_at 2026-04-08T12:55:00Z
7
value 0.00041
scoring_system epss
scoring_elements 0.12687
published_at 2026-04-09T12:55:00Z
8
value 0.00041
scoring_system epss
scoring_elements 0.12655
published_at 2026-04-11T12:55:00Z
9
value 0.00041
scoring_system epss
scoring_elements 0.12613
published_at 2026-04-12T12:55:00Z
10
value 0.00044
scoring_system epss
scoring_elements 0.13314
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22001
fixed_packages
0
url pkg:deb/debian/virtualbox@7.0.8-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.0.8-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.0.8-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2023-22001
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jefu-asf7-7bex
227
url VCID-jh4t-ec6v-v7h9
vulnerability_id VCID-jh4t-ec6v-v7h9
summary Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 6.1.40. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. Note: This vulnerability applies to Windows systems only. CVSS 3.1 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-39427
reference_id
reference_type
scores
0
value 0.00277
scoring_system epss
scoring_elements 0.51201
published_at 2026-04-21T12:55:00Z
1
value 0.00277
scoring_system epss
scoring_elements 0.51222
published_at 2026-04-18T12:55:00Z
2
value 0.00277
scoring_system epss
scoring_elements 0.51136
published_at 2026-04-02T12:55:00Z
3
value 0.00277
scoring_system epss
scoring_elements 0.51159
published_at 2026-04-04T12:55:00Z
4
value 0.00277
scoring_system epss
scoring_elements 0.51117
published_at 2026-04-07T12:55:00Z
5
value 0.00277
scoring_system epss
scoring_elements 0.51172
published_at 2026-04-08T12:55:00Z
6
value 0.00277
scoring_system epss
scoring_elements 0.51168
published_at 2026-04-09T12:55:00Z
7
value 0.00277
scoring_system epss
scoring_elements 0.51213
published_at 2026-04-11T12:55:00Z
8
value 0.00277
scoring_system epss
scoring_elements 0.51191
published_at 2026-04-12T12:55:00Z
9
value 0.00277
scoring_system epss
scoring_elements 0.51176
published_at 2026-04-13T12:55:00Z
10
value 0.00277
scoring_system epss
scoring_elements 0.51216
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-39427
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.40-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.40-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.40-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2022-39427
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jh4t-ec6v-v7h9
228
url VCID-jjh6-f68g-e3dp
vulnerability_id VCID-jjh6-f68g-e3dp
summary Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is 7.1.6. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox as well as unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data and unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-30725
reference_id
reference_type
scores
0
value 0.00053
scoring_system epss
scoring_elements 0.16626
published_at 2026-04-21T12:55:00Z
1
value 0.00053
scoring_system epss
scoring_elements 0.16587
published_at 2026-04-18T12:55:00Z
2
value 0.00053
scoring_system epss
scoring_elements 0.16781
published_at 2026-04-02T12:55:00Z
3
value 0.00053
scoring_system epss
scoring_elements 0.16838
published_at 2026-04-04T12:55:00Z
4
value 0.00053
scoring_system epss
scoring_elements 0.16623
published_at 2026-04-07T12:55:00Z
5
value 0.00053
scoring_system epss
scoring_elements 0.16708
published_at 2026-04-08T12:55:00Z
6
value 0.00053
scoring_system epss
scoring_elements 0.16762
published_at 2026-04-09T12:55:00Z
7
value 0.00053
scoring_system epss
scoring_elements 0.16742
published_at 2026-04-11T12:55:00Z
8
value 0.00053
scoring_system epss
scoring_elements 0.16699
published_at 2026-04-12T12:55:00Z
9
value 0.00053
scoring_system epss
scoring_elements 0.16643
published_at 2026-04-13T12:55:00Z
10
value 0.00053
scoring_system epss
scoring_elements 0.16579
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-30725
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103582
reference_id 1103582
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103582
2
reference_url https://www.oracle.com/security-alerts/cpuapr2025.html
reference_id cpuapr2025.html
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:17:57Z/
url https://www.oracle.com/security-alerts/cpuapr2025.html
fixed_packages
0
url pkg:deb/debian/virtualbox@7.0.26-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.0.26-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.0.26-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2025-30725
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jjh6-f68g-e3dp
229
url VCID-k1y7-fwb1-dubc
vulnerability_id VCID-k1y7-fwb1-dubc
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Shared Folder). Supported versions that are affected are Prior to 5.0.34 and Prior to 5.1.16. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data as well as unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 7.5 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3538
reference_id
reference_type
scores
0
value 0.00081
scoring_system epss
scoring_elements 0.23898
published_at 2026-04-21T12:55:00Z
1
value 0.00081
scoring_system epss
scoring_elements 0.23973
published_at 2026-04-12T12:55:00Z
2
value 0.00081
scoring_system epss
scoring_elements 0.23917
published_at 2026-04-13T12:55:00Z
3
value 0.00081
scoring_system epss
scoring_elements 0.23926
published_at 2026-04-16T12:55:00Z
4
value 0.00081
scoring_system epss
scoring_elements 0.23915
published_at 2026-04-18T12:55:00Z
5
value 0.00081
scoring_system epss
scoring_elements 0.23938
published_at 2026-04-01T12:55:00Z
6
value 0.00081
scoring_system epss
scoring_elements 0.24064
published_at 2026-04-02T12:55:00Z
7
value 0.00081
scoring_system epss
scoring_elements 0.24104
published_at 2026-04-04T12:55:00Z
8
value 0.00081
scoring_system epss
scoring_elements 0.23887
published_at 2026-04-07T12:55:00Z
9
value 0.00081
scoring_system epss
scoring_elements 0.23953
published_at 2026-04-08T12:55:00Z
10
value 0.00081
scoring_system epss
scoring_elements 0.24
published_at 2026-04-09T12:55:00Z
11
value 0.00081
scoring_system epss
scoring_elements 0.24016
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3538
1
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:31Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
2
reference_url http://www.securityfocus.com/bid/97698
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:31Z/
url http://www.securityfocus.com/bid/97698
3
reference_url http://www.securitytracker.com/id/1038288
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:31Z/
url http://www.securitytracker.com/id/1038288
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:5.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:5.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:5.1.0:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:5.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:5.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:5.1.10:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:5.1.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:5.1.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:5.1.12:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:5.1.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:5.1.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:5.1.14:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:5.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:5.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:5.1.2:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:5.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:5.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:5.1.4:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:5.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:5.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:5.1.6:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:5.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:5.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:5.1.8:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-3538
reference_id CVE-2017-3538
reference_type
scores
0
value 6.3
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:C/A:N
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-3538
fixed_packages
0
url pkg:deb/debian/virtualbox@5.1.16-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.1.16-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.1.16-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2017-3538
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k1y7-fwb1-dubc
230
url VCID-k564-k1kj-qfh1
vulnerability_id VCID-k564-k1kj-qfh1
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2690
reference_id
reference_type
scores
0
value 0.00178
scoring_system epss
scoring_elements 0.39267
published_at 2026-04-21T12:55:00Z
1
value 0.00178
scoring_system epss
scoring_elements 0.39366
published_at 2026-04-02T12:55:00Z
2
value 0.00178
scoring_system epss
scoring_elements 0.39382
published_at 2026-04-16T12:55:00Z
3
value 0.00178
scoring_system epss
scoring_elements 0.39353
published_at 2026-04-18T12:55:00Z
4
value 0.00178
scoring_system epss
scoring_elements 0.39179
published_at 2026-04-01T12:55:00Z
5
value 0.00178
scoring_system epss
scoring_elements 0.39389
published_at 2026-04-04T12:55:00Z
6
value 0.00178
scoring_system epss
scoring_elements 0.39303
published_at 2026-04-07T12:55:00Z
7
value 0.00178
scoring_system epss
scoring_elements 0.39358
published_at 2026-04-08T12:55:00Z
8
value 0.00178
scoring_system epss
scoring_elements 0.39375
published_at 2026-04-09T12:55:00Z
9
value 0.00178
scoring_system epss
scoring_elements 0.39387
published_at 2026-04-11T12:55:00Z
10
value 0.00178
scoring_system epss
scoring_elements 0.39348
published_at 2026-04-12T12:55:00Z
11
value 0.00178
scoring_system epss
scoring_elements 0.39329
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2690
1
reference_url http://www.securityfocus.com/bid/102694
reference_id 102694
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:19Z/
url http://www.securityfocus.com/bid/102694
2
reference_url http://www.securitytracker.com/id/1040202
reference_id 1040202
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:19Z/
url http://www.securitytracker.com/id/1040202
3
reference_url https://security.gentoo.org/glsa/201802-01
reference_id GLSA-201802-01
reference_type
scores
url https://security.gentoo.org/glsa/201802-01
fixed_packages
0
url pkg:deb/debian/virtualbox@5.2.6-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.2.6-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.6-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2018-2690
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k564-k1kj-qfh1
231
url VCID-k56n-ns61-fqe5
vulnerability_id VCID-k56n-ns61-fqe5
summary Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-21988
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.03162
published_at 2026-04-21T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.03042
published_at 2026-04-18T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.03086
published_at 2026-04-02T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.031
published_at 2026-04-04T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.03101
published_at 2026-04-07T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.03105
published_at 2026-04-08T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.0313
published_at 2026-04-09T12:55:00Z
7
value 0.00015
scoring_system epss
scoring_elements 0.03093
published_at 2026-04-11T12:55:00Z
8
value 0.00015
scoring_system epss
scoring_elements 0.03069
published_at 2026-04-12T12:55:00Z
9
value 0.00015
scoring_system epss
scoring_elements 0.03057
published_at 2026-04-13T12:55:00Z
10
value 0.00015
scoring_system epss
scoring_elements 0.03033
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-21988
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126117
reference_id 1126117
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126117
2
reference_url https://www.oracle.com/security-alerts/cpujan2026.html
reference_id cpujan2026.html
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-22T04:55:20Z/
url https://www.oracle.com/security-alerts/cpujan2026.html
fixed_packages
0
url pkg:deb/debian/virtualbox@7.2.6-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2026-21988
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k56n-ns61-fqe5
232
url VCID-k77g-at68-vyg4
vulnerability_id VCID-k77g-at68-vyg4
summary Multiple vulnerabilities have been discovered in Oracle Virtualbox, the worst of which could result in root privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21571
reference_id
reference_type
scores
0
value 0.00245
scoring_system epss
scoring_elements 0.47795
published_at 2026-04-21T12:55:00Z
1
value 0.00245
scoring_system epss
scoring_elements 0.47765
published_at 2026-04-02T12:55:00Z
2
value 0.00245
scoring_system epss
scoring_elements 0.47783
published_at 2026-04-09T12:55:00Z
3
value 0.00245
scoring_system epss
scoring_elements 0.47808
published_at 2026-04-11T12:55:00Z
4
value 0.00245
scoring_system epss
scoring_elements 0.47794
published_at 2026-04-13T12:55:00Z
5
value 0.00245
scoring_system epss
scoring_elements 0.47848
published_at 2026-04-16T12:55:00Z
6
value 0.00245
scoring_system epss
scoring_elements 0.47841
published_at 2026-04-18T12:55:00Z
7
value 0.00245
scoring_system epss
scoring_elements 0.47784
published_at 2026-04-12T12:55:00Z
8
value 0.00245
scoring_system epss
scoring_elements 0.47733
published_at 2026-04-07T12:55:00Z
9
value 0.00245
scoring_system epss
scoring_elements 0.47787
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21571
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://security.gentoo.org/glsa/202208-36
reference_id GLSA-202208-36
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-23T18:53:52Z/
url https://security.gentoo.org/glsa/202208-36
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.36-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.36-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.36-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2022-21571
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k77g-at68-vyg4
233
url VCID-kdee-sufv-bba9
vulnerability_id VCID-kdee-sufv-bba9
summary Multiple vulnerabilities have been discovered in Oracle VirtualBox, the worst of which could lead to privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22099
reference_id
reference_type
scores
0
value 0.00094
scoring_system epss
scoring_elements 0.26221
published_at 2026-04-21T12:55:00Z
1
value 0.00094
scoring_system epss
scoring_elements 0.26433
published_at 2026-04-02T12:55:00Z
2
value 0.00094
scoring_system epss
scoring_elements 0.26274
published_at 2026-04-13T12:55:00Z
3
value 0.00094
scoring_system epss
scoring_elements 0.2628
published_at 2026-04-16T12:55:00Z
4
value 0.00094
scoring_system epss
scoring_elements 0.26255
published_at 2026-04-18T12:55:00Z
5
value 0.00094
scoring_system epss
scoring_elements 0.26477
published_at 2026-04-04T12:55:00Z
6
value 0.00094
scoring_system epss
scoring_elements 0.26251
published_at 2026-04-07T12:55:00Z
7
value 0.00094
scoring_system epss
scoring_elements 0.26319
published_at 2026-04-08T12:55:00Z
8
value 0.00094
scoring_system epss
scoring_elements 0.2637
published_at 2026-04-09T12:55:00Z
9
value 0.00094
scoring_system epss
scoring_elements 0.26379
published_at 2026-04-11T12:55:00Z
10
value 0.00094
scoring_system epss
scoring_elements 0.26333
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22099
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://security.gentoo.org/glsa/202409-11
reference_id GLSA-202409-11
reference_type
scores
url https://security.gentoo.org/glsa/202409-11
fixed_packages
0
url pkg:deb/debian/virtualbox@7.0.12-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.0.12-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.0.12-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2023-22099
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kdee-sufv-bba9
234
url VCID-khe6-uzj4-sfd8
vulnerability_id VCID-khe6-uzj4-sfd8
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2674
reference_id
reference_type
scores
0
value 0.00167
scoring_system epss
scoring_elements 0.3781
published_at 2026-04-21T12:55:00Z
1
value 0.00167
scoring_system epss
scoring_elements 0.37926
published_at 2026-04-02T12:55:00Z
2
value 0.00167
scoring_system epss
scoring_elements 0.37907
published_at 2026-04-11T12:55:00Z
3
value 0.00167
scoring_system epss
scoring_elements 0.37871
published_at 2026-04-12T12:55:00Z
4
value 0.00167
scoring_system epss
scoring_elements 0.37846
published_at 2026-04-13T12:55:00Z
5
value 0.00167
scoring_system epss
scoring_elements 0.37893
published_at 2026-04-16T12:55:00Z
6
value 0.00167
scoring_system epss
scoring_elements 0.37873
published_at 2026-04-18T12:55:00Z
7
value 0.00167
scoring_system epss
scoring_elements 0.37743
published_at 2026-04-01T12:55:00Z
8
value 0.00167
scoring_system epss
scoring_elements 0.37951
published_at 2026-04-04T12:55:00Z
9
value 0.00167
scoring_system epss
scoring_elements 0.37829
published_at 2026-04-07T12:55:00Z
10
value 0.00167
scoring_system epss
scoring_elements 0.37879
published_at 2026-04-08T12:55:00Z
11
value 0.00167
scoring_system epss
scoring_elements 0.37892
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2674
1
reference_url https://security.gentoo.org/glsa/202004-02
reference_id GLSA-202004-02
reference_type
scores
0
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:42:02Z/
url https://security.gentoo.org/glsa/202004-02
2
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:42:02Z/
url https://security.gentoo.org/glsa/202101-09
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.2-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.2-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.2-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2020-2674
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-khe6-uzj4-sfd8
235
url VCID-kjb5-7rhd-b7fm
vulnerability_id VCID-kjb5-7rhd-b7fm
summary Multiple vulnerabilities have been discovered in VirtualBox, leading to compomise of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21898
reference_id
reference_type
scores
0
value 0.00052
scoring_system epss
scoring_elements 0.16345
published_at 2026-04-21T12:55:00Z
1
value 0.00052
scoring_system epss
scoring_elements 0.16353
published_at 2026-04-13T12:55:00Z
2
value 0.00052
scoring_system epss
scoring_elements 0.16289
published_at 2026-04-16T12:55:00Z
3
value 0.00052
scoring_system epss
scoring_elements 0.16311
published_at 2026-04-18T12:55:00Z
4
value 0.00052
scoring_system epss
scoring_elements 0.16466
published_at 2026-04-02T12:55:00Z
5
value 0.00052
scoring_system epss
scoring_elements 0.16528
published_at 2026-04-04T12:55:00Z
6
value 0.00052
scoring_system epss
scoring_elements 0.16325
published_at 2026-04-07T12:55:00Z
7
value 0.00052
scoring_system epss
scoring_elements 0.16411
published_at 2026-04-08T12:55:00Z
8
value 0.00052
scoring_system epss
scoring_elements 0.1647
published_at 2026-04-09T12:55:00Z
9
value 0.00052
scoring_system epss
scoring_elements 0.16454
published_at 2026-04-11T12:55:00Z
10
value 0.00052
scoring_system epss
scoring_elements 0.16415
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21898
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029153
reference_id 1029153
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029153
2
reference_url https://security.gentoo.org/glsa/202310-07
reference_id GLSA-202310-07
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T19:39:56Z/
url https://security.gentoo.org/glsa/202310-07
fixed_packages
0
url pkg:deb/debian/virtualbox@7.0.6-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.0.6-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.0.6-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2023-21898
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kjb5-7rhd-b7fm
236
url VCID-kjsq-rfp7-qbcx
vulnerability_id VCID-kjsq-rfp7-qbcx
summary Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-21990
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.03162
published_at 2026-04-21T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.03042
published_at 2026-04-18T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.03086
published_at 2026-04-02T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.031
published_at 2026-04-04T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.03101
published_at 2026-04-07T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.03105
published_at 2026-04-08T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.0313
published_at 2026-04-09T12:55:00Z
7
value 0.00015
scoring_system epss
scoring_elements 0.03093
published_at 2026-04-11T12:55:00Z
8
value 0.00015
scoring_system epss
scoring_elements 0.03069
published_at 2026-04-12T12:55:00Z
9
value 0.00015
scoring_system epss
scoring_elements 0.03057
published_at 2026-04-13T12:55:00Z
10
value 0.00015
scoring_system epss
scoring_elements 0.03033
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-21990
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126117
reference_id 1126117
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126117
2
reference_url https://www.oracle.com/security-alerts/cpujan2026.html
reference_id cpujan2026.html
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-22T04:55:18Z/
url https://www.oracle.com/security-alerts/cpujan2026.html
fixed_packages
0
url pkg:deb/debian/virtualbox@7.2.6-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2026-21990
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kjsq-rfp7-qbcx
237
url VCID-kqa9-s6tz-tkf1
vulnerability_id VCID-kqa9-s6tz-tkf1
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which allows local users to escalate privileges.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5613
reference_id
reference_type
scores
0
value 0.00077
scoring_system epss
scoring_elements 0.22983
published_at 2026-04-21T12:55:00Z
1
value 0.00077
scoring_system epss
scoring_elements 0.23018
published_at 2026-04-13T12:55:00Z
2
value 0.00077
scoring_system epss
scoring_elements 0.2303
published_at 2026-04-16T12:55:00Z
3
value 0.00077
scoring_system epss
scoring_elements 0.23022
published_at 2026-04-18T12:55:00Z
4
value 0.00077
scoring_system epss
scoring_elements 0.22966
published_at 2026-04-01T12:55:00Z
5
value 0.00077
scoring_system epss
scoring_elements 0.2313
published_at 2026-04-02T12:55:00Z
6
value 0.00077
scoring_system epss
scoring_elements 0.23174
published_at 2026-04-04T12:55:00Z
7
value 0.00077
scoring_system epss
scoring_elements 0.22965
published_at 2026-04-07T12:55:00Z
8
value 0.00077
scoring_system epss
scoring_elements 0.23038
published_at 2026-04-08T12:55:00Z
9
value 0.00077
scoring_system epss
scoring_elements 0.23091
published_at 2026-04-09T12:55:00Z
10
value 0.00077
scoring_system epss
scoring_elements 0.23111
published_at 2026-04-11T12:55:00Z
11
value 0.00077
scoring_system epss
scoring_elements 0.23074
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5613
1
reference_url http://www.securityfocus.com/bid/93728
reference_id 93728
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:46Z/
url http://www.securityfocus.com/bid/93728
2
reference_url https://security.gentoo.org/glsa/201612-27
reference_id GLSA-201612-27
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:46Z/
url https://security.gentoo.org/glsa/201612-27
fixed_packages
0
url pkg:deb/debian/virtualbox@5.1.8-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.1.8-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.1.8-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2016-5613
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kqa9-s6tz-tkf1
238
url VCID-kqwv-5m3r-ukbr
vulnerability_id VCID-kqwv-5m3r-ukbr
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2692
reference_id
reference_type
scores
0
value 0.00123
scoring_system epss
scoring_elements 0.31474
published_at 2026-04-21T12:55:00Z
1
value 0.00123
scoring_system epss
scoring_elements 0.31623
published_at 2026-04-02T12:55:00Z
2
value 0.00123
scoring_system epss
scoring_elements 0.31573
published_at 2026-04-11T12:55:00Z
3
value 0.00123
scoring_system epss
scoring_elements 0.31531
published_at 2026-04-12T12:55:00Z
4
value 0.00123
scoring_system epss
scoring_elements 0.31494
published_at 2026-04-13T12:55:00Z
5
value 0.00123
scoring_system epss
scoring_elements 0.31527
published_at 2026-04-16T12:55:00Z
6
value 0.00123
scoring_system epss
scoring_elements 0.31505
published_at 2026-04-18T12:55:00Z
7
value 0.00123
scoring_system epss
scoring_elements 0.31486
published_at 2026-04-01T12:55:00Z
8
value 0.00123
scoring_system epss
scoring_elements 0.31668
published_at 2026-04-04T12:55:00Z
9
value 0.00123
scoring_system epss
scoring_elements 0.31487
published_at 2026-04-07T12:55:00Z
10
value 0.00123
scoring_system epss
scoring_elements 0.31539
published_at 2026-04-08T12:55:00Z
11
value 0.00123
scoring_system epss
scoring_elements 0.31569
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2692
1
reference_url https://security.gentoo.org/glsa/202004-02
reference_id GLSA-202004-02
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:01:43Z/
url https://security.gentoo.org/glsa/202004-02
2
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:01:43Z/
url https://security.gentoo.org/glsa/202101-09
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.2-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.2-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.2-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2020-2692
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kqwv-5m3r-ukbr
239
url VCID-kt56-5161-jfdw
vulnerability_id VCID-kt56-5161-jfdw
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.1.24. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox as well as unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data and unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 7.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10237
reference_id
reference_type
scores
0
value 0.00061
scoring_system epss
scoring_elements 0.19135
published_at 2026-04-21T12:55:00Z
1
value 0.00061
scoring_system epss
scoring_elements 0.19352
published_at 2026-04-02T12:55:00Z
2
value 0.00061
scoring_system epss
scoring_elements 0.19117
published_at 2026-04-16T12:55:00Z
3
value 0.00061
scoring_system epss
scoring_elements 0.19126
published_at 2026-04-18T12:55:00Z
4
value 0.00061
scoring_system epss
scoring_elements 0.19217
published_at 2026-04-01T12:55:00Z
5
value 0.00061
scoring_system epss
scoring_elements 0.19404
published_at 2026-04-04T12:55:00Z
6
value 0.00061
scoring_system epss
scoring_elements 0.1912
published_at 2026-04-07T12:55:00Z
7
value 0.00061
scoring_system epss
scoring_elements 0.192
published_at 2026-04-08T12:55:00Z
8
value 0.00061
scoring_system epss
scoring_elements 0.19253
published_at 2026-04-09T12:55:00Z
9
value 0.00061
scoring_system epss
scoring_elements 0.19258
published_at 2026-04-11T12:55:00Z
10
value 0.00061
scoring_system epss
scoring_elements 0.19212
published_at 2026-04-12T12:55:00Z
11
value 0.00061
scoring_system epss
scoring_elements 0.19157
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10237
1
reference_url http://www.securitytracker.com/id/1038929
reference_id 1038929
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:49:12Z/
url http://www.securitytracker.com/id/1038929
2
reference_url http://www.securityfocus.com/bid/99667
reference_id 99667
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:49:12Z/
url http://www.securityfocus.com/bid/99667
fixed_packages
0
url pkg:deb/debian/virtualbox@5.1.24-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.1.24-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.1.24-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2017-10237
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kt56-5161-jfdw
240
url VCID-kyzm-9bx2-aybe
vulnerability_id VCID-kyzm-9bx2-aybe
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2681
reference_id
reference_type
scores
0
value 0.00123
scoring_system epss
scoring_elements 0.31474
published_at 2026-04-21T12:55:00Z
1
value 0.00123
scoring_system epss
scoring_elements 0.31623
published_at 2026-04-02T12:55:00Z
2
value 0.00123
scoring_system epss
scoring_elements 0.31573
published_at 2026-04-11T12:55:00Z
3
value 0.00123
scoring_system epss
scoring_elements 0.31531
published_at 2026-04-12T12:55:00Z
4
value 0.00123
scoring_system epss
scoring_elements 0.31494
published_at 2026-04-13T12:55:00Z
5
value 0.00123
scoring_system epss
scoring_elements 0.31527
published_at 2026-04-16T12:55:00Z
6
value 0.00123
scoring_system epss
scoring_elements 0.31505
published_at 2026-04-18T12:55:00Z
7
value 0.00123
scoring_system epss
scoring_elements 0.31486
published_at 2026-04-01T12:55:00Z
8
value 0.00123
scoring_system epss
scoring_elements 0.31668
published_at 2026-04-04T12:55:00Z
9
value 0.00123
scoring_system epss
scoring_elements 0.31487
published_at 2026-04-07T12:55:00Z
10
value 0.00123
scoring_system epss
scoring_elements 0.31539
published_at 2026-04-08T12:55:00Z
11
value 0.00123
scoring_system epss
scoring_elements 0.31569
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2681
1
reference_url https://security.gentoo.org/glsa/202004-02
reference_id GLSA-202004-02
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:01:58Z/
url https://security.gentoo.org/glsa/202004-02
2
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:01:58Z/
url https://security.gentoo.org/glsa/202101-09
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.2-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.2-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.2-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2020-2681
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kyzm-9bx2-aybe
241
url VCID-m15r-872d-vkev
vulnerability_id VCID-m15r-872d-vkev
summary Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 6.1.44 and Prior to 7.0.8. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21990
reference_id
reference_type
scores
0
value 0.00077
scoring_system epss
scoring_elements 0.22905
published_at 2026-04-21T12:55:00Z
1
value 0.00077
scoring_system epss
scoring_elements 0.22942
published_at 2026-04-18T12:55:00Z
2
value 0.00077
scoring_system epss
scoring_elements 0.23049
published_at 2026-04-02T12:55:00Z
3
value 0.00077
scoring_system epss
scoring_elements 0.23093
published_at 2026-04-04T12:55:00Z
4
value 0.00077
scoring_system epss
scoring_elements 0.22882
published_at 2026-04-07T12:55:00Z
5
value 0.00077
scoring_system epss
scoring_elements 0.22955
published_at 2026-04-08T12:55:00Z
6
value 0.00077
scoring_system epss
scoring_elements 0.23007
published_at 2026-04-09T12:55:00Z
7
value 0.00077
scoring_system epss
scoring_elements 0.23026
published_at 2026-04-11T12:55:00Z
8
value 0.00077
scoring_system epss
scoring_elements 0.22989
published_at 2026-04-12T12:55:00Z
9
value 0.00077
scoring_system epss
scoring_elements 0.22933
published_at 2026-04-13T12:55:00Z
10
value 0.00077
scoring_system epss
scoring_elements 0.22948
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21990
fixed_packages
0
url pkg:deb/debian/virtualbox@7.0.8-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.0.8-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.0.8-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2023-21990
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m15r-872d-vkev
242
url VCID-m1vv-1mrr-dbah
vulnerability_id VCID-m1vv-1mrr-dbah
summary Multiple vulnerabilities have been discovered in VirtualBox, leading to compomise of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21884
reference_id
reference_type
scores
0
value 0.00038
scoring_system epss
scoring_elements 0.11551
published_at 2026-04-21T12:55:00Z
1
value 0.00038
scoring_system epss
scoring_elements 0.11591
published_at 2026-04-12T12:55:00Z
2
value 0.00038
scoring_system epss
scoring_elements 0.11566
published_at 2026-04-13T12:55:00Z
3
value 0.00038
scoring_system epss
scoring_elements 0.11427
published_at 2026-04-18T12:55:00Z
4
value 0.00038
scoring_system epss
scoring_elements 0.11628
published_at 2026-04-11T12:55:00Z
5
value 0.00038
scoring_system epss
scoring_elements 0.11685
published_at 2026-04-04T12:55:00Z
6
value 0.00038
scoring_system epss
scoring_elements 0.11472
published_at 2026-04-07T12:55:00Z
7
value 0.00038
scoring_system epss
scoring_elements 0.11557
published_at 2026-04-08T12:55:00Z
8
value 0.00038
scoring_system epss
scoring_elements 0.11616
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21884
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029153
reference_id 1029153
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029153
2
reference_url https://security.gentoo.org/glsa/202310-07
reference_id GLSA-202310-07
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T14:03:13Z/
url https://security.gentoo.org/glsa/202310-07
fixed_packages
0
url pkg:deb/debian/virtualbox@7.0.6-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.0.6-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.0.6-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2023-21884
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m1vv-1mrr-dbah
243
url VCID-m22x-94ab-xbh8
vulnerability_id VCID-m22x-94ab-xbh8
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:17Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2929
reference_id
reference_type
scores
0
value 0.00206
scoring_system epss
scoring_elements 0.42638
published_at 2026-04-01T12:55:00Z
1
value 0.00206
scoring_system epss
scoring_elements 0.42736
published_at 2026-04-04T12:55:00Z
2
value 0.00206
scoring_system epss
scoring_elements 0.42676
published_at 2026-04-07T12:55:00Z
3
value 0.00206
scoring_system epss
scoring_elements 0.42727
published_at 2026-04-12T12:55:00Z
4
value 0.00206
scoring_system epss
scoring_elements 0.4274
published_at 2026-04-09T12:55:00Z
5
value 0.00206
scoring_system epss
scoring_elements 0.42762
published_at 2026-04-11T12:55:00Z
6
value 0.00206
scoring_system epss
scoring_elements 0.4271
published_at 2026-04-13T12:55:00Z
7
value 0.00206
scoring_system epss
scoring_elements 0.42771
published_at 2026-04-16T12:55:00Z
8
value 0.00206
scoring_system epss
scoring_elements 0.42759
published_at 2026-04-18T12:55:00Z
9
value 0.00206
scoring_system epss
scoring_elements 0.42697
published_at 2026-04-21T12:55:00Z
10
value 0.00206
scoring_system epss
scoring_elements 0.42707
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2929
2
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:17Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
3
reference_url https://www.zerodayinitiative.com/advisories/ZDI-20-508/
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:17Z/
url https://www.zerodayinitiative.com/advisories/ZDI-20-508/
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2929
reference_id CVE-2020-2929
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
2
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-2929
7
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:17Z/
url https://security.gentoo.org/glsa/202101-09
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.6-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.6-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.6-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2020-2929
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m22x-94ab-xbh8
244
url VCID-m7hw-8h89-4uaz
vulnerability_id VCID-m7hw-8h89-4uaz
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.16. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox and unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 7.1 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-3055
reference_id
reference_type
scores
0
value 0.00391
scoring_system epss
scoring_elements 0.60185
published_at 2026-04-21T12:55:00Z
1
value 0.00391
scoring_system epss
scoring_elements 0.6017
published_at 2026-04-12T12:55:00Z
2
value 0.00391
scoring_system epss
scoring_elements 0.60152
published_at 2026-04-13T12:55:00Z
3
value 0.00391
scoring_system epss
scoring_elements 0.60192
published_at 2026-04-16T12:55:00Z
4
value 0.00391
scoring_system epss
scoring_elements 0.60198
published_at 2026-04-18T12:55:00Z
5
value 0.00391
scoring_system epss
scoring_elements 0.60027
published_at 2026-04-01T12:55:00Z
6
value 0.00391
scoring_system epss
scoring_elements 0.60105
published_at 2026-04-02T12:55:00Z
7
value 0.00391
scoring_system epss
scoring_elements 0.60129
published_at 2026-04-04T12:55:00Z
8
value 0.00391
scoring_system epss
scoring_elements 0.60098
published_at 2026-04-07T12:55:00Z
9
value 0.00391
scoring_system epss
scoring_elements 0.60148
published_at 2026-04-08T12:55:00Z
10
value 0.00391
scoring_system epss
scoring_elements 0.60162
published_at 2026-04-09T12:55:00Z
11
value 0.00391
scoring_system epss
scoring_elements 0.60184
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-3055
1
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:28Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
2
reference_url http://www.securityfocus.com/bid/104764
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:28Z/
url http://www.securityfocus.com/bid/104764
3
reference_url http://www.securitytracker.com/id/1041296
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:28Z/
url http://www.securitytracker.com/id/1041296
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-3055
reference_id CVE-2018-3055
reference_type
scores
0
value 3.3
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:N/A:P
1
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-3055
fixed_packages
0
url pkg:deb/debian/virtualbox@5.2.16-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.2.16-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.16-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2018-3055
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m7hw-8h89-4uaz
245
url VCID-magw-e9kz-yqex
vulnerability_id VCID-magw-e9kz-yqex
summary Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.12 and 7.2.2. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-62589
reference_id
reference_type
scores
0
value 0.00027
scoring_system epss
scoring_elements 0.07771
published_at 2026-04-21T12:55:00Z
1
value 0.00027
scoring_system epss
scoring_elements 0.07622
published_at 2026-04-18T12:55:00Z
2
value 0.00027
scoring_system epss
scoring_elements 0.07651
published_at 2026-04-02T12:55:00Z
3
value 0.00027
scoring_system epss
scoring_elements 0.07694
published_at 2026-04-04T12:55:00Z
4
value 0.00027
scoring_system epss
scoring_elements 0.07663
published_at 2026-04-07T12:55:00Z
5
value 0.00027
scoring_system epss
scoring_elements 0.07723
published_at 2026-04-08T12:55:00Z
6
value 0.00027
scoring_system epss
scoring_elements 0.07742
published_at 2026-04-09T12:55:00Z
7
value 0.00027
scoring_system epss
scoring_elements 0.0774
published_at 2026-04-11T12:55:00Z
8
value 0.00027
scoring_system epss
scoring_elements 0.07726
published_at 2026-04-12T12:55:00Z
9
value 0.00027
scoring_system epss
scoring_elements 0.07711
published_at 2026-04-13T12:55:00Z
10
value 0.00027
scoring_system epss
scoring_elements 0.07635
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-62589
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118542
reference_id 1118542
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118542
2
reference_url https://www.oracle.com/security-alerts/cpuoct2025.html
reference_id cpuoct2025.html
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-23T03:55:31Z/
url https://www.oracle.com/security-alerts/cpuoct2025.html
fixed_packages
0
url pkg:deb/debian/virtualbox@7.2.4-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.2.4-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.4-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2025-62589
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-magw-e9kz-yqex
246
url VCID-mc5b-kap1-xbd4
vulnerability_id VCID-mc5b-kap1-xbd4
summary Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization VirtualBox before 3.2.24, 4.0.26, 4.1.34, 4.2.26, and 4.3.14, when running on Windows, allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Core, a different vulnerability than CVE-2014-4261.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-2487
reference_id
reference_type
scores
0
value 0.00081
scoring_system epss
scoring_elements 0.23905
published_at 2026-04-21T12:55:00Z
1
value 0.00081
scoring_system epss
scoring_elements 0.23946
published_at 2026-04-01T12:55:00Z
2
value 0.00081
scoring_system epss
scoring_elements 0.24072
published_at 2026-04-02T12:55:00Z
3
value 0.00081
scoring_system epss
scoring_elements 0.24112
published_at 2026-04-04T12:55:00Z
4
value 0.00081
scoring_system epss
scoring_elements 0.23894
published_at 2026-04-07T12:55:00Z
5
value 0.00081
scoring_system epss
scoring_elements 0.23961
published_at 2026-04-08T12:55:00Z
6
value 0.00081
scoring_system epss
scoring_elements 0.24007
published_at 2026-04-09T12:55:00Z
7
value 0.00081
scoring_system epss
scoring_elements 0.24023
published_at 2026-04-11T12:55:00Z
8
value 0.00081
scoring_system epss
scoring_elements 0.2398
published_at 2026-04-12T12:55:00Z
9
value 0.00081
scoring_system epss
scoring_elements 0.23924
published_at 2026-04-13T12:55:00Z
10
value 0.00081
scoring_system epss
scoring_elements 0.23933
published_at 2026-04-16T12:55:00Z
11
value 0.00081
scoring_system epss
scoring_elements 0.23922
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-2487
1
reference_url http://seclists.org/fulldisclosure/2014/Dec/23
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2014/Dec/23
2
reference_url http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
3
reference_url http://www.securityfocus.com/archive/1/534161/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/534161/100/0/threaded
4
reference_url http://www.vmware.com/security/advisories/VMSA-2014-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2014-0012.html
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-2487
reference_id CVE-2014-2487
reference_type
scores
0
value 6.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2014-2487
fixed_packages
0
url pkg:deb/debian/virtualbox@0?distro=sid
purl pkg:deb/debian/virtualbox@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@0%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2014-2487
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mc5b-kap1-xbd4
247
url VCID-mkje-rc43-vkc9
vulnerability_id VCID-mkje-rc43-vkc9
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html
reference_id
reference_type
scores
0
value 6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:34Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2894
reference_id
reference_type
scores
0
value 0.00118
scoring_system epss
scoring_elements 0.30587
published_at 2026-04-21T12:55:00Z
1
value 0.00118
scoring_system epss
scoring_elements 0.3061
published_at 2026-04-07T12:55:00Z
2
value 0.00118
scoring_system epss
scoring_elements 0.30667
published_at 2026-04-08T12:55:00Z
3
value 0.00118
scoring_system epss
scoring_elements 0.30699
published_at 2026-04-09T12:55:00Z
4
value 0.00118
scoring_system epss
scoring_elements 0.30704
published_at 2026-04-11T12:55:00Z
5
value 0.00118
scoring_system epss
scoring_elements 0.30658
published_at 2026-04-12T12:55:00Z
6
value 0.00118
scoring_system epss
scoring_elements 0.30613
published_at 2026-04-13T12:55:00Z
7
value 0.00118
scoring_system epss
scoring_elements 0.30639
published_at 2026-04-16T12:55:00Z
8
value 0.00118
scoring_system epss
scoring_elements 0.30621
published_at 2026-04-18T12:55:00Z
9
value 0.00118
scoring_system epss
scoring_elements 0.30609
published_at 2026-04-01T12:55:00Z
10
value 0.00118
scoring_system epss
scoring_elements 0.30745
published_at 2026-04-02T12:55:00Z
11
value 0.00118
scoring_system epss
scoring_elements 0.30793
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2894
2
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:34Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
3
reference_url https://www.zerodayinitiative.com/advisories/ZDI-20-581/
reference_id
reference_type
scores
0
value 6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:34Z/
url https://www.zerodayinitiative.com/advisories/ZDI-20-581/
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2894
reference_id CVE-2020-2894
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:N
1
value 6.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
2
value 6.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2020-2894
7
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value 6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:34Z/
url https://security.gentoo.org/glsa/202101-09
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.6-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.6-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.6-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2020-2894
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mkje-rc43-vkc9
248
url VCID-mpxx-4u9h-5qg3
vulnerability_id VCID-mpxx-4u9h-5qg3
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could result in privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14881
reference_id
reference_type
scores
0
value 0.0014
scoring_system epss
scoring_elements 0.3419
published_at 2026-04-21T12:55:00Z
1
value 0.0014
scoring_system epss
scoring_elements 0.343
published_at 2026-04-02T12:55:00Z
2
value 0.0014
scoring_system epss
scoring_elements 0.34265
published_at 2026-04-09T12:55:00Z
3
value 0.0014
scoring_system epss
scoring_elements 0.34266
published_at 2026-04-11T12:55:00Z
4
value 0.0014
scoring_system epss
scoring_elements 0.34225
published_at 2026-04-12T12:55:00Z
5
value 0.0014
scoring_system epss
scoring_elements 0.34201
published_at 2026-04-13T12:55:00Z
6
value 0.0014
scoring_system epss
scoring_elements 0.34224
published_at 2026-04-18T12:55:00Z
7
value 0.0014
scoring_system epss
scoring_elements 0.33961
published_at 2026-04-01T12:55:00Z
8
value 0.0014
scoring_system epss
scoring_elements 0.34329
published_at 2026-04-04T12:55:00Z
9
value 0.0014
scoring_system epss
scoring_elements 0.34193
published_at 2026-04-07T12:55:00Z
10
value 0.0014
scoring_system epss
scoring_elements 0.34236
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14881
1
reference_url https://security.gentoo.org/glsa/202101-15
reference_id GLSA-202101-15
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:02Z/
url https://security.gentoo.org/glsa/202101-15
2
reference_url https://www.zerodayinitiative.com/advisories/ZDI-20-1278/
reference_id ZDI-20-1278
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:02Z/
url https://www.zerodayinitiative.com/advisories/ZDI-20-1278/
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.16-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.16-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.16-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2020-14881
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mpxx-4u9h-5qg3
249
url VCID-mq6q-nyqt-zqhx
vulnerability_id VCID-mq6q-nyqt-zqhx
summary Oracle Virtualization: From CVEorg collector
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21273.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21273.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21273
reference_id
reference_type
scores
0
value 0.00059
scoring_system epss
scoring_elements 0.18417
published_at 2026-04-21T12:55:00Z
1
value 0.00059
scoring_system epss
scoring_elements 0.18382
published_at 2026-04-16T12:55:00Z
2
value 0.00059
scoring_system epss
scoring_elements 0.18394
published_at 2026-04-18T12:55:00Z
3
value 0.00059
scoring_system epss
scoring_elements 0.18631
published_at 2026-04-02T12:55:00Z
4
value 0.00059
scoring_system epss
scoring_elements 0.18686
published_at 2026-04-04T12:55:00Z
5
value 0.00059
scoring_system epss
scoring_elements 0.18402
published_at 2026-04-07T12:55:00Z
6
value 0.00059
scoring_system epss
scoring_elements 0.18483
published_at 2026-04-08T12:55:00Z
7
value 0.00059
scoring_system epss
scoring_elements 0.18536
published_at 2026-04-09T12:55:00Z
8
value 0.00059
scoring_system epss
scoring_elements 0.18538
published_at 2026-04-11T12:55:00Z
9
value 0.00059
scoring_system epss
scoring_elements 0.18489
published_at 2026-04-12T12:55:00Z
10
value 0.00059
scoring_system epss
scoring_elements 0.18439
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21273
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085440
reference_id 1085440
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085440
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2318878
reference_id 2318878
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2318878
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.0.22:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.1.2:*:*:*:*:*:*:*
fixed_packages
0
url pkg:deb/debian/virtualbox@7.0.26-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.0.26-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.0.26-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2024-21273
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mq6q-nyqt-zqhx
250
url VCID-mtk7-rr3s-1ua6
vulnerability_id VCID-mtk7-rr3s-1ua6
summary Multiple vulnerabilities have been discovered in Oracle Virtualbox, the worst of which could result in root privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2287
reference_id
reference_type
scores
0
value 0.00182
scoring_system epss
scoring_elements 0.39933
published_at 2026-04-21T12:55:00Z
1
value 0.00182
scoring_system epss
scoring_elements 0.4001
published_at 2026-04-12T12:55:00Z
2
value 0.00182
scoring_system epss
scoring_elements 0.3999
published_at 2026-04-13T12:55:00Z
3
value 0.00182
scoring_system epss
scoring_elements 0.4004
published_at 2026-04-16T12:55:00Z
4
value 0.00182
scoring_system epss
scoring_elements 0.40011
published_at 2026-04-18T12:55:00Z
5
value 0.00182
scoring_system epss
scoring_elements 0.39875
published_at 2026-04-01T12:55:00Z
6
value 0.00182
scoring_system epss
scoring_elements 0.40023
published_at 2026-04-08T12:55:00Z
7
value 0.00182
scoring_system epss
scoring_elements 0.40049
published_at 2026-04-04T12:55:00Z
8
value 0.00182
scoring_system epss
scoring_elements 0.3997
published_at 2026-04-07T12:55:00Z
9
value 0.00182
scoring_system epss
scoring_elements 0.40036
published_at 2026-04-09T12:55:00Z
10
value 0.00182
scoring_system epss
scoring_elements 0.40047
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2287
1
reference_url https://security.archlinux.org/ASA-202104-9
reference_id ASA-202104-9
reference_type
scores
url https://security.archlinux.org/ASA-202104-9
2
reference_url https://security.archlinux.org/AVG-1846
reference_id AVG-1846
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1846
3
reference_url https://security.gentoo.org/glsa/202208-36
reference_id GLSA-202208-36
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:52Z/
url https://security.gentoo.org/glsa/202208-36
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.20-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.20-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.20-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2021-2287
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mtk7-rr3s-1ua6
251
url VCID-mv4s-yx7h-nqam
vulnerability_id VCID-mv4s-yx7h-nqam
summary Multiple vulnerabilities have been discovered in Oracle Virtualbox, the worst of which could result in privilege escalation from a guest to the host.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-39424
reference_id
reference_type
scores
0
value 0.06785
scoring_system epss
scoring_elements 0.91338
published_at 2026-04-18T12:55:00Z
1
value 0.06785
scoring_system epss
scoring_elements 0.91271
published_at 2026-04-02T12:55:00Z
2
value 0.06785
scoring_system epss
scoring_elements 0.91313
published_at 2026-04-11T12:55:00Z
3
value 0.06785
scoring_system epss
scoring_elements 0.91315
published_at 2026-04-12T12:55:00Z
4
value 0.06785
scoring_system epss
scoring_elements 0.91314
published_at 2026-04-13T12:55:00Z
5
value 0.06785
scoring_system epss
scoring_elements 0.91339
published_at 2026-04-21T12:55:00Z
6
value 0.06785
scoring_system epss
scoring_elements 0.91281
published_at 2026-04-04T12:55:00Z
7
value 0.06785
scoring_system epss
scoring_elements 0.91287
published_at 2026-04-07T12:55:00Z
8
value 0.06785
scoring_system epss
scoring_elements 0.91299
published_at 2026-04-08T12:55:00Z
9
value 0.06785
scoring_system epss
scoring_elements 0.91306
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-39424
1
reference_url https://security.gentoo.org/glsa/202212-03
reference_id GLSA-202212-03
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-17T14:22:03Z/
url https://security.gentoo.org/glsa/202212-03
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.40-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.40-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.40-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2022-39424
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mv4s-yx7h-nqam
252
url VCID-my2u-yfbp-97df
vulnerability_id VCID-my2u-yfbp-97df
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2867
reference_id
reference_type
scores
0
value 0.00125
scoring_system epss
scoring_elements 0.3179
published_at 2026-04-02T12:55:00Z
1
value 0.00125
scoring_system epss
scoring_elements 0.31639
published_at 2026-04-21T12:55:00Z
2
value 0.00125
scoring_system epss
scoring_elements 0.31696
published_at 2026-04-12T12:55:00Z
3
value 0.00125
scoring_system epss
scoring_elements 0.3166
published_at 2026-04-13T12:55:00Z
4
value 0.00125
scoring_system epss
scoring_elements 0.31693
published_at 2026-04-16T12:55:00Z
5
value 0.00125
scoring_system epss
scoring_elements 0.31671
published_at 2026-04-18T12:55:00Z
6
value 0.00125
scoring_system epss
scoring_elements 0.31657
published_at 2026-04-01T12:55:00Z
7
value 0.00125
scoring_system epss
scoring_elements 0.31834
published_at 2026-04-04T12:55:00Z
8
value 0.00125
scoring_system epss
scoring_elements 0.31653
published_at 2026-04-07T12:55:00Z
9
value 0.00125
scoring_system epss
scoring_elements 0.31704
published_at 2026-04-08T12:55:00Z
10
value 0.00125
scoring_system epss
scoring_elements 0.31733
published_at 2026-04-09T12:55:00Z
11
value 0.00125
scoring_system epss
scoring_elements 0.31736
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2867
1
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
reference_id cpujul2019-5072835.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:16:34Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
2
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:16:34Z/
url https://security.gentoo.org/glsa/202101-09
3
reference_url https://www.zerodayinitiative.com/advisories/ZDI-19-963/
reference_id ZDI-19-963
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:16:34Z/
url https://www.zerodayinitiative.com/advisories/ZDI-19-963/
4
reference_url https://www.zerodayinitiative.com/advisories/ZDI-19-964/
reference_id ZDI-19-964
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:16:34Z/
url https://www.zerodayinitiative.com/advisories/ZDI-19-964/
5
reference_url https://www.zerodayinitiative.com/advisories/ZDI-19-965/
reference_id ZDI-19-965
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:16:34Z/
url https://www.zerodayinitiative.com/advisories/ZDI-19-965/
fixed_packages
0
url pkg:deb/debian/virtualbox@6.0.10-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.0.10-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.0.10-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2019-2867
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-my2u-yfbp-97df
253
url VCID-mzqw-dysw-rfh7
vulnerability_id VCID-mzqw-dysw-rfh7
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2842
reference_id
reference_type
scores
0
value 0.00135
scoring_system epss
scoring_elements 0.33171
published_at 2026-04-21T12:55:00Z
1
value 0.00135
scoring_system epss
scoring_elements 0.33253
published_at 2026-04-11T12:55:00Z
2
value 0.00135
scoring_system epss
scoring_elements 0.33213
published_at 2026-04-12T12:55:00Z
3
value 0.00135
scoring_system epss
scoring_elements 0.33189
published_at 2026-04-13T12:55:00Z
4
value 0.00135
scoring_system epss
scoring_elements 0.33229
published_at 2026-04-16T12:55:00Z
5
value 0.00135
scoring_system epss
scoring_elements 0.33207
published_at 2026-04-18T12:55:00Z
6
value 0.00135
scoring_system epss
scoring_elements 0.3318
published_at 2026-04-01T12:55:00Z
7
value 0.00135
scoring_system epss
scoring_elements 0.33307
published_at 2026-04-02T12:55:00Z
8
value 0.00135
scoring_system epss
scoring_elements 0.3334
published_at 2026-04-04T12:55:00Z
9
value 0.00135
scoring_system epss
scoring_elements 0.33173
published_at 2026-04-07T12:55:00Z
10
value 0.00135
scoring_system epss
scoring_elements 0.33216
published_at 2026-04-08T12:55:00Z
11
value 0.00135
scoring_system epss
scoring_elements 0.33249
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2842
1
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:21:02Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
2
reference_url http://www.securityfocus.com/bid/103853
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:21:02Z/
url http://www.securityfocus.com/bid/103853
3
reference_url http://www.securitytracker.com/id/1040707
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:21:02Z/
url http://www.securitytracker.com/id/1040707
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-2842
reference_id CVE-2018-2842
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-2842
6
reference_url https://security.gentoo.org/glsa/201805-08
reference_id GLSA-201805-08
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:21:02Z/
url https://security.gentoo.org/glsa/201805-08
fixed_packages
0
url pkg:deb/debian/virtualbox@5.2.10-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.2.10-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.10-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2018-2842
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mzqw-dysw-rfh7
254
url VCID-n2ce-z1qr-1kgy
vulnerability_id VCID-n2ce-z1qr-1kgy
summary Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is 7.1.6. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox and unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-30719
reference_id
reference_type
scores
0
value 0.00073
scoring_system epss
scoring_elements 0.22059
published_at 2026-04-21T12:55:00Z
1
value 0.00073
scoring_system epss
scoring_elements 0.22104
published_at 2026-04-18T12:55:00Z
2
value 0.00073
scoring_system epss
scoring_elements 0.22225
published_at 2026-04-02T12:55:00Z
3
value 0.00073
scoring_system epss
scoring_elements 0.22272
published_at 2026-04-04T12:55:00Z
4
value 0.00073
scoring_system epss
scoring_elements 0.22056
published_at 2026-04-07T12:55:00Z
5
value 0.00073
scoring_system epss
scoring_elements 0.22136
published_at 2026-04-08T12:55:00Z
6
value 0.00073
scoring_system epss
scoring_elements 0.22191
published_at 2026-04-09T12:55:00Z
7
value 0.00073
scoring_system epss
scoring_elements 0.22212
published_at 2026-04-11T12:55:00Z
8
value 0.00073
scoring_system epss
scoring_elements 0.22171
published_at 2026-04-12T12:55:00Z
9
value 0.00073
scoring_system epss
scoring_elements 0.22111
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-30719
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103582
reference_id 1103582
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103582
2
reference_url https://www.oracle.com/security-alerts/cpuapr2025.html
reference_id cpuapr2025.html
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-17T13:38:56Z/
url https://www.oracle.com/security-alerts/cpuapr2025.html
fixed_packages
0
url pkg:deb/debian/virtualbox@7.0.26-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.0.26-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.0.26-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2025-30719
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n2ce-z1qr-1kgy
255
url VCID-n5cq-nhhv-gufx
vulnerability_id VCID-n5cq-nhhv-gufx
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2875
reference_id
reference_type
scores
0
value 0.00151
scoring_system epss
scoring_elements 0.35886
published_at 2026-04-02T12:55:00Z
1
value 0.00151
scoring_system epss
scoring_elements 0.35745
published_at 2026-04-21T12:55:00Z
2
value 0.00151
scoring_system epss
scoring_elements 0.35793
published_at 2026-04-18T12:55:00Z
3
value 0.00151
scoring_system epss
scoring_elements 0.35689
published_at 2026-04-01T12:55:00Z
4
value 0.00151
scoring_system epss
scoring_elements 0.35916
published_at 2026-04-04T12:55:00Z
5
value 0.00151
scoring_system epss
scoring_elements 0.35747
published_at 2026-04-07T12:55:00Z
6
value 0.00151
scoring_system epss
scoring_elements 0.35797
published_at 2026-04-08T12:55:00Z
7
value 0.00151
scoring_system epss
scoring_elements 0.3582
published_at 2026-04-09T12:55:00Z
8
value 0.00151
scoring_system epss
scoring_elements 0.35828
published_at 2026-04-11T12:55:00Z
9
value 0.00151
scoring_system epss
scoring_elements 0.35787
published_at 2026-04-12T12:55:00Z
10
value 0.00151
scoring_system epss
scoring_elements 0.35765
published_at 2026-04-13T12:55:00Z
11
value 0.00151
scoring_system epss
scoring_elements 0.35805
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2875
1
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
reference_id cpujul2019-5072835.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:15:57Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
2
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:15:57Z/
url https://security.gentoo.org/glsa/202101-09
fixed_packages
0
url pkg:deb/debian/virtualbox@6.0.10-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.0.10-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.0.10-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2019-2875
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n5cq-nhhv-gufx
256
url VCID-n5yh-21ya-n7ad
vulnerability_id VCID-n5yh-21ya-n7ad
summary Multiple vulnerabilities have been discovered in VirtualBox, leading to compomise of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21899
reference_id
reference_type
scores
0
value 0.00052
scoring_system epss
scoring_elements 0.16345
published_at 2026-04-21T12:55:00Z
1
value 0.00052
scoring_system epss
scoring_elements 0.16353
published_at 2026-04-13T12:55:00Z
2
value 0.00052
scoring_system epss
scoring_elements 0.16289
published_at 2026-04-16T12:55:00Z
3
value 0.00052
scoring_system epss
scoring_elements 0.16311
published_at 2026-04-18T12:55:00Z
4
value 0.00052
scoring_system epss
scoring_elements 0.16466
published_at 2026-04-02T12:55:00Z
5
value 0.00052
scoring_system epss
scoring_elements 0.16528
published_at 2026-04-04T12:55:00Z
6
value 0.00052
scoring_system epss
scoring_elements 0.16325
published_at 2026-04-07T12:55:00Z
7
value 0.00052
scoring_system epss
scoring_elements 0.16411
published_at 2026-04-08T12:55:00Z
8
value 0.00052
scoring_system epss
scoring_elements 0.1647
published_at 2026-04-09T12:55:00Z
9
value 0.00052
scoring_system epss
scoring_elements 0.16454
published_at 2026-04-11T12:55:00Z
10
value 0.00052
scoring_system epss
scoring_elements 0.16415
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21899
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029153
reference_id 1029153
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029153
2
reference_url https://security.gentoo.org/glsa/202310-07
reference_id GLSA-202310-07
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T19:39:54Z/
url https://security.gentoo.org/glsa/202310-07
fixed_packages
0
url pkg:deb/debian/virtualbox@7.0.6-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.0.6-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.0.6-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2023-21899
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n5yh-21ya-n7ad
257
url VCID-ncnb-yj3d-zqd1
vulnerability_id VCID-ncnb-yj3d-zqd1
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are prior to 5.2.24 and prior to 6.0.2. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 7.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H).
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:56:19Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2520
reference_id
reference_type
scores
0
value 0.00136
scoring_system epss
scoring_elements 0.33375
published_at 2026-04-21T12:55:00Z
1
value 0.00136
scoring_system epss
scoring_elements 0.33395
published_at 2026-04-13T12:55:00Z
2
value 0.00136
scoring_system epss
scoring_elements 0.33431
published_at 2026-04-16T12:55:00Z
3
value 0.00136
scoring_system epss
scoring_elements 0.33406
published_at 2026-04-18T12:55:00Z
4
value 0.00136
scoring_system epss
scoring_elements 0.33366
published_at 2026-04-01T12:55:00Z
5
value 0.00136
scoring_system epss
scoring_elements 0.33504
published_at 2026-04-02T12:55:00Z
6
value 0.00136
scoring_system epss
scoring_elements 0.33536
published_at 2026-04-04T12:55:00Z
7
value 0.00136
scoring_system epss
scoring_elements 0.33377
published_at 2026-04-07T12:55:00Z
8
value 0.00136
scoring_system epss
scoring_elements 0.33422
published_at 2026-04-08T12:55:00Z
9
value 0.00136
scoring_system epss
scoring_elements 0.33456
published_at 2026-04-09T12:55:00Z
10
value 0.00136
scoring_system epss
scoring_elements 0.3346
published_at 2026-04-11T12:55:00Z
11
value 0.00136
scoring_system epss
scoring_elements 0.33419
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2520
2
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:56:19Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
3
reference_url http://www.securityfocus.com/bid/106568
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:56:19Z/
url http://www.securityfocus.com/bid/106568
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-2520
reference_id CVE-2019-2520
reference_type
scores
0
value 4.4
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:P/A:P
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-2520
fixed_packages
0
url pkg:deb/debian/virtualbox@5.2.24-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.2.24-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.24-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2019-2520
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ncnb-yj3d-zqd1
258
url VCID-ngxv-3a1q-6bf3
vulnerability_id VCID-ngxv-3a1q-6bf3
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.2.28 and prior to 6.0.6. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox and unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 7.3 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2679
reference_id
reference_type
scores
0
value 0.00121
scoring_system epss
scoring_elements 0.3122
published_at 2026-04-02T12:55:00Z
1
value 0.00121
scoring_system epss
scoring_elements 0.31066
published_at 2026-04-21T12:55:00Z
2
value 0.00121
scoring_system epss
scoring_elements 0.31095
published_at 2026-04-01T12:55:00Z
3
value 0.00121
scoring_system epss
scoring_elements 0.31262
published_at 2026-04-04T12:55:00Z
4
value 0.00121
scoring_system epss
scoring_elements 0.31083
published_at 2026-04-07T12:55:00Z
5
value 0.00121
scoring_system epss
scoring_elements 0.31135
published_at 2026-04-08T12:55:00Z
6
value 0.00121
scoring_system epss
scoring_elements 0.31166
published_at 2026-04-09T12:55:00Z
7
value 0.00121
scoring_system epss
scoring_elements 0.31173
published_at 2026-04-11T12:55:00Z
8
value 0.00121
scoring_system epss
scoring_elements 0.31129
published_at 2026-04-12T12:55:00Z
9
value 0.00121
scoring_system epss
scoring_elements 0.31085
published_at 2026-04-13T12:55:00Z
10
value 0.00121
scoring_system epss
scoring_elements 0.31118
published_at 2026-04-16T12:55:00Z
11
value 0.00121
scoring_system epss
scoring_elements 0.31098
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2679
fixed_packages
0
url pkg:deb/debian/virtualbox@6.0.6-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.0.6-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.0.6-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2019-2679
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ngxv-3a1q-6bf3
259
url VCID-nmm4-nj3z-9qdb
vulnerability_id VCID-nmm4-nj3z-9qdb
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-0981
reference_id
reference_type
scores
0
value 0.06475
scoring_system epss
scoring_elements 0.91033
published_at 2026-04-01T12:55:00Z
1
value 0.06475
scoring_system epss
scoring_elements 0.91038
published_at 2026-04-02T12:55:00Z
2
value 0.06475
scoring_system epss
scoring_elements 0.91047
published_at 2026-04-04T12:55:00Z
3
value 0.06475
scoring_system epss
scoring_elements 0.91056
published_at 2026-04-07T12:55:00Z
4
value 0.06475
scoring_system epss
scoring_elements 0.91068
published_at 2026-04-08T12:55:00Z
5
value 0.06475
scoring_system epss
scoring_elements 0.91074
published_at 2026-04-09T12:55:00Z
6
value 0.06475
scoring_system epss
scoring_elements 0.91083
published_at 2026-04-11T12:55:00Z
7
value 0.06475
scoring_system epss
scoring_elements 0.91084
published_at 2026-04-13T12:55:00Z
8
value 0.06475
scoring_system epss
scoring_elements 0.91108
published_at 2026-04-18T12:55:00Z
9
value 0.06475
scoring_system epss
scoring_elements 0.9111
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-0981
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0981
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0983
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0983
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741602
reference_id 741602
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741602
4
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/32208.txt
reference_id CVE-2014-0983;CVE-2014-0982;CVE-2014-0981;OSVDB-104354;OSVDB-104353;OSVDB-104352
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/32208.txt
5
reference_url https://security.gentoo.org/glsa/201612-27
reference_id GLSA-201612-27
reference_type
scores
url https://security.gentoo.org/glsa/201612-27
fixed_packages
0
url pkg:deb/debian/virtualbox@4.3.10-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@4.3.10-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@4.3.10-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2014-0981
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nmm4-nj3z-9qdb
260
url VCID-nngp-de3b-v7f9
vulnerability_id VCID-nngp-de3b-v7f9
summary Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 7.0.20. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 2.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21164
reference_id
reference_type
scores
0
value 0.00083
scoring_system epss
scoring_elements 0.2416
published_at 2026-04-21T12:55:00Z
1
value 0.00083
scoring_system epss
scoring_elements 0.24197
published_at 2026-04-16T12:55:00Z
2
value 0.00083
scoring_system epss
scoring_elements 0.24184
published_at 2026-04-18T12:55:00Z
3
value 0.00083
scoring_system epss
scoring_elements 0.24338
published_at 2026-04-02T12:55:00Z
4
value 0.00083
scoring_system epss
scoring_elements 0.24371
published_at 2026-04-04T12:55:00Z
5
value 0.00083
scoring_system epss
scoring_elements 0.24154
published_at 2026-04-07T12:55:00Z
6
value 0.00083
scoring_system epss
scoring_elements 0.2422
published_at 2026-04-08T12:55:00Z
7
value 0.00083
scoring_system epss
scoring_elements 0.24264
published_at 2026-04-09T12:55:00Z
8
value 0.00083
scoring_system epss
scoring_elements 0.2428
published_at 2026-04-11T12:55:00Z
9
value 0.00083
scoring_system epss
scoring_elements 0.24238
published_at 2026-04-12T12:55:00Z
10
value 0.00083
scoring_system epss
scoring_elements 0.2418
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21164
1
reference_url https://www.oracle.com/security-alerts/cpujul2024.html
reference_id cpujul2024.html
reference_type
scores
0
value 2.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T14:44:46Z/
url https://www.oracle.com/security-alerts/cpujul2024.html
fixed_packages
0
url pkg:deb/debian/virtualbox@7.0.20-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.0.20-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.0.20-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2024-21164
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nngp-de3b-v7f9
261
url VCID-nnum-bqqa-fyfx
vulnerability_id VCID-nnum-bqqa-fyfx
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could result in privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14884
reference_id
reference_type
scores
0
value 0.00183
scoring_system epss
scoring_elements 0.40008
published_at 2026-04-21T12:55:00Z
1
value 0.00183
scoring_system epss
scoring_elements 0.40099
published_at 2026-04-02T12:55:00Z
2
value 0.00183
scoring_system epss
scoring_elements 0.40122
published_at 2026-04-11T12:55:00Z
3
value 0.00183
scoring_system epss
scoring_elements 0.40084
published_at 2026-04-12T12:55:00Z
4
value 0.00183
scoring_system epss
scoring_elements 0.40065
published_at 2026-04-13T12:55:00Z
5
value 0.00183
scoring_system epss
scoring_elements 0.40115
published_at 2026-04-16T12:55:00Z
6
value 0.00183
scoring_system epss
scoring_elements 0.40086
published_at 2026-04-18T12:55:00Z
7
value 0.00183
scoring_system epss
scoring_elements 0.39952
published_at 2026-04-01T12:55:00Z
8
value 0.00183
scoring_system epss
scoring_elements 0.40125
published_at 2026-04-04T12:55:00Z
9
value 0.00183
scoring_system epss
scoring_elements 0.40046
published_at 2026-04-07T12:55:00Z
10
value 0.00183
scoring_system epss
scoring_elements 0.40098
published_at 2026-04-08T12:55:00Z
11
value 0.00183
scoring_system epss
scoring_elements 0.40112
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14884
1
reference_url https://security.gentoo.org/glsa/202101-15
reference_id GLSA-202101-15
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:01Z/
url https://security.gentoo.org/glsa/202101-15
2
reference_url https://www.zerodayinitiative.com/advisories/ZDI-20-1279/
reference_id ZDI-20-1279
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:01Z/
url https://www.zerodayinitiative.com/advisories/ZDI-20-1279/
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.16-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.16-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.16-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2020-14884
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nnum-bqqa-fyfx
262
url VCID-npcf-ak1s-tbe7
vulnerability_id VCID-npcf-ak1s-tbe7
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2725
reference_id
reference_type
scores
0
value 0.00151
scoring_system epss
scoring_elements 0.35664
published_at 2026-04-21T12:55:00Z
1
value 0.00151
scoring_system epss
scoring_elements 0.35769
published_at 2026-04-02T12:55:00Z
2
value 0.00151
scoring_system epss
scoring_elements 0.35753
published_at 2026-04-11T12:55:00Z
3
value 0.00151
scoring_system epss
scoring_elements 0.35709
published_at 2026-04-12T12:55:00Z
4
value 0.00151
scoring_system epss
scoring_elements 0.35685
published_at 2026-04-13T12:55:00Z
5
value 0.00151
scoring_system epss
scoring_elements 0.35726
published_at 2026-04-16T12:55:00Z
6
value 0.00151
scoring_system epss
scoring_elements 0.35714
published_at 2026-04-18T12:55:00Z
7
value 0.00151
scoring_system epss
scoring_elements 0.35573
published_at 2026-04-01T12:55:00Z
8
value 0.00151
scoring_system epss
scoring_elements 0.35795
published_at 2026-04-04T12:55:00Z
9
value 0.00151
scoring_system epss
scoring_elements 0.35675
published_at 2026-04-07T12:55:00Z
10
value 0.00151
scoring_system epss
scoring_elements 0.35721
published_at 2026-04-08T12:55:00Z
11
value 0.00151
scoring_system epss
scoring_elements 0.35744
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2725
1
reference_url https://security.gentoo.org/glsa/202004-02
reference_id GLSA-202004-02
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:01:03Z/
url https://security.gentoo.org/glsa/202004-02
2
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:01:03Z/
url https://security.gentoo.org/glsa/202101-09
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.2-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.2-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.2-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2020-2725
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-npcf-ak1s-tbe7
263
url VCID-nqkb-c7nt-17fj
vulnerability_id VCID-nqkb-c7nt-17fj
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14698
reference_id
reference_type
scores
0
value 0.00146
scoring_system epss
scoring_elements 0.3487
published_at 2026-04-01T12:55:00Z
1
value 0.00146
scoring_system epss
scoring_elements 0.35068
published_at 2026-04-02T12:55:00Z
2
value 0.00146
scoring_system epss
scoring_elements 0.35052
published_at 2026-04-11T12:55:00Z
3
value 0.00146
scoring_system epss
scoring_elements 0.35016
published_at 2026-04-12T12:55:00Z
4
value 0.00146
scoring_system epss
scoring_elements 0.34993
published_at 2026-04-13T12:55:00Z
5
value 0.00146
scoring_system epss
scoring_elements 0.35034
published_at 2026-04-16T12:55:00Z
6
value 0.00146
scoring_system epss
scoring_elements 0.35019
published_at 2026-04-18T12:55:00Z
7
value 0.00146
scoring_system epss
scoring_elements 0.34973
published_at 2026-04-21T12:55:00Z
8
value 0.00146
scoring_system epss
scoring_elements 0.35095
published_at 2026-04-04T12:55:00Z
9
value 0.00146
scoring_system epss
scoring_elements 0.34975
published_at 2026-04-07T12:55:00Z
10
value 0.00146
scoring_system epss
scoring_elements 0.3502
published_at 2026-04-08T12:55:00Z
11
value 0.00146
scoring_system epss
scoring_elements 0.35048
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14698
1
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:29Z/
url https://security.gentoo.org/glsa/202101-09
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html
reference_id msg00068.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:29Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html
reference_id msg00079.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:29Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html
4
reference_url https://www.zerodayinitiative.com/advisories/ZDI-20-901/
reference_id ZDI-20-901
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:29Z/
url https://www.zerodayinitiative.com/advisories/ZDI-20-901/
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.12-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.12-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.12-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2020-14698
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nqkb-c7nt-17fj
264
url VCID-nr3b-wh76-gqdj
vulnerability_id VCID-nr3b-wh76-gqdj
summary Multiple vulnerabilities have been discovered in Oracle Virtualbox, the worst of which could result in root privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21487
reference_id
reference_type
scores
0
value 0.00045
scoring_system epss
scoring_elements 0.13628
published_at 2026-04-21T12:55:00Z
1
value 0.00045
scoring_system epss
scoring_elements 0.13775
published_at 2026-04-02T12:55:00Z
2
value 0.00045
scoring_system epss
scoring_elements 0.13732
published_at 2026-04-11T12:55:00Z
3
value 0.00045
scoring_system epss
scoring_elements 0.13695
published_at 2026-04-12T12:55:00Z
4
value 0.00045
scoring_system epss
scoring_elements 0.13646
published_at 2026-04-13T12:55:00Z
5
value 0.00045
scoring_system epss
scoring_elements 0.13557
published_at 2026-04-16T12:55:00Z
6
value 0.00045
scoring_system epss
scoring_elements 0.13555
published_at 2026-04-18T12:55:00Z
7
value 0.00045
scoring_system epss
scoring_elements 0.13831
published_at 2026-04-04T12:55:00Z
8
value 0.00045
scoring_system epss
scoring_elements 0.1363
published_at 2026-04-07T12:55:00Z
9
value 0.00045
scoring_system epss
scoring_elements 0.13711
published_at 2026-04-08T12:55:00Z
10
value 0.00045
scoring_system epss
scoring_elements 0.13762
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21487
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://security.gentoo.org/glsa/202208-36
reference_id GLSA-202208-36
reference_type
scores
0
value 3.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T18:36:39Z/
url https://security.gentoo.org/glsa/202208-36
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.34-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.34-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.34-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2022-21487
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nr3b-wh76-gqdj
265
url VCID-nsk9-6w9h-hbes
vulnerability_id VCID-nsk9-6w9h-hbes
summary Multiple vulnerabilities have been discovered in Oracle Virtualbox, the worst of which could result in root privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21488
reference_id
reference_type
scores
0
value 0.00063
scoring_system epss
scoring_elements 0.19533
published_at 2026-04-21T12:55:00Z
1
value 0.00063
scoring_system epss
scoring_elements 0.19745
published_at 2026-04-02T12:55:00Z
2
value 0.00063
scoring_system epss
scoring_elements 0.19656
published_at 2026-04-11T12:55:00Z
3
value 0.00063
scoring_system epss
scoring_elements 0.19608
published_at 2026-04-12T12:55:00Z
4
value 0.00063
scoring_system epss
scoring_elements 0.19549
published_at 2026-04-13T12:55:00Z
5
value 0.00063
scoring_system epss
scoring_elements 0.19513
published_at 2026-04-16T12:55:00Z
6
value 0.00063
scoring_system epss
scoring_elements 0.19521
published_at 2026-04-18T12:55:00Z
7
value 0.00063
scoring_system epss
scoring_elements 0.19795
published_at 2026-04-04T12:55:00Z
8
value 0.00063
scoring_system epss
scoring_elements 0.19519
published_at 2026-04-07T12:55:00Z
9
value 0.00063
scoring_system epss
scoring_elements 0.19599
published_at 2026-04-08T12:55:00Z
10
value 0.00063
scoring_system epss
scoring_elements 0.19652
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21488
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://security.gentoo.org/glsa/202208-36
reference_id GLSA-202208-36
reference_type
scores
0
value 3.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T18:36:38Z/
url https://security.gentoo.org/glsa/202208-36
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.34-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.34-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.34-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2022-21488
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nsk9-6w9h-hbes
266
url VCID-nvsw-y77g-dfg2
vulnerability_id VCID-nvsw-y77g-dfg2
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2984
reference_id
reference_type
scores
0
value 0.00167
scoring_system epss
scoring_elements 0.3771
published_at 2026-04-01T12:55:00Z
1
value 0.00167
scoring_system epss
scoring_elements 0.37845
published_at 2026-04-08T12:55:00Z
2
value 0.00167
scoring_system epss
scoring_elements 0.37857
published_at 2026-04-16T12:55:00Z
3
value 0.00167
scoring_system epss
scoring_elements 0.37872
published_at 2026-04-11T12:55:00Z
4
value 0.00167
scoring_system epss
scoring_elements 0.37836
published_at 2026-04-12T12:55:00Z
5
value 0.00167
scoring_system epss
scoring_elements 0.37811
published_at 2026-04-13T12:55:00Z
6
value 0.00167
scoring_system epss
scoring_elements 0.37838
published_at 2026-04-18T12:55:00Z
7
value 0.00167
scoring_system epss
scoring_elements 0.37891
published_at 2026-04-02T12:55:00Z
8
value 0.00167
scoring_system epss
scoring_elements 0.37916
published_at 2026-04-04T12:55:00Z
9
value 0.00167
scoring_system epss
scoring_elements 0.37794
published_at 2026-04-07T12:55:00Z
10
value 0.00201
scoring_system epss
scoring_elements 0.42193
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2984
1
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:50Z/
url http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
2
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
3
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-2984
reference_id CVE-2019-2984
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
1
value 6.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-2984
4
reference_url https://security.gentoo.org/glsa/202004-02
reference_id GLSA-202004-02
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:50Z/
url https://security.gentoo.org/glsa/202004-02
5
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:50Z/
url https://security.gentoo.org/glsa/202101-09
fixed_packages
0
url pkg:deb/debian/virtualbox@6.0.14-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.0.14-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.0.14-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2019-2984
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nvsw-y77g-dfg2
267
url VCID-nwhw-7q9q-cfgq
vulnerability_id VCID-nwhw-7q9q-cfgq
summary Multiple vulnerabilities have been discovered in VirtualBox, leading to compomise of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21889
reference_id
reference_type
scores
0
value 0.00073
scoring_system epss
scoring_elements 0.2219
published_at 2026-04-21T12:55:00Z
1
value 0.00073
scoring_system epss
scoring_elements 0.22239
published_at 2026-04-13T12:55:00Z
2
value 0.00073
scoring_system epss
scoring_elements 0.22243
published_at 2026-04-16T12:55:00Z
3
value 0.00073
scoring_system epss
scoring_elements 0.22237
published_at 2026-04-18T12:55:00Z
4
value 0.00073
scoring_system epss
scoring_elements 0.22352
published_at 2026-04-02T12:55:00Z
5
value 0.00073
scoring_system epss
scoring_elements 0.22397
published_at 2026-04-04T12:55:00Z
6
value 0.00073
scoring_system epss
scoring_elements 0.22181
published_at 2026-04-07T12:55:00Z
7
value 0.00073
scoring_system epss
scoring_elements 0.22264
published_at 2026-04-08T12:55:00Z
8
value 0.00073
scoring_system epss
scoring_elements 0.22318
published_at 2026-04-09T12:55:00Z
9
value 0.00073
scoring_system epss
scoring_elements 0.22339
published_at 2026-04-11T12:55:00Z
10
value 0.00073
scoring_system epss
scoring_elements 0.22298
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21889
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029153
reference_id 1029153
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029153
2
reference_url https://security.gentoo.org/glsa/202310-07
reference_id GLSA-202310-07
reference_type
scores
0
value 3.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T14:03:07Z/
url https://security.gentoo.org/glsa/202310-07
fixed_packages
0
url pkg:deb/debian/virtualbox@7.0.6-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.0.6-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.0.6-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2023-21889
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nwhw-7q9q-cfgq
268
url VCID-nygk-v118-wfa9
vulnerability_id VCID-nygk-v118-wfa9
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are prior to 5.2.24 and prior to 6.0.2. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:56:09Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2552
reference_id
reference_type
scores
0
value 0.00136
scoring_system epss
scoring_elements 0.33375
published_at 2026-04-21T12:55:00Z
1
value 0.00136
scoring_system epss
scoring_elements 0.33395
published_at 2026-04-13T12:55:00Z
2
value 0.00136
scoring_system epss
scoring_elements 0.33431
published_at 2026-04-16T12:55:00Z
3
value 0.00136
scoring_system epss
scoring_elements 0.33406
published_at 2026-04-18T12:55:00Z
4
value 0.00136
scoring_system epss
scoring_elements 0.33366
published_at 2026-04-01T12:55:00Z
5
value 0.00136
scoring_system epss
scoring_elements 0.33504
published_at 2026-04-02T12:55:00Z
6
value 0.00136
scoring_system epss
scoring_elements 0.33536
published_at 2026-04-04T12:55:00Z
7
value 0.00136
scoring_system epss
scoring_elements 0.33377
published_at 2026-04-07T12:55:00Z
8
value 0.00136
scoring_system epss
scoring_elements 0.33422
published_at 2026-04-08T12:55:00Z
9
value 0.00136
scoring_system epss
scoring_elements 0.33456
published_at 2026-04-09T12:55:00Z
10
value 0.00136
scoring_system epss
scoring_elements 0.3346
published_at 2026-04-11T12:55:00Z
11
value 0.00136
scoring_system epss
scoring_elements 0.33419
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2552
2
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:56:09Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
3
reference_url http://www.securityfocus.com/bid/106568
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:56:09Z/
url http://www.securityfocus.com/bid/106568
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-2552
reference_id CVE-2019-2552
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-2552
fixed_packages
0
url pkg:deb/debian/virtualbox@5.2.24-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.2.24-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.24-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2019-2552
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nygk-v118-wfa9
269
url VCID-nyw9-n4q9-yycg
vulnerability_id VCID-nyw9-n4q9-yycg
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2837
reference_id
reference_type
scores
0
value 0.00135
scoring_system epss
scoring_elements 0.33171
published_at 2026-04-21T12:55:00Z
1
value 0.00135
scoring_system epss
scoring_elements 0.33253
published_at 2026-04-11T12:55:00Z
2
value 0.00135
scoring_system epss
scoring_elements 0.33213
published_at 2026-04-12T12:55:00Z
3
value 0.00135
scoring_system epss
scoring_elements 0.33189
published_at 2026-04-13T12:55:00Z
4
value 0.00135
scoring_system epss
scoring_elements 0.33229
published_at 2026-04-16T12:55:00Z
5
value 0.00135
scoring_system epss
scoring_elements 0.33207
published_at 2026-04-18T12:55:00Z
6
value 0.00135
scoring_system epss
scoring_elements 0.3318
published_at 2026-04-01T12:55:00Z
7
value 0.00135
scoring_system epss
scoring_elements 0.33307
published_at 2026-04-02T12:55:00Z
8
value 0.00135
scoring_system epss
scoring_elements 0.3334
published_at 2026-04-04T12:55:00Z
9
value 0.00135
scoring_system epss
scoring_elements 0.33173
published_at 2026-04-07T12:55:00Z
10
value 0.00135
scoring_system epss
scoring_elements 0.33216
published_at 2026-04-08T12:55:00Z
11
value 0.00135
scoring_system epss
scoring_elements 0.33249
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2837
1
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:41Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
2
reference_url http://www.securityfocus.com/bid/103859
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:41Z/
url http://www.securityfocus.com/bid/103859
3
reference_url http://www.securitytracker.com/id/1040707
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:41Z/
url http://www.securitytracker.com/id/1040707
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-2837
reference_id CVE-2018-2837
reference_type
scores
0
value 4.4
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:P/A:P
1
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-2837
6
reference_url https://security.gentoo.org/glsa/201805-08
reference_id GLSA-201805-08
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:41Z/
url https://security.gentoo.org/glsa/201805-08
fixed_packages
0
url pkg:deb/debian/virtualbox@5.2.10-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.2.10-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.10-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2018-2837
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nyw9-n4q9-yycg
270
url VCID-p1vb-s1bn-cbhx
vulnerability_id VCID-p1vb-s1bn-cbhx
summary Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization VirtualBox before 4.1.34, 4.2.26, and 4.3.12 allows local users to affect confidentiality, integrity, and availability via vectors related to Graphics driver (WDDM) for Windows guests.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-4228
reference_id
reference_type
scores
0
value 0.00111
scoring_system epss
scoring_elements 0.29408
published_at 2026-04-21T12:55:00Z
1
value 0.00111
scoring_system epss
scoring_elements 0.29517
published_at 2026-04-01T12:55:00Z
2
value 0.00111
scoring_system epss
scoring_elements 0.29584
published_at 2026-04-02T12:55:00Z
3
value 0.00111
scoring_system epss
scoring_elements 0.29633
published_at 2026-04-04T12:55:00Z
4
value 0.00111
scoring_system epss
scoring_elements 0.29455
published_at 2026-04-07T12:55:00Z
5
value 0.00111
scoring_system epss
scoring_elements 0.29518
published_at 2026-04-08T12:55:00Z
6
value 0.00111
scoring_system epss
scoring_elements 0.29557
published_at 2026-04-09T12:55:00Z
7
value 0.00111
scoring_system epss
scoring_elements 0.29559
published_at 2026-04-11T12:55:00Z
8
value 0.00111
scoring_system epss
scoring_elements 0.29515
published_at 2026-04-12T12:55:00Z
9
value 0.00111
scoring_system epss
scoring_elements 0.29462
published_at 2026-04-13T12:55:00Z
10
value 0.00111
scoring_system epss
scoring_elements 0.29481
published_at 2026-04-16T12:55:00Z
11
value 0.00111
scoring_system epss
scoring_elements 0.29453
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-4228
1
reference_url http://seclists.org/fulldisclosure/2014/Dec/23
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2014/Dec/23
2
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/94613
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/94613
3
reference_url http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
4
reference_url http://www.securityfocus.com/archive/1/534161/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/534161/100/0/threaded
5
reference_url http://www.securityfocus.com/bid/68601
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/68601
6
reference_url http://www.vmware.com/security/advisories/VMSA-2014-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2014-0012.html
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=754939
reference_id 754939
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=754939
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.0:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.10:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.12:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.14:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.16:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.18:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.2:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.20:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.22:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.24:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.26:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.26:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.28:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.28:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.28:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.30:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.30:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.4:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.6:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.8:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.2.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.10:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.2.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.12:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.2.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.14:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.2.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.16:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.2.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.18:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.2:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.2.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.20:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.2.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.22:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.4:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.6:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.8:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.3.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.3.2:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.3.4:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.3.6:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.3.8:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-4228
reference_id CVE-2014-4228
reference_type
scores
0
value 4.4
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-4228
fixed_packages
0
url pkg:deb/debian/virtualbox@4.3.12-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@4.3.12-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@4.3.12-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2014-4228
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p1vb-s1bn-cbhx
271
url VCID-p2kk-dt57-r7ap
vulnerability_id VCID-p2kk-dt57-r7ap
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could result in privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2121
reference_id
reference_type
scores
0
value 0.00166
scoring_system epss
scoring_elements 0.37724
published_at 2026-04-21T12:55:00Z
1
value 0.00166
scoring_system epss
scoring_elements 0.37782
published_at 2026-04-12T12:55:00Z
2
value 0.00166
scoring_system epss
scoring_elements 0.37756
published_at 2026-04-13T12:55:00Z
3
value 0.00166
scoring_system epss
scoring_elements 0.37804
published_at 2026-04-16T12:55:00Z
4
value 0.00166
scoring_system epss
scoring_elements 0.37784
published_at 2026-04-18T12:55:00Z
5
value 0.00166
scoring_system epss
scoring_elements 0.37654
published_at 2026-04-01T12:55:00Z
6
value 0.00166
scoring_system epss
scoring_elements 0.37835
published_at 2026-04-02T12:55:00Z
7
value 0.00166
scoring_system epss
scoring_elements 0.37861
published_at 2026-04-04T12:55:00Z
8
value 0.00166
scoring_system epss
scoring_elements 0.37739
published_at 2026-04-07T12:55:00Z
9
value 0.00166
scoring_system epss
scoring_elements 0.3779
published_at 2026-04-08T12:55:00Z
10
value 0.00166
scoring_system epss
scoring_elements 0.37803
published_at 2026-04-09T12:55:00Z
11
value 0.00166
scoring_system epss
scoring_elements 0.37817
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2121
1
reference_url https://security.archlinux.org/ASA-202101-37
reference_id ASA-202101-37
reference_type
scores
url https://security.archlinux.org/ASA-202101-37
2
reference_url https://security.archlinux.org/AVG-1483
reference_id AVG-1483
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1483
3
reference_url https://security.gentoo.org/glsa/202101-15
reference_id GLSA-202101-15
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:53:24Z/
url https://security.gentoo.org/glsa/202101-15
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.18-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.18-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.18-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2021-2121
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p2kk-dt57-r7ap
272
url VCID-p3bj-xmqm-73fe
vulnerability_id VCID-p3bj-xmqm-73fe
summary Unspecified vulnerability in the Oracle VM VirtualBox component before 5.0.28 and 5.1.x before 5.1.8 in Oracle Virtualization allows local users to affect confidentiality, integrity, and availability via vectors related to Core, a different vulnerability than CVE-2016-5538.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5501
reference_id
reference_type
scores
0
value 0.00047
scoring_system epss
scoring_elements 0.14311
published_at 2026-04-21T12:55:00Z
1
value 0.00047
scoring_system epss
scoring_elements 0.14238
published_at 2026-04-16T12:55:00Z
2
value 0.00047
scoring_system epss
scoring_elements 0.14239
published_at 2026-04-18T12:55:00Z
3
value 0.00047
scoring_system epss
scoring_elements 0.14405
published_at 2026-04-01T12:55:00Z
4
value 0.00047
scoring_system epss
scoring_elements 0.14475
published_at 2026-04-02T12:55:00Z
5
value 0.00047
scoring_system epss
scoring_elements 0.14545
published_at 2026-04-04T12:55:00Z
6
value 0.00047
scoring_system epss
scoring_elements 0.14353
published_at 2026-04-07T12:55:00Z
7
value 0.00047
scoring_system epss
scoring_elements 0.14437
published_at 2026-04-08T12:55:00Z
8
value 0.00047
scoring_system epss
scoring_elements 0.14491
published_at 2026-04-09T12:55:00Z
9
value 0.00047
scoring_system epss
scoring_elements 0.1444
published_at 2026-04-11T12:55:00Z
10
value 0.00047
scoring_system epss
scoring_elements 0.14403
published_at 2026-04-12T12:55:00Z
11
value 0.00047
scoring_system epss
scoring_elements 0.14348
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5501
1
reference_url http://www.securityfocus.com/bid/93687
reference_id 93687
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:47:07Z/
url http://www.securityfocus.com/bid/93687
fixed_packages
0
url pkg:deb/debian/virtualbox@5.1.8-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.1.8-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.1.8-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2016-5501
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p3bj-xmqm-73fe
273
url VCID-pfke-a98y-akej
vulnerability_id VCID-pfke-a98y-akej
summary Oracle Virtualization: From CVEorg collector
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21259.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21259.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21259
reference_id
reference_type
scores
0
value 0.00063
scoring_system epss
scoring_elements 0.19648
published_at 2026-04-21T12:55:00Z
1
value 0.00063
scoring_system epss
scoring_elements 0.19632
published_at 2026-04-16T12:55:00Z
2
value 0.00063
scoring_system epss
scoring_elements 0.19634
published_at 2026-04-18T12:55:00Z
3
value 0.00063
scoring_system epss
scoring_elements 0.19844
published_at 2026-04-02T12:55:00Z
4
value 0.00063
scoring_system epss
scoring_elements 0.19898
published_at 2026-04-04T12:55:00Z
5
value 0.00063
scoring_system epss
scoring_elements 0.19627
published_at 2026-04-07T12:55:00Z
6
value 0.00063
scoring_system epss
scoring_elements 0.19707
published_at 2026-04-08T12:55:00Z
7
value 0.00063
scoring_system epss
scoring_elements 0.19758
published_at 2026-04-09T12:55:00Z
8
value 0.00063
scoring_system epss
scoring_elements 0.19762
published_at 2026-04-11T12:55:00Z
9
value 0.00063
scoring_system epss
scoring_elements 0.19713
published_at 2026-04-12T12:55:00Z
10
value 0.00063
scoring_system epss
scoring_elements 0.19656
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21259
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085440
reference_id 1085440
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085440
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2318872
reference_id 2318872
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2318872
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.0.22:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.1.2:*:*:*:*:*:*:*
fixed_packages
0
url pkg:deb/debian/virtualbox@7.0.26-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.0.26-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.0.26-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2024-21259
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pfke-a98y-akej
274
url VCID-pfqq-62vj-xqes
vulnerability_id VCID-pfqq-62vj-xqes
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.0.38 and Prior to 5.1.20. Easily "exploitable" vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3561
reference_id
reference_type
scores
0
value 0.00221
scoring_system epss
scoring_elements 0.44749
published_at 2026-04-21T12:55:00Z
1
value 0.00221
scoring_system epss
scoring_elements 0.44802
published_at 2026-04-11T12:55:00Z
2
value 0.00221
scoring_system epss
scoring_elements 0.44771
published_at 2026-04-12T12:55:00Z
3
value 0.00221
scoring_system epss
scoring_elements 0.44773
published_at 2026-04-13T12:55:00Z
4
value 0.00221
scoring_system epss
scoring_elements 0.44826
published_at 2026-04-16T12:55:00Z
5
value 0.00221
scoring_system epss
scoring_elements 0.44819
published_at 2026-04-18T12:55:00Z
6
value 0.00221
scoring_system epss
scoring_elements 0.4469
published_at 2026-04-01T12:55:00Z
7
value 0.00221
scoring_system epss
scoring_elements 0.4477
published_at 2026-04-02T12:55:00Z
8
value 0.00221
scoring_system epss
scoring_elements 0.44791
published_at 2026-04-04T12:55:00Z
9
value 0.00221
scoring_system epss
scoring_elements 0.4473
published_at 2026-04-07T12:55:00Z
10
value 0.00221
scoring_system epss
scoring_elements 0.44783
published_at 2026-04-08T12:55:00Z
11
value 0.00221
scoring_system epss
scoring_elements 0.44785
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3561
1
reference_url https://www.exploit-db.com/exploits/41905/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:18Z/
url https://www.exploit-db.com/exploits/41905/
2
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:18Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
3
reference_url http://www.securityfocus.com/bid/97730
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:18Z/
url http://www.securityfocus.com/bid/97730
4
reference_url http://www.securitytracker.com/id/1038288
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T16:22:18Z/
url http://www.securitytracker.com/id/1038288
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
6
reference_url https://bugs.chromium.org/p/project-zero/issues/detail?id=1091
reference_id CVE-2017-3561
reference_type exploit
scores
url https://bugs.chromium.org/p/project-zero/issues/detail?id=1091
7
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/41905.txt
reference_id CVE-2017-3561
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/41905.txt
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-3561
reference_id CVE-2017-3561
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-3561
fixed_packages
0
url pkg:deb/debian/virtualbox@5.1.20-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.1.20-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.1.20-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2017-3561
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pfqq-62vj-xqes
275
url VCID-pq4m-djh5-hbb6
vulnerability_id VCID-pq4m-djh5-hbb6
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-0983
reference_id
reference_type
scores
0
value 0.12015
scoring_system epss
scoring_elements 0.93739
published_at 2026-04-01T12:55:00Z
1
value 0.12015
scoring_system epss
scoring_elements 0.93748
published_at 2026-04-02T12:55:00Z
2
value 0.12015
scoring_system epss
scoring_elements 0.93758
published_at 2026-04-04T12:55:00Z
3
value 0.12015
scoring_system epss
scoring_elements 0.93761
published_at 2026-04-07T12:55:00Z
4
value 0.12015
scoring_system epss
scoring_elements 0.9377
published_at 2026-04-08T12:55:00Z
5
value 0.12015
scoring_system epss
scoring_elements 0.93772
published_at 2026-04-09T12:55:00Z
6
value 0.12015
scoring_system epss
scoring_elements 0.93777
published_at 2026-04-11T12:55:00Z
7
value 0.12015
scoring_system epss
scoring_elements 0.93778
published_at 2026-04-13T12:55:00Z
8
value 0.12015
scoring_system epss
scoring_elements 0.938
published_at 2026-04-16T12:55:00Z
9
value 0.12015
scoring_system epss
scoring_elements 0.93805
published_at 2026-04-18T12:55:00Z
10
value 0.12015
scoring_system epss
scoring_elements 0.93808
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-0983
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0981
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0983
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0983
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741602
reference_id 741602
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741602
4
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows_x86-64/remote/34334.rb
reference_id CVE-2015-4523;OSVDB-104354;CVE-2014-0983
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows_x86-64/remote/34334.rb
5
reference_url http://www.coresecurity.com/advisories/oracle-virtualbox-3d-acceleration-multiple-memory-corruption-vulnerabilities
reference_id CVE-2015-4523;OSVDB-104354;CVE-2014-0983
reference_type exploit
scores
url http://www.coresecurity.com/advisories/oracle-virtualbox-3d-acceleration-multiple-memory-corruption-vulnerabilities
6
reference_url https://security.gentoo.org/glsa/201612-27
reference_id GLSA-201612-27
reference_type
scores
url https://security.gentoo.org/glsa/201612-27
fixed_packages
0
url pkg:deb/debian/virtualbox@4.3.10-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@4.3.10-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@4.3.10-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2014-0983
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pq4m-djh5-hbb6
276
url VCID-puye-vcas-s7dv
vulnerability_id VCID-puye-vcas-s7dv
summary Multiple vulnerabilities have been discovered in Oracle Virtualbox, the worst of which could result in root privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2291
reference_id
reference_type
scores
0
value 0.0017
scoring_system epss
scoring_elements 0.3814
published_at 2026-04-21T12:55:00Z
1
value 0.0017
scoring_system epss
scoring_elements 0.38161
published_at 2026-04-07T12:55:00Z
2
value 0.0017
scoring_system epss
scoring_elements 0.38212
published_at 2026-04-08T12:55:00Z
3
value 0.0017
scoring_system epss
scoring_elements 0.38207
published_at 2026-04-18T12:55:00Z
4
value 0.0017
scoring_system epss
scoring_elements 0.38226
published_at 2026-04-16T12:55:00Z
5
value 0.0017
scoring_system epss
scoring_elements 0.38179
published_at 2026-04-13T12:55:00Z
6
value 0.0017
scoring_system epss
scoring_elements 0.38203
published_at 2026-04-12T12:55:00Z
7
value 0.0017
scoring_system epss
scoring_elements 0.38239
published_at 2026-04-11T12:55:00Z
8
value 0.0017
scoring_system epss
scoring_elements 0.3822
published_at 2026-04-09T12:55:00Z
9
value 0.00425
scoring_system epss
scoring_elements 0.62217
published_at 2026-04-04T12:55:00Z
10
value 0.00425
scoring_system epss
scoring_elements 0.62186
published_at 2026-04-02T12:55:00Z
11
value 0.00425
scoring_system epss
scoring_elements 0.62125
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2291
1
reference_url https://security.archlinux.org/ASA-202104-9
reference_id ASA-202104-9
reference_type
scores
url https://security.archlinux.org/ASA-202104-9
2
reference_url https://security.archlinux.org/AVG-1846
reference_id AVG-1846
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1846
3
reference_url https://security.gentoo.org/glsa/202208-36
reference_id GLSA-202208-36
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:50Z/
url https://security.gentoo.org/glsa/202208-36
4
reference_url https://www.zerodayinitiative.com/advisories/ZDI-21-457/
reference_id ZDI-21-457
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:50Z/
url https://www.zerodayinitiative.com/advisories/ZDI-21-457/
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.20-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.20-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.20-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2021-2291
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-puye-vcas-s7dv
277
url VCID-pz6x-vubk-5kaq
vulnerability_id VCID-pz6x-vubk-5kaq
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-3288
reference_id
reference_type
scores
0
value 0.00444
scoring_system epss
scoring_elements 0.63337
published_at 2026-04-02T12:55:00Z
1
value 0.00444
scoring_system epss
scoring_elements 0.63383
published_at 2026-04-21T12:55:00Z
2
value 0.00444
scoring_system epss
scoring_elements 0.63398
published_at 2026-04-16T12:55:00Z
3
value 0.00444
scoring_system epss
scoring_elements 0.63406
published_at 2026-04-18T12:55:00Z
4
value 0.00444
scoring_system epss
scoring_elements 0.63277
published_at 2026-04-01T12:55:00Z
5
value 0.00444
scoring_system epss
scoring_elements 0.63364
published_at 2026-04-13T12:55:00Z
6
value 0.00444
scoring_system epss
scoring_elements 0.6333
published_at 2026-04-07T12:55:00Z
7
value 0.00444
scoring_system epss
scoring_elements 0.63381
published_at 2026-04-08T12:55:00Z
8
value 0.00444
scoring_system epss
scoring_elements 0.63399
published_at 2026-04-12T12:55:00Z
9
value 0.00444
scoring_system epss
scoring_elements 0.63416
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-3288
1
reference_url http://www.securitytracker.com/id/1041887
reference_id 1041887
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:03Z/
url http://www.securitytracker.com/id/1041887
2
reference_url http://www.securityfocus.com/bid/105619
reference_id 105619
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:03Z/
url http://www.securityfocus.com/bid/105619
fixed_packages
0
url pkg:deb/debian/virtualbox@5.2.20-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.2.20-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.20-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2018-3288
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pz6x-vubk-5kaq
278
url VCID-q4r8-w7tf-ykab
vulnerability_id VCID-q4r8-w7tf-ykab
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.0.38 and Prior to 5.1.20. Easily "exploitable" vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox as well as unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data and unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 8.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3558
reference_id
reference_type
scores
0
value 0.00157
scoring_system epss
scoring_elements 0.36431
published_at 2026-04-21T12:55:00Z
1
value 0.00157
scoring_system epss
scoring_elements 0.36521
published_at 2026-04-11T12:55:00Z
2
value 0.00157
scoring_system epss
scoring_elements 0.36485
published_at 2026-04-12T12:55:00Z
3
value 0.00157
scoring_system epss
scoring_elements 0.36462
published_at 2026-04-13T12:55:00Z
4
value 0.00157
scoring_system epss
scoring_elements 0.36504
published_at 2026-04-16T12:55:00Z
5
value 0.00157
scoring_system epss
scoring_elements 0.36487
published_at 2026-04-18T12:55:00Z
6
value 0.00157
scoring_system epss
scoring_elements 0.36401
published_at 2026-04-01T12:55:00Z
7
value 0.00157
scoring_system epss
scoring_elements 0.36572
published_at 2026-04-02T12:55:00Z
8
value 0.00157
scoring_system epss
scoring_elements 0.36605
published_at 2026-04-04T12:55:00Z
9
value 0.00157
scoring_system epss
scoring_elements 0.36442
published_at 2026-04-07T12:55:00Z
10
value 0.00157
scoring_system epss
scoring_elements 0.36494
published_at 2026-04-08T12:55:00Z
11
value 0.00157
scoring_system epss
scoring_elements 0.36514
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3558
1
reference_url https://www.exploit-db.com/exploits/41904/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:45Z/
url https://www.exploit-db.com/exploits/41904/
2
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:45Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
3
reference_url http://www.securityfocus.com/bid/97744
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:45Z/
url http://www.securityfocus.com/bid/97744
4
reference_url http://www.securitytracker.com/id/1038288
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:45Z/
url http://www.securitytracker.com/id/1038288
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
6
reference_url https://bugs.chromium.org/p/project-zero/issues/detail?id=1086
reference_id CVE-2017-3558
reference_type exploit
scores
url https://bugs.chromium.org/p/project-zero/issues/detail?id=1086
7
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/41904.txt
reference_id CVE-2017-3558
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/41904.txt
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-3558
reference_id CVE-2017-3558
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
1
value 8.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-3558
fixed_packages
0
url pkg:deb/debian/virtualbox@5.1.20-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.1.20-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.1.20-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2017-3558
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q4r8-w7tf-ykab
279
url VCID-q5ca-n4hk-r3fj
vulnerability_id VCID-q5ca-n4hk-r3fj
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could result in privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2086
reference_id
reference_type
scores
0
value 0.00187
scoring_system epss
scoring_elements 0.40509
published_at 2026-04-21T12:55:00Z
1
value 0.00187
scoring_system epss
scoring_elements 0.40589
published_at 2026-04-12T12:55:00Z
2
value 0.00187
scoring_system epss
scoring_elements 0.4057
published_at 2026-04-13T12:55:00Z
3
value 0.00187
scoring_system epss
scoring_elements 0.40617
published_at 2026-04-16T12:55:00Z
4
value 0.00187
scoring_system epss
scoring_elements 0.40587
published_at 2026-04-18T12:55:00Z
5
value 0.00187
scoring_system epss
scoring_elements 0.40518
published_at 2026-04-01T12:55:00Z
6
value 0.00187
scoring_system epss
scoring_elements 0.40599
published_at 2026-04-08T12:55:00Z
7
value 0.00187
scoring_system epss
scoring_elements 0.40626
published_at 2026-04-04T12:55:00Z
8
value 0.00187
scoring_system epss
scoring_elements 0.40548
published_at 2026-04-07T12:55:00Z
9
value 0.00187
scoring_system epss
scoring_elements 0.40609
published_at 2026-04-09T12:55:00Z
10
value 0.00187
scoring_system epss
scoring_elements 0.40627
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2086
1
reference_url https://security.archlinux.org/ASA-202101-37
reference_id ASA-202101-37
reference_type
scores
url https://security.archlinux.org/ASA-202101-37
2
reference_url https://security.archlinux.org/AVG-1483
reference_id AVG-1483
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1483
3
reference_url https://security.gentoo.org/glsa/202101-15
reference_id GLSA-202101-15
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:18Z/
url https://security.gentoo.org/glsa/202101-15
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.18-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.18-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.18-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2021-2086
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q5ca-n4hk-r3fj
280
url VCID-q879-2fzs-7fha
vulnerability_id VCID-q879-2fzs-7fha
summary Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data as well as unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-21989
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.03162
published_at 2026-04-21T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.03042
published_at 2026-04-18T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.03086
published_at 2026-04-02T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.031
published_at 2026-04-04T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.03101
published_at 2026-04-07T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.03105
published_at 2026-04-08T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.0313
published_at 2026-04-09T12:55:00Z
7
value 0.00015
scoring_system epss
scoring_elements 0.03093
published_at 2026-04-11T12:55:00Z
8
value 0.00015
scoring_system epss
scoring_elements 0.03069
published_at 2026-04-12T12:55:00Z
9
value 0.00015
scoring_system epss
scoring_elements 0.03057
published_at 2026-04-13T12:55:00Z
10
value 0.00015
scoring_system epss
scoring_elements 0.03033
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-21989
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126117
reference_id 1126117
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126117
2
reference_url https://www.oracle.com/security-alerts/cpujan2026.html
reference_id cpujan2026.html
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-22T04:55:19Z/
url https://www.oracle.com/security-alerts/cpujan2026.html
fixed_packages
0
url pkg:deb/debian/virtualbox@7.2.6-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2026-21989
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q879-2fzs-7fha
281
url VCID-q9ws-v22k-t7a5
vulnerability_id VCID-q9ws-v22k-t7a5
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14673
reference_id
reference_type
scores
0
value 0.00146
scoring_system epss
scoring_elements 0.3487
published_at 2026-04-01T12:55:00Z
1
value 0.00146
scoring_system epss
scoring_elements 0.35068
published_at 2026-04-02T12:55:00Z
2
value 0.00146
scoring_system epss
scoring_elements 0.35052
published_at 2026-04-11T12:55:00Z
3
value 0.00146
scoring_system epss
scoring_elements 0.35016
published_at 2026-04-12T12:55:00Z
4
value 0.00146
scoring_system epss
scoring_elements 0.34993
published_at 2026-04-13T12:55:00Z
5
value 0.00146
scoring_system epss
scoring_elements 0.35034
published_at 2026-04-16T12:55:00Z
6
value 0.00146
scoring_system epss
scoring_elements 0.35019
published_at 2026-04-18T12:55:00Z
7
value 0.00146
scoring_system epss
scoring_elements 0.34973
published_at 2026-04-21T12:55:00Z
8
value 0.00146
scoring_system epss
scoring_elements 0.35095
published_at 2026-04-04T12:55:00Z
9
value 0.00146
scoring_system epss
scoring_elements 0.34975
published_at 2026-04-07T12:55:00Z
10
value 0.00146
scoring_system epss
scoring_elements 0.3502
published_at 2026-04-08T12:55:00Z
11
value 0.00146
scoring_system epss
scoring_elements 0.35048
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14673
1
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:57:08Z/
url https://security.gentoo.org/glsa/202101-09
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html
reference_id msg00068.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:57:08Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html
reference_id msg00079.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:57:08Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html
4
reference_url https://www.zerodayinitiative.com/advisories/ZDI-20-898/
reference_id ZDI-20-898
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:57:08Z/
url https://www.zerodayinitiative.com/advisories/ZDI-20-898/
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.12-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.12-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.12-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2020-14673
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q9ws-v22k-t7a5
282
url VCID-qa11-rtug-wbee
vulnerability_id VCID-qa11-rtug-wbee
summary Multiple vulnerabilities have been discovered in Oracle Virtualbox, the worst of which could result in privilege escalation from a guest to the host.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21621
reference_id
reference_type
scores
0
value 0.00059
scoring_system epss
scoring_elements 0.18477
published_at 2026-04-21T12:55:00Z
1
value 0.00059
scoring_system epss
scoring_elements 0.18505
published_at 2026-04-13T12:55:00Z
2
value 0.00059
scoring_system epss
scoring_elements 0.18446
published_at 2026-04-16T12:55:00Z
3
value 0.00059
scoring_system epss
scoring_elements 0.18456
published_at 2026-04-18T12:55:00Z
4
value 0.00059
scoring_system epss
scoring_elements 0.18698
published_at 2026-04-02T12:55:00Z
5
value 0.00059
scoring_system epss
scoring_elements 0.18752
published_at 2026-04-04T12:55:00Z
6
value 0.00059
scoring_system epss
scoring_elements 0.18469
published_at 2026-04-07T12:55:00Z
7
value 0.00059
scoring_system epss
scoring_elements 0.18549
published_at 2026-04-08T12:55:00Z
8
value 0.00059
scoring_system epss
scoring_elements 0.18602
published_at 2026-04-09T12:55:00Z
9
value 0.00059
scoring_system epss
scoring_elements 0.18605
published_at 2026-04-11T12:55:00Z
10
value 0.00059
scoring_system epss
scoring_elements 0.18557
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21621
1
reference_url https://security.gentoo.org/glsa/202212-03
reference_id GLSA-202212-03
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:56Z/
url https://security.gentoo.org/glsa/202212-03
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.40-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.40-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.40-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2022-21621
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qa11-rtug-wbee
283
url VCID-qbhh-ywxu-jfad
vulnerability_id VCID-qbhh-ywxu-jfad
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is prior to 5.2.22. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:56:37Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-3309
reference_id
reference_type
scores
0
value 0.00149
scoring_system epss
scoring_elements 0.35417
published_at 2026-04-21T12:55:00Z
1
value 0.00149
scoring_system epss
scoring_elements 0.3544
published_at 2026-04-13T12:55:00Z
2
value 0.00149
scoring_system epss
scoring_elements 0.3548
published_at 2026-04-16T12:55:00Z
3
value 0.00149
scoring_system epss
scoring_elements 0.35469
published_at 2026-04-18T12:55:00Z
4
value 0.00149
scoring_system epss
scoring_elements 0.35319
published_at 2026-04-01T12:55:00Z
5
value 0.00149
scoring_system epss
scoring_elements 0.35518
published_at 2026-04-02T12:55:00Z
6
value 0.00149
scoring_system epss
scoring_elements 0.35543
published_at 2026-04-04T12:55:00Z
7
value 0.00149
scoring_system epss
scoring_elements 0.35425
published_at 2026-04-07T12:55:00Z
8
value 0.00149
scoring_system epss
scoring_elements 0.35471
published_at 2026-04-08T12:55:00Z
9
value 0.00149
scoring_system epss
scoring_elements 0.35495
published_at 2026-04-09T12:55:00Z
10
value 0.00149
scoring_system epss
scoring_elements 0.35506
published_at 2026-04-11T12:55:00Z
11
value 0.00149
scoring_system epss
scoring_elements 0.35463
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-3309
2
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:56:37Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
3
reference_url http://www.securityfocus.com/bid/106572
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:56:37Z/
url http://www.securityfocus.com/bid/106572
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-3309
reference_id CVE-2018-3309
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
1
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-3309
fixed_packages
0
url pkg:deb/debian/virtualbox@5.2.22-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.2.22-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.22-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2018-3309
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qbhh-ywxu-jfad
284
url VCID-qbjr-mw28-9ufu
vulnerability_id VCID-qbjr-mw28-9ufu
summary Multiple vulnerabilities have been discovered in Oracle Virtualbox, the worst of which could result in root privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2250
reference_id
reference_type
scores
0
value 0.0015
scoring_system epss
scoring_elements 0.35459
published_at 2026-04-21T12:55:00Z
1
value 0.0015
scoring_system epss
scoring_elements 0.35538
published_at 2026-04-09T12:55:00Z
2
value 0.0015
scoring_system epss
scoring_elements 0.35548
published_at 2026-04-11T12:55:00Z
3
value 0.0015
scoring_system epss
scoring_elements 0.35504
published_at 2026-04-12T12:55:00Z
4
value 0.0015
scoring_system epss
scoring_elements 0.35482
published_at 2026-04-13T12:55:00Z
5
value 0.0015
scoring_system epss
scoring_elements 0.35521
published_at 2026-04-16T12:55:00Z
6
value 0.0015
scoring_system epss
scoring_elements 0.35511
published_at 2026-04-18T12:55:00Z
7
value 0.0015
scoring_system epss
scoring_elements 0.35361
published_at 2026-04-01T12:55:00Z
8
value 0.0015
scoring_system epss
scoring_elements 0.3556
published_at 2026-04-02T12:55:00Z
9
value 0.0015
scoring_system epss
scoring_elements 0.35586
published_at 2026-04-04T12:55:00Z
10
value 0.0015
scoring_system epss
scoring_elements 0.35468
published_at 2026-04-07T12:55:00Z
11
value 0.0015
scoring_system epss
scoring_elements 0.35514
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2250
1
reference_url https://security.archlinux.org/ASA-202104-9
reference_id ASA-202104-9
reference_type
scores
url https://security.archlinux.org/ASA-202104-9
2
reference_url https://security.archlinux.org/AVG-1846
reference_id AVG-1846
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1846
3
reference_url https://security.gentoo.org/glsa/202208-36
reference_id GLSA-202208-36
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T14:48:41Z/
url https://security.gentoo.org/glsa/202208-36
4
reference_url https://www.zerodayinitiative.com/advisories/ZDI-21-484/
reference_id ZDI-21-484
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T14:48:41Z/
url https://www.zerodayinitiative.com/advisories/ZDI-21-484/
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.20-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.20-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.20-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2021-2250
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qbjr-mw28-9ufu
285
url VCID-qdk1-zzgr-dud2
vulnerability_id VCID-qdk1-zzgr-dud2
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-3028
reference_id
reference_type
scores
0
value 0.00313
scoring_system epss
scoring_elements 0.54447
published_at 2026-04-21T12:55:00Z
1
value 0.00409
scoring_system epss
scoring_elements 0.61186
published_at 2026-04-07T12:55:00Z
2
value 0.00409
scoring_system epss
scoring_elements 0.61269
published_at 2026-04-11T12:55:00Z
3
value 0.00409
scoring_system epss
scoring_elements 0.61255
published_at 2026-04-12T12:55:00Z
4
value 0.00409
scoring_system epss
scoring_elements 0.61236
published_at 2026-04-13T12:55:00Z
5
value 0.00409
scoring_system epss
scoring_elements 0.61275
published_at 2026-04-16T12:55:00Z
6
value 0.00409
scoring_system epss
scoring_elements 0.6128
published_at 2026-04-18T12:55:00Z
7
value 0.00409
scoring_system epss
scoring_elements 0.61191
published_at 2026-04-02T12:55:00Z
8
value 0.00409
scoring_system epss
scoring_elements 0.61219
published_at 2026-04-04T12:55:00Z
9
value 0.00409
scoring_system epss
scoring_elements 0.61113
published_at 2026-04-01T12:55:00Z
10
value 0.00409
scoring_system epss
scoring_elements 0.61233
published_at 2026-04-08T12:55:00Z
11
value 0.00409
scoring_system epss
scoring_elements 0.61248
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-3028
1
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:16:16Z/
url http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
2
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
3
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-3028
reference_id CVE-2019-3028
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-3028
4
reference_url https://security.gentoo.org/glsa/202004-02
reference_id GLSA-202004-02
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:16:16Z/
url https://security.gentoo.org/glsa/202004-02
5
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:16:16Z/
url https://security.gentoo.org/glsa/202101-09
fixed_packages
0
url pkg:deb/debian/virtualbox@6.0.14-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.0.14-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.0.14-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2019-3028
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qdk1-zzgr-dud2
286
url VCID-qdz9-3a5m-aba8
vulnerability_id VCID-qdz9-3a5m-aba8
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.16. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-3088
reference_id
reference_type
scores
0
value 0.0045
scoring_system epss
scoring_elements 0.63669
published_at 2026-04-21T12:55:00Z
1
value 0.0045
scoring_system epss
scoring_elements 0.63687
published_at 2026-04-11T12:55:00Z
2
value 0.0045
scoring_system epss
scoring_elements 0.63639
published_at 2026-04-13T12:55:00Z
3
value 0.0045
scoring_system epss
scoring_elements 0.63676
published_at 2026-04-16T12:55:00Z
4
value 0.0045
scoring_system epss
scoring_elements 0.63686
published_at 2026-04-18T12:55:00Z
5
value 0.0045
scoring_system epss
scoring_elements 0.63559
published_at 2026-04-01T12:55:00Z
6
value 0.0045
scoring_system epss
scoring_elements 0.63619
published_at 2026-04-02T12:55:00Z
7
value 0.0045
scoring_system epss
scoring_elements 0.63645
published_at 2026-04-04T12:55:00Z
8
value 0.0045
scoring_system epss
scoring_elements 0.63604
published_at 2026-04-07T12:55:00Z
9
value 0.0045
scoring_system epss
scoring_elements 0.63656
published_at 2026-04-08T12:55:00Z
10
value 0.0045
scoring_system epss
scoring_elements 0.63672
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-3088
1
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:25Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
2
reference_url http://www.securityfocus.com/bid/104764
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:25Z/
url http://www.securityfocus.com/bid/104764
3
reference_url http://www.securitytracker.com/id/1041296
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:25Z/
url http://www.securitytracker.com/id/1041296
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-3088
reference_id CVE-2018-3088
reference_type
scores
0
value 4.4
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:P/A:P
1
value 8.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-3088
fixed_packages
0
url pkg:deb/debian/virtualbox@5.2.16-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.2.16-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.16-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2018-3088
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qdz9-3a5m-aba8
287
url VCID-qekt-d11a-ryf5
vulnerability_id VCID-qekt-d11a-ryf5
summary Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 7.0.16. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. Note: This vulnerability applies to Windows hosts only. CVSS 3.1 Base Score 6.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21107
reference_id
reference_type
scores
0
value 0.00137
scoring_system epss
scoring_elements 0.33401
published_at 2026-04-21T12:55:00Z
1
value 0.00137
scoring_system epss
scoring_elements 0.33457
published_at 2026-04-16T12:55:00Z
2
value 0.00137
scoring_system epss
scoring_elements 0.33432
published_at 2026-04-18T12:55:00Z
3
value 0.00137
scoring_system epss
scoring_elements 0.33532
published_at 2026-04-02T12:55:00Z
4
value 0.00137
scoring_system epss
scoring_elements 0.33565
published_at 2026-04-04T12:55:00Z
5
value 0.00137
scoring_system epss
scoring_elements 0.33405
published_at 2026-04-07T12:55:00Z
6
value 0.00137
scoring_system epss
scoring_elements 0.33449
published_at 2026-04-08T12:55:00Z
7
value 0.00137
scoring_system epss
scoring_elements 0.33483
published_at 2026-04-09T12:55:00Z
8
value 0.00137
scoring_system epss
scoring_elements 0.33486
published_at 2026-04-11T12:55:00Z
9
value 0.00137
scoring_system epss
scoring_elements 0.33445
published_at 2026-04-12T12:55:00Z
10
value 0.00137
scoring_system epss
scoring_elements 0.33421
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21107
1
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.0.16:*:*:*:*:*:*:*
2
reference_url https://www.oracle.com/security-alerts/cpuapr2024.html
reference_id cpuapr2024.html
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-19T04:01:17Z/
url https://www.oracle.com/security-alerts/cpuapr2024.html
fixed_packages
0
url pkg:deb/debian/virtualbox@7.0.16-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.0.16-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.0.16-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2024-21107
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qekt-d11a-ryf5
288
url VCID-qerv-8955-dffm
vulnerability_id VCID-qerv-8955-dffm
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which allows local users to escalate privileges.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0427
reference_id
reference_type
scores
0
value 0.00095
scoring_system epss
scoring_elements 0.265
published_at 2026-04-09T12:55:00Z
1
value 0.00095
scoring_system epss
scoring_elements 0.26554
published_at 2026-04-02T12:55:00Z
2
value 0.00095
scoring_system epss
scoring_elements 0.26598
published_at 2026-04-04T12:55:00Z
3
value 0.00095
scoring_system epss
scoring_elements 0.26381
published_at 2026-04-07T12:55:00Z
4
value 0.00095
scoring_system epss
scoring_elements 0.2645
published_at 2026-04-08T12:55:00Z
5
value 0.00095
scoring_system epss
scoring_elements 0.26507
published_at 2026-04-11T12:55:00Z
6
value 0.00095
scoring_system epss
scoring_elements 0.2646
published_at 2026-04-12T12:55:00Z
7
value 0.00095
scoring_system epss
scoring_elements 0.26403
published_at 2026-04-13T12:55:00Z
8
value 0.00095
scoring_system epss
scoring_elements 0.26411
published_at 2026-04-16T12:55:00Z
9
value 0.00095
scoring_system epss
scoring_elements 0.26382
published_at 2026-04-18T12:55:00Z
10
value 0.00095
scoring_system epss
scoring_elements 0.26344
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0427
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775888
reference_id 775888
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775888
2
reference_url https://security.gentoo.org/glsa/201612-27
reference_id GLSA-201612-27
reference_type
scores
url https://security.gentoo.org/glsa/201612-27
fixed_packages
0
url pkg:deb/debian/virtualbox@4.3.18-dfsg-2?distro=sid
purl pkg:deb/debian/virtualbox@4.3.18-dfsg-2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@4.3.18-dfsg-2%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2015-0427
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qerv-8955-dffm
289
url VCID-qgrq-fwx7-x3fu
vulnerability_id VCID-qgrq-fwx7-x3fu
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.1.24. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox as well as unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data and unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 7.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10210
reference_id
reference_type
scores
0
value 0.00078
scoring_system epss
scoring_elements 0.2327
published_at 2026-04-21T12:55:00Z
1
value 0.00078
scoring_system epss
scoring_elements 0.23402
published_at 2026-04-02T12:55:00Z
2
value 0.00078
scoring_system epss
scoring_elements 0.23293
published_at 2026-04-16T12:55:00Z
3
value 0.00078
scoring_system epss
scoring_elements 0.23288
published_at 2026-04-18T12:55:00Z
4
value 0.00078
scoring_system epss
scoring_elements 0.23224
published_at 2026-04-01T12:55:00Z
5
value 0.00078
scoring_system epss
scoring_elements 0.23442
published_at 2026-04-04T12:55:00Z
6
value 0.00078
scoring_system epss
scoring_elements 0.23227
published_at 2026-04-07T12:55:00Z
7
value 0.00078
scoring_system epss
scoring_elements 0.233
published_at 2026-04-08T12:55:00Z
8
value 0.00078
scoring_system epss
scoring_elements 0.2335
published_at 2026-04-09T12:55:00Z
9
value 0.00078
scoring_system epss
scoring_elements 0.23371
published_at 2026-04-11T12:55:00Z
10
value 0.00078
scoring_system epss
scoring_elements 0.23333
published_at 2026-04-12T12:55:00Z
11
value 0.00078
scoring_system epss
scoring_elements 0.23277
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10210
1
reference_url http://www.securitytracker.com/id/1038929
reference_id 1038929
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:50:15Z/
url http://www.securitytracker.com/id/1038929
2
reference_url http://www.securityfocus.com/bid/99640
reference_id 99640
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:50:15Z/
url http://www.securityfocus.com/bid/99640
fixed_packages
0
url pkg:deb/debian/virtualbox@5.1.24-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.1.24-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.1.24-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2017-10210
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qgrq-fwx7-x3fu
290
url VCID-qksu-f137-m7ge
vulnerability_id VCID-qksu-f137-m7ge
summary Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 7.0.16. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 7.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21110
reference_id
reference_type
scores
0
value 0.00181
scoring_system epss
scoring_elements 0.39751
published_at 2026-04-21T12:55:00Z
1
value 0.00181
scoring_system epss
scoring_elements 0.3986
published_at 2026-04-16T12:55:00Z
2
value 0.00181
scoring_system epss
scoring_elements 0.39832
published_at 2026-04-18T12:55:00Z
3
value 0.00181
scoring_system epss
scoring_elements 0.39838
published_at 2026-04-08T12:55:00Z
4
value 0.00181
scoring_system epss
scoring_elements 0.39862
published_at 2026-04-04T12:55:00Z
5
value 0.00181
scoring_system epss
scoring_elements 0.39783
published_at 2026-04-07T12:55:00Z
6
value 0.00181
scoring_system epss
scoring_elements 0.39851
published_at 2026-04-09T12:55:00Z
7
value 0.00181
scoring_system epss
scoring_elements 0.39861
published_at 2026-04-11T12:55:00Z
8
value 0.00181
scoring_system epss
scoring_elements 0.39827
published_at 2026-04-12T12:55:00Z
9
value 0.00181
scoring_system epss
scoring_elements 0.39811
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21110
1
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.0.16:*:*:*:*:*:*:*
2
reference_url https://www.oracle.com/security-alerts/cpuapr2024.html
reference_id cpuapr2024.html
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-19T04:01:16Z/
url https://www.oracle.com/security-alerts/cpuapr2024.html
fixed_packages
0
url pkg:deb/debian/virtualbox@7.0.16-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.0.16-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.0.16-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2024-21110
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qksu-f137-m7ge
291
url VCID-qsck-8nxx-zqbb
vulnerability_id VCID-qsck-8nxx-zqbb
summary Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.12 and 7.2.2. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-62592
reference_id
reference_type
scores
0
value 0.00018
scoring_system epss
scoring_elements 0.04878
published_at 2026-04-21T12:55:00Z
1
value 0.00018
scoring_system epss
scoring_elements 0.04734
published_at 2026-04-18T12:55:00Z
2
value 0.00018
scoring_system epss
scoring_elements 0.04744
published_at 2026-04-02T12:55:00Z
3
value 0.00018
scoring_system epss
scoring_elements 0.04767
published_at 2026-04-04T12:55:00Z
4
value 0.00018
scoring_system epss
scoring_elements 0.04782
published_at 2026-04-07T12:55:00Z
5
value 0.00018
scoring_system epss
scoring_elements 0.04815
published_at 2026-04-08T12:55:00Z
6
value 0.00018
scoring_system epss
scoring_elements 0.04827
published_at 2026-04-09T12:55:00Z
7
value 0.00018
scoring_system epss
scoring_elements 0.04814
published_at 2026-04-11T12:55:00Z
8
value 0.00018
scoring_system epss
scoring_elements 0.04792
published_at 2026-04-12T12:55:00Z
9
value 0.00018
scoring_system epss
scoring_elements 0.04772
published_at 2026-04-13T12:55:00Z
10
value 0.00018
scoring_system epss
scoring_elements 0.04725
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-62592
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118542
reference_id 1118542
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118542
2
reference_url https://www.oracle.com/security-alerts/cpuoct2025.html
reference_id cpuoct2025.html
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-22T14:10:33Z/
url https://www.oracle.com/security-alerts/cpuoct2025.html
fixed_packages
0
url pkg:deb/debian/virtualbox@7.2.4-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.2.4-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.4-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2025-62592
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qsck-8nxx-zqbb
292
url VCID-quny-rmp6-pygd
vulnerability_id VCID-quny-rmp6-pygd
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are prior to 5.2.24 and prior to 6.0.2. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N).
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:37Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:37Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2451
reference_id
reference_type
scores
0
value 0.00116
scoring_system epss
scoring_elements 0.30247
published_at 2026-04-21T12:55:00Z
1
value 0.00116
scoring_system epss
scoring_elements 0.30433
published_at 2026-04-02T12:55:00Z
2
value 0.00116
scoring_system epss
scoring_elements 0.30294
published_at 2026-04-13T12:55:00Z
3
value 0.00116
scoring_system epss
scoring_elements 0.30309
published_at 2026-04-16T12:55:00Z
4
value 0.00116
scoring_system epss
scoring_elements 0.30292
published_at 2026-04-18T12:55:00Z
5
value 0.00116
scoring_system epss
scoring_elements 0.30403
published_at 2026-04-01T12:55:00Z
6
value 0.00116
scoring_system epss
scoring_elements 0.30478
published_at 2026-04-04T12:55:00Z
7
value 0.00116
scoring_system epss
scoring_elements 0.30288
published_at 2026-04-07T12:55:00Z
8
value 0.00116
scoring_system epss
scoring_elements 0.30347
published_at 2026-04-08T12:55:00Z
9
value 0.00116
scoring_system epss
scoring_elements 0.30382
published_at 2026-04-09T12:55:00Z
10
value 0.00116
scoring_system epss
scoring_elements 0.30384
published_at 2026-04-11T12:55:00Z
11
value 0.00116
scoring_system epss
scoring_elements 0.30341
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2451
3
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:37Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
4
reference_url http://www.securityfocus.com/bid/106568
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:37Z/
url http://www.securityfocus.com/bid/106568
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-2451
reference_id CVE-2019-2451
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:N
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2019-2451
fixed_packages
0
url pkg:deb/debian/virtualbox@5.2.24-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.2.24-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.24-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2019-2451
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-quny-rmp6-pygd
293
url VCID-qx5v-d899-e7hs
vulnerability_id VCID-qx5v-d899-e7hs
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.1.24. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox as well as unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data and unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 7.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10241
reference_id
reference_type
scores
0
value 0.00061
scoring_system epss
scoring_elements 0.19135
published_at 2026-04-21T12:55:00Z
1
value 0.00061
scoring_system epss
scoring_elements 0.19352
published_at 2026-04-02T12:55:00Z
2
value 0.00061
scoring_system epss
scoring_elements 0.19117
published_at 2026-04-16T12:55:00Z
3
value 0.00061
scoring_system epss
scoring_elements 0.19126
published_at 2026-04-18T12:55:00Z
4
value 0.00061
scoring_system epss
scoring_elements 0.19217
published_at 2026-04-01T12:55:00Z
5
value 0.00061
scoring_system epss
scoring_elements 0.19404
published_at 2026-04-04T12:55:00Z
6
value 0.00061
scoring_system epss
scoring_elements 0.1912
published_at 2026-04-07T12:55:00Z
7
value 0.00061
scoring_system epss
scoring_elements 0.192
published_at 2026-04-08T12:55:00Z
8
value 0.00061
scoring_system epss
scoring_elements 0.19253
published_at 2026-04-09T12:55:00Z
9
value 0.00061
scoring_system epss
scoring_elements 0.19258
published_at 2026-04-11T12:55:00Z
10
value 0.00061
scoring_system epss
scoring_elements 0.19212
published_at 2026-04-12T12:55:00Z
11
value 0.00061
scoring_system epss
scoring_elements 0.19157
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10241
1
reference_url http://www.securitytracker.com/id/1038929
reference_id 1038929
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:49:02Z/
url http://www.securitytracker.com/id/1038929
2
reference_url http://www.securityfocus.com/bid/99687
reference_id 99687
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:49:02Z/
url http://www.securityfocus.com/bid/99687
fixed_packages
0
url pkg:deb/debian/virtualbox@5.1.24-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.1.24-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.1.24-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2017-10241
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qx5v-d899-e7hs
294
url VCID-qz6v-9x2t-73fk
vulnerability_id VCID-qz6v-9x2t-73fk
summary Multiple vulnerabilities have been discovered in Oracle Virtualbox, the worst of which could result in privilege escalation from a guest to the host.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-39421
reference_id
reference_type
scores
0
value 0.00303
scoring_system epss
scoring_elements 0.53629
published_at 2026-04-21T12:55:00Z
1
value 0.00303
scoring_system epss
scoring_elements 0.53603
published_at 2026-04-13T12:55:00Z
2
value 0.00303
scoring_system epss
scoring_elements 0.5364
published_at 2026-04-16T12:55:00Z
3
value 0.00303
scoring_system epss
scoring_elements 0.53645
published_at 2026-04-18T12:55:00Z
4
value 0.00303
scoring_system epss
scoring_elements 0.53548
published_at 2026-04-02T12:55:00Z
5
value 0.00303
scoring_system epss
scoring_elements 0.53574
published_at 2026-04-04T12:55:00Z
6
value 0.00303
scoring_system epss
scoring_elements 0.53543
published_at 2026-04-07T12:55:00Z
7
value 0.00303
scoring_system epss
scoring_elements 0.53592
published_at 2026-04-08T12:55:00Z
8
value 0.00303
scoring_system epss
scoring_elements 0.53589
published_at 2026-04-09T12:55:00Z
9
value 0.00303
scoring_system epss
scoring_elements 0.53638
published_at 2026-04-11T12:55:00Z
10
value 0.00303
scoring_system epss
scoring_elements 0.5362
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-39421
1
reference_url https://security.gentoo.org/glsa/202212-03
reference_id GLSA-202212-03
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-23T15:25:19Z/
url https://security.gentoo.org/glsa/202212-03
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.40-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.40-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.40-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2022-39421
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qz6v-9x2t-73fk
295
url VCID-qzab-crkk-zfba
vulnerability_id VCID-qzab-crkk-zfba
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could result in privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2123
reference_id
reference_type
scores
0
value 0.00048
scoring_system epss
scoring_elements 0.14782
published_at 2026-04-21T12:55:00Z
1
value 0.00048
scoring_system epss
scoring_elements 0.14878
published_at 2026-04-12T12:55:00Z
2
value 0.00048
scoring_system epss
scoring_elements 0.14819
published_at 2026-04-13T12:55:00Z
3
value 0.00048
scoring_system epss
scoring_elements 0.14715
published_at 2026-04-16T12:55:00Z
4
value 0.00048
scoring_system epss
scoring_elements 0.14722
published_at 2026-04-18T12:55:00Z
5
value 0.00048
scoring_system epss
scoring_elements 0.14882
published_at 2026-04-01T12:55:00Z
6
value 0.00048
scoring_system epss
scoring_elements 0.1493
published_at 2026-04-02T12:55:00Z
7
value 0.00048
scoring_system epss
scoring_elements 0.15007
published_at 2026-04-04T12:55:00Z
8
value 0.00048
scoring_system epss
scoring_elements 0.14812
published_at 2026-04-07T12:55:00Z
9
value 0.00048
scoring_system epss
scoring_elements 0.14901
published_at 2026-04-08T12:55:00Z
10
value 0.00048
scoring_system epss
scoring_elements 0.14951
published_at 2026-04-09T12:55:00Z
11
value 0.00048
scoring_system epss
scoring_elements 0.14916
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2123
1
reference_url https://security.archlinux.org/ASA-202101-37
reference_id ASA-202101-37
reference_type
scores
url https://security.archlinux.org/ASA-202101-37
2
reference_url https://security.archlinux.org/AVG-1483
reference_id AVG-1483
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1483
3
reference_url https://security.gentoo.org/glsa/202101-15
reference_id GLSA-202101-15
reference_type
scores
0
value 3.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:53:20Z/
url https://security.gentoo.org/glsa/202101-15
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.18-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.18-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.18-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2021-2123
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qzab-crkk-zfba
296
url VCID-r1pj-wxzf-5ubj
vulnerability_id VCID-r1pj-wxzf-5ubj
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html
5
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html
6
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html
7
reference_url http://packetstormsecurity.com/files/134268/Slackware-Security-Advisory-mozilla-nss-Updates.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/134268/Slackware-Security-Advisory-mozilla-nss-Updates.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2015-1980.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1980.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2015-1981.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1981.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7183.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7183.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7183
reference_id
reference_type
scores
0
value 0.04702
scoring_system epss
scoring_elements 0.89371
published_at 2026-04-21T12:55:00Z
1
value 0.04702
scoring_system epss
scoring_elements 0.89317
published_at 2026-04-01T12:55:00Z
2
value 0.04702
scoring_system epss
scoring_elements 0.89359
published_at 2026-04-13T12:55:00Z
3
value 0.04702
scoring_system epss
scoring_elements 0.89374
published_at 2026-04-18T12:55:00Z
4
value 0.04702
scoring_system epss
scoring_elements 0.89323
published_at 2026-04-02T12:55:00Z
5
value 0.04702
scoring_system epss
scoring_elements 0.89335
published_at 2026-04-04T12:55:00Z
6
value 0.04702
scoring_system epss
scoring_elements 0.89337
published_at 2026-04-07T12:55:00Z
7
value 0.04702
scoring_system epss
scoring_elements 0.89353
published_at 2026-04-08T12:55:00Z
8
value 0.04702
scoring_system epss
scoring_elements 0.89358
published_at 2026-04-09T12:55:00Z
9
value 0.04702
scoring_system epss
scoring_elements 0.89366
published_at 2026-04-11T12:55:00Z
10
value 0.04702
scoring_system epss
scoring_elements 0.89363
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7183
12
reference_url https://bto.bluecoat.com/security-advisory/sa119
reference_id
reference_type
scores
url https://bto.bluecoat.com/security-advisory/sa119
13
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1205157
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1205157
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200
27
reference_url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.2.1_release_notes
reference_id
reference_type
scores
url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.2.1_release_notes
28
reference_url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.4_release_notes
reference_id
reference_type
scores
url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.4_release_notes
29
reference_url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.20.1_release_notes
reference_id
reference_type
scores
url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.20.1_release_notes
30
reference_url http://www.debian.org/security/2015/dsa-3393
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3393
31
reference_url http://www.debian.org/security/2015/dsa-3406
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3406
32
reference_url http://www.mozilla.org/security/announce/2015/mfsa2015-133.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2015/mfsa2015-133.html
33
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
34
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
35
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
36
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
37
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
38
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
39
reference_url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
40
reference_url http://www.securityfocus.com/bid/77415
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77415
41
reference_url http://www.securityfocus.com/bid/91787
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/91787
42
reference_url http://www.securitytracker.com/id/1034069
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034069
43
reference_url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.399753
reference_id
reference_type
scores
url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.399753
44
reference_url http://www.ubuntu.com/usn/USN-2785-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2785-1
45
reference_url http://www.ubuntu.com/usn/USN-2790-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2790-1
46
reference_url http://www.ubuntu.com/usn/USN-2819-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2819-1
47
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1269353
reference_id 1269353
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1269353
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.20.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.20.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.20.0:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7183
reference_id CVE-2015-7183
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-7183
60
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
61
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
62
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-133
reference_id mfsa2015-133
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-133
63
reference_url https://access.redhat.com/errata/RHSA-2015:1980
reference_id RHSA-2015:1980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1980
64
reference_url https://access.redhat.com/errata/RHSA-2015:1981
reference_id RHSA-2015:1981
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1981
65
reference_url https://access.redhat.com/errata/RHSA-2015:2068
reference_id RHSA-2015:2068
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2068
66
reference_url https://usn.ubuntu.com/2785-1/
reference_id USN-2785-1
reference_type
scores
url https://usn.ubuntu.com/2785-1/
67
reference_url https://usn.ubuntu.com/2790-1/
reference_id USN-2790-1
reference_type
scores
url https://usn.ubuntu.com/2790-1/
68
reference_url https://usn.ubuntu.com/2819-1/
reference_id USN-2819-1
reference_type
scores
url https://usn.ubuntu.com/2819-1/
fixed_packages
0
url pkg:deb/debian/virtualbox@5.0.10-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.0.10-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.0.10-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2015-7183
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r1pj-wxzf-5ubj
297
url VCID-r787-jbxe-xuhz
vulnerability_id VCID-r787-jbxe-xuhz
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-0407
reference_id
reference_type
scores
0
value 0.00076
scoring_system epss
scoring_elements 0.22787
published_at 2026-04-01T12:55:00Z
1
value 0.00076
scoring_system epss
scoring_elements 0.22957
published_at 2026-04-02T12:55:00Z
2
value 0.00076
scoring_system epss
scoring_elements 0.23001
published_at 2026-04-04T12:55:00Z
3
value 0.00076
scoring_system epss
scoring_elements 0.22792
published_at 2026-04-07T12:55:00Z
4
value 0.00076
scoring_system epss
scoring_elements 0.22866
published_at 2026-04-08T12:55:00Z
5
value 0.00076
scoring_system epss
scoring_elements 0.22919
published_at 2026-04-09T12:55:00Z
6
value 0.00076
scoring_system epss
scoring_elements 0.22939
published_at 2026-04-11T12:55:00Z
7
value 0.00076
scoring_system epss
scoring_elements 0.22903
published_at 2026-04-12T12:55:00Z
8
value 0.00076
scoring_system epss
scoring_elements 0.22846
published_at 2026-04-13T12:55:00Z
9
value 0.00076
scoring_system epss
scoring_elements 0.2286
published_at 2026-04-16T12:55:00Z
10
value 0.00076
scoring_system epss
scoring_elements 0.22854
published_at 2026-04-18T12:55:00Z
11
value 0.00076
scoring_system epss
scoring_elements 0.22815
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-0407
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5892
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5892
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0404
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0404
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0406
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0406
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0407
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0407
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=735410
reference_id 735410
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=735410
6
reference_url https://security.gentoo.org/glsa/201401-13
reference_id GLSA-201401-13
reference_type
scores
url https://security.gentoo.org/glsa/201401-13
fixed_packages
0
url pkg:deb/debian/virtualbox@4.3.6-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@4.3.6-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@4.3.6-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2014-0407
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r787-jbxe-xuhz
298
url VCID-rb61-s8yy-6fh1
vulnerability_id VCID-rb61-s8yy-6fh1
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.1.24. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10129
reference_id
reference_type
scores
0
value 0.00273
scoring_system epss
scoring_elements 0.5075
published_at 2026-04-21T12:55:00Z
1
value 0.00273
scoring_system epss
scoring_elements 0.50687
published_at 2026-04-02T12:55:00Z
2
value 0.00273
scoring_system epss
scoring_elements 0.50739
published_at 2026-04-12T12:55:00Z
3
value 0.00273
scoring_system epss
scoring_elements 0.50764
published_at 2026-04-16T12:55:00Z
4
value 0.00273
scoring_system epss
scoring_elements 0.5077
published_at 2026-04-18T12:55:00Z
5
value 0.00273
scoring_system epss
scoring_elements 0.50633
published_at 2026-04-01T12:55:00Z
6
value 0.00273
scoring_system epss
scoring_elements 0.50713
published_at 2026-04-04T12:55:00Z
7
value 0.00273
scoring_system epss
scoring_elements 0.50669
published_at 2026-04-07T12:55:00Z
8
value 0.00273
scoring_system epss
scoring_elements 0.50724
published_at 2026-04-13T12:55:00Z
9
value 0.00273
scoring_system epss
scoring_elements 0.5072
published_at 2026-04-09T12:55:00Z
10
value 0.00273
scoring_system epss
scoring_elements 0.50763
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10129
1
reference_url http://www.securitytracker.com/id/1038929
reference_id 1038929
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:23Z/
url http://www.securitytracker.com/id/1038929
2
reference_url https://www.exploit-db.com/exploits/42426/
reference_id 42426
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:23Z/
url https://www.exploit-db.com/exploits/42426/
3
reference_url http://www.securityfocus.com/bid/99638
reference_id 99638
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:23Z/
url http://www.securityfocus.com/bid/99638
4
reference_url https://bugs.chromium.org/p/project-zero/issues/detail?id=1296
reference_id CVE-2017-10129
reference_type exploit
scores
url https://bugs.chromium.org/p/project-zero/issues/detail?id=1296
5
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/42426.txt
reference_id CVE-2017-10129
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/42426.txt
fixed_packages
0
url pkg:deb/debian/virtualbox@5.1.24-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.1.24-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.1.24-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2017-10129
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rb61-s8yy-6fh1
299
url VCID-rcf8-5d9m-s3gc
vulnerability_id VCID-rcf8-5d9m-s3gc
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-3017
reference_id
reference_type
scores
0
value 0.00144
scoring_system epss
scoring_elements 0.34564
published_at 2026-04-01T12:55:00Z
1
value 0.00144
scoring_system epss
scoring_elements 0.34725
published_at 2026-04-08T12:55:00Z
2
value 0.00144
scoring_system epss
scoring_elements 0.34753
published_at 2026-04-09T12:55:00Z
3
value 0.00144
scoring_system epss
scoring_elements 0.34756
published_at 2026-04-11T12:55:00Z
4
value 0.00144
scoring_system epss
scoring_elements 0.34717
published_at 2026-04-12T12:55:00Z
5
value 0.00144
scoring_system epss
scoring_elements 0.34693
published_at 2026-04-13T12:55:00Z
6
value 0.00144
scoring_system epss
scoring_elements 0.34728
published_at 2026-04-16T12:55:00Z
7
value 0.00144
scoring_system epss
scoring_elements 0.34713
published_at 2026-04-18T12:55:00Z
8
value 0.00144
scoring_system epss
scoring_elements 0.34777
published_at 2026-04-02T12:55:00Z
9
value 0.00144
scoring_system epss
scoring_elements 0.34803
published_at 2026-04-04T12:55:00Z
10
value 0.00144
scoring_system epss
scoring_elements 0.34681
published_at 2026-04-07T12:55:00Z
11
value 0.00148
scoring_system epss
scoring_elements 0.35286
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-3017
1
reference_url https://www.zerodayinitiative.com/advisories/ZDI-19-916/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:16:19Z/
url https://www.zerodayinitiative.com/advisories/ZDI-19-916/
2
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:16:19Z/
url http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
3
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-3017
reference_id CVE-2019-3017
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
1
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-3017
5
reference_url https://security.gentoo.org/glsa/202004-02
reference_id GLSA-202004-02
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:16:19Z/
url https://security.gentoo.org/glsa/202004-02
6
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:16:19Z/
url https://security.gentoo.org/glsa/202101-09
fixed_packages
0
url pkg:deb/debian/virtualbox@6.0.14-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.0.14-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.0.14-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2019-3017
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rcf8-5d9m-s3gc
300
url VCID-rguu-gfvv-aud8
vulnerability_id VCID-rguu-gfvv-aud8
summary Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 6.1.44 and Prior to 7.0.8. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 3.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21988
reference_id
reference_type
scores
0
value 0.00074
scoring_system epss
scoring_elements 0.22298
published_at 2026-04-21T12:55:00Z
1
value 0.00074
scoring_system epss
scoring_elements 0.22349
published_at 2026-04-18T12:55:00Z
2
value 0.00074
scoring_system epss
scoring_elements 0.22444
published_at 2026-04-02T12:55:00Z
3
value 0.00074
scoring_system epss
scoring_elements 0.22489
published_at 2026-04-04T12:55:00Z
4
value 0.00074
scoring_system epss
scoring_elements 0.22277
published_at 2026-04-07T12:55:00Z
5
value 0.00074
scoring_system epss
scoring_elements 0.2236
published_at 2026-04-08T12:55:00Z
6
value 0.00074
scoring_system epss
scoring_elements 0.22415
published_at 2026-04-09T12:55:00Z
7
value 0.00074
scoring_system epss
scoring_elements 0.22437
published_at 2026-04-11T12:55:00Z
8
value 0.00074
scoring_system epss
scoring_elements 0.22395
published_at 2026-04-12T12:55:00Z
9
value 0.00074
scoring_system epss
scoring_elements 0.22338
published_at 2026-04-13T12:55:00Z
10
value 0.00074
scoring_system epss
scoring_elements 0.22354
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21988
fixed_packages
0
url pkg:deb/debian/virtualbox@7.0.8-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.0.8-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.0.8-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2023-21988
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rguu-gfvv-aud8
301
url VCID-rjcs-mufm-h7fs
vulnerability_id VCID-rjcs-mufm-h7fs
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14713
reference_id
reference_type
scores
0
value 0.00086
scoring_system epss
scoring_elements 0.24772
published_at 2026-04-21T12:55:00Z
1
value 0.00086
scoring_system epss
scoring_elements 0.24944
published_at 2026-04-02T12:55:00Z
2
value 0.00086
scoring_system epss
scoring_elements 0.24791
published_at 2026-04-13T12:55:00Z
3
value 0.00086
scoring_system epss
scoring_elements 0.24803
published_at 2026-04-16T12:55:00Z
4
value 0.00086
scoring_system epss
scoring_elements 0.24794
published_at 2026-04-18T12:55:00Z
5
value 0.00086
scoring_system epss
scoring_elements 0.24865
published_at 2026-04-01T12:55:00Z
6
value 0.00086
scoring_system epss
scoring_elements 0.24985
published_at 2026-04-04T12:55:00Z
7
value 0.00086
scoring_system epss
scoring_elements 0.24759
published_at 2026-04-07T12:55:00Z
8
value 0.00086
scoring_system epss
scoring_elements 0.24827
published_at 2026-04-08T12:55:00Z
9
value 0.00086
scoring_system epss
scoring_elements 0.24871
published_at 2026-04-09T12:55:00Z
10
value 0.00086
scoring_system epss
scoring_elements 0.24885
published_at 2026-04-11T12:55:00Z
11
value 0.00086
scoring_system epss
scoring_elements 0.24847
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14713
1
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T19:54:19Z/
url https://security.gentoo.org/glsa/202101-09
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html
reference_id msg00068.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T19:54:19Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html
reference_id msg00079.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T19:54:19Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.12-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.12-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.12-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2020-14713
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rjcs-mufm-h7fs
302
url VCID-rjg7-ntnn-2ya5
vulnerability_id VCID-rjg7-ntnn-2ya5
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14704
reference_id
reference_type
scores
0
value 0.00164
scoring_system epss
scoring_elements 0.37271
published_at 2026-04-01T12:55:00Z
1
value 0.00164
scoring_system epss
scoring_elements 0.37436
published_at 2026-04-02T12:55:00Z
2
value 0.00164
scoring_system epss
scoring_elements 0.37363
published_at 2026-04-11T12:55:00Z
3
value 0.00164
scoring_system epss
scoring_elements 0.37329
published_at 2026-04-12T12:55:00Z
4
value 0.00164
scoring_system epss
scoring_elements 0.37301
published_at 2026-04-13T12:55:00Z
5
value 0.00164
scoring_system epss
scoring_elements 0.37348
published_at 2026-04-16T12:55:00Z
6
value 0.00164
scoring_system epss
scoring_elements 0.37331
published_at 2026-04-18T12:55:00Z
7
value 0.00164
scoring_system epss
scoring_elements 0.37276
published_at 2026-04-21T12:55:00Z
8
value 0.00164
scoring_system epss
scoring_elements 0.3746
published_at 2026-04-04T12:55:00Z
9
value 0.00164
scoring_system epss
scoring_elements 0.37289
published_at 2026-04-07T12:55:00Z
10
value 0.00164
scoring_system epss
scoring_elements 0.3734
published_at 2026-04-08T12:55:00Z
11
value 0.00164
scoring_system epss
scoring_elements 0.37351
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14704
1
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:21Z/
url https://security.gentoo.org/glsa/202101-09
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html
reference_id msg00068.html
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:21Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html
reference_id msg00079.html
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:21Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html
4
reference_url https://www.zerodayinitiative.com/advisories/ZDI-20-904/
reference_id ZDI-20-904
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:21Z/
url https://www.zerodayinitiative.com/advisories/ZDI-20-904/
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.12-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.12-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.12-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2020-14704
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rjg7-ntnn-2ya5
303
url VCID-rpcf-ppp1-qbd1
vulnerability_id VCID-rpcf-ppp1-qbd1
summary
Multiple vulnerabilities were found in VirtualBox, allowing local
    attackers to gain escalated privileges.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-0111
reference_id
reference_type
scores
0
value 0.00059
scoring_system epss
scoring_elements 0.18646
published_at 2026-04-12T12:55:00Z
1
value 0.00059
scoring_system epss
scoring_elements 0.18783
published_at 2026-04-02T12:55:00Z
2
value 0.00059
scoring_system epss
scoring_elements 0.18836
published_at 2026-04-04T12:55:00Z
3
value 0.00059
scoring_system epss
scoring_elements 0.18555
published_at 2026-04-07T12:55:00Z
4
value 0.00059
scoring_system epss
scoring_elements 0.18635
published_at 2026-04-08T12:55:00Z
5
value 0.00059
scoring_system epss
scoring_elements 0.1869
published_at 2026-04-09T12:55:00Z
6
value 0.00059
scoring_system epss
scoring_elements 0.18694
published_at 2026-04-11T12:55:00Z
7
value 0.00059
scoring_system epss
scoring_elements 0.18595
published_at 2026-04-13T12:55:00Z
8
value 0.00059
scoring_system epss
scoring_elements 0.18539
published_at 2026-04-16T12:55:00Z
9
value 0.00059
scoring_system epss
scoring_elements 0.18549
published_at 2026-04-18T12:55:00Z
10
value 0.00059
scoring_system epss
scoring_elements 0.18569
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-0111
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659950
reference_id 659950
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659950
2
reference_url https://security.gentoo.org/glsa/201204-01
reference_id GLSA-201204-01
reference_type
scores
url https://security.gentoo.org/glsa/201204-01
fixed_packages
0
url pkg:deb/debian/virtualbox@4.1.8-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@4.1.8-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@4.1.8-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2012-0111
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rpcf-ppp1-qbd1
304
url VCID-rty8-4f5g-a7ac
vulnerability_id VCID-rty8-4f5g-a7ac
summary Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 6.1.44 and Prior to 7.0.8. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 3.2 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21991
reference_id
reference_type
scores
0
value 0.00054
scoring_system epss
scoring_elements 0.16978
published_at 2026-04-21T12:55:00Z
1
value 0.00054
scoring_system epss
scoring_elements 0.1694
published_at 2026-04-18T12:55:00Z
2
value 0.00054
scoring_system epss
scoring_elements 0.17157
published_at 2026-04-02T12:55:00Z
3
value 0.00054
scoring_system epss
scoring_elements 0.1721
published_at 2026-04-04T12:55:00Z
4
value 0.00054
scoring_system epss
scoring_elements 0.16991
published_at 2026-04-07T12:55:00Z
5
value 0.00054
scoring_system epss
scoring_elements 0.17081
published_at 2026-04-08T12:55:00Z
6
value 0.00054
scoring_system epss
scoring_elements 0.17138
published_at 2026-04-09T12:55:00Z
7
value 0.00054
scoring_system epss
scoring_elements 0.17113
published_at 2026-04-11T12:55:00Z
8
value 0.00054
scoring_system epss
scoring_elements 0.17066
published_at 2026-04-12T12:55:00Z
9
value 0.00054
scoring_system epss
scoring_elements 0.17005
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21991
fixed_packages
0
url pkg:deb/debian/virtualbox@7.0.8-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.0.8-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.0.8-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2023-21991
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rty8-4f5g-a7ac
305
url VCID-ryh1-3n7p-4fd2
vulnerability_id VCID-ryh1-3n7p-4fd2
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:41:41Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2758
reference_id
reference_type
scores
0
value 0.00165
scoring_system epss
scoring_elements 0.37586
published_at 2026-04-21T12:55:00Z
1
value 0.00165
scoring_system epss
scoring_elements 0.37605
published_at 2026-04-07T12:55:00Z
2
value 0.00165
scoring_system epss
scoring_elements 0.37656
published_at 2026-04-08T12:55:00Z
3
value 0.00165
scoring_system epss
scoring_elements 0.37669
published_at 2026-04-09T12:55:00Z
4
value 0.00165
scoring_system epss
scoring_elements 0.37683
published_at 2026-04-11T12:55:00Z
5
value 0.00165
scoring_system epss
scoring_elements 0.37649
published_at 2026-04-12T12:55:00Z
6
value 0.00165
scoring_system epss
scoring_elements 0.37621
published_at 2026-04-13T12:55:00Z
7
value 0.00165
scoring_system epss
scoring_elements 0.37668
published_at 2026-04-16T12:55:00Z
8
value 0.00165
scoring_system epss
scoring_elements 0.3765
published_at 2026-04-18T12:55:00Z
9
value 0.00165
scoring_system epss
scoring_elements 0.37519
published_at 2026-04-01T12:55:00Z
10
value 0.00165
scoring_system epss
scoring_elements 0.37701
published_at 2026-04-02T12:55:00Z
11
value 0.00165
scoring_system epss
scoring_elements 0.37726
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2758
2
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:41:41Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
3
reference_url https://www.zerodayinitiative.com/advisories/ZDI-20-507/
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:41:41Z/
url https://www.zerodayinitiative.com/advisories/ZDI-20-507/
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2758
reference_id CVE-2020-2758
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
1
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
2
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-2758
7
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:41:41Z/
url https://security.gentoo.org/glsa/202101-09
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.6-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.6-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.6-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2020-2758
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ryh1-3n7p-4fd2
306
url VCID-sbtb-kwbk-43dj
vulnerability_id VCID-sbtb-kwbk-43dj
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.1.24. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.0 Base Score 4.6 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:L).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10187
reference_id
reference_type
scores
0
value 0.00088
scoring_system epss
scoring_elements 0.25162
published_at 2026-04-21T12:55:00Z
1
value 0.00088
scoring_system epss
scoring_elements 0.25344
published_at 2026-04-02T12:55:00Z
2
value 0.00088
scoring_system epss
scoring_elements 0.25203
published_at 2026-04-16T12:55:00Z
3
value 0.00088
scoring_system epss
scoring_elements 0.25193
published_at 2026-04-18T12:55:00Z
4
value 0.00088
scoring_system epss
scoring_elements 0.2527
published_at 2026-04-01T12:55:00Z
5
value 0.00088
scoring_system epss
scoring_elements 0.25384
published_at 2026-04-04T12:55:00Z
6
value 0.00088
scoring_system epss
scoring_elements 0.25161
published_at 2026-04-07T12:55:00Z
7
value 0.00088
scoring_system epss
scoring_elements 0.2523
published_at 2026-04-08T12:55:00Z
8
value 0.00088
scoring_system epss
scoring_elements 0.25275
published_at 2026-04-09T12:55:00Z
9
value 0.00088
scoring_system epss
scoring_elements 0.2529
published_at 2026-04-11T12:55:00Z
10
value 0.00088
scoring_system epss
scoring_elements 0.25247
published_at 2026-04-12T12:55:00Z
11
value 0.00088
scoring_system epss
scoring_elements 0.25194
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10187
1
reference_url http://www.securitytracker.com/id/1038929
reference_id 1038929
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:50:49Z/
url http://www.securitytracker.com/id/1038929
2
reference_url http://www.securityfocus.com/bid/99711
reference_id 99711
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:50:49Z/
url http://www.securityfocus.com/bid/99711
fixed_packages
0
url pkg:deb/debian/virtualbox@5.1.24-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.1.24-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.1.24-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2017-10187
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sbtb-kwbk-43dj
307
url VCID-segw-gnkd-6ybu
vulnerability_id VCID-segw-gnkd-6ybu
summary Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 7.0.24 and prior to 7.1.6. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data as well as unauthorized read access to a subset of Oracle VM VirtualBox accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 7.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:H/A:L).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-21571
reference_id
reference_type
scores
0
value 0.00023
scoring_system epss
scoring_elements 0.06197
published_at 2026-04-21T12:55:00Z
1
value 0.00023
scoring_system epss
scoring_elements 0.06047
published_at 2026-04-18T12:55:00Z
2
value 0.00023
scoring_system epss
scoring_elements 0.06001
published_at 2026-04-02T12:55:00Z
3
value 0.00023
scoring_system epss
scoring_elements 0.06036
published_at 2026-04-04T12:55:00Z
4
value 0.00023
scoring_system epss
scoring_elements 0.0602
published_at 2026-04-07T12:55:00Z
5
value 0.00023
scoring_system epss
scoring_elements 0.06059
published_at 2026-04-08T12:55:00Z
6
value 0.00023
scoring_system epss
scoring_elements 0.06098
published_at 2026-04-09T12:55:00Z
7
value 0.00023
scoring_system epss
scoring_elements 0.06088
published_at 2026-04-11T12:55:00Z
8
value 0.00023
scoring_system epss
scoring_elements 0.06083
published_at 2026-04-12T12:55:00Z
9
value 0.00023
scoring_system epss
scoring_elements 0.06075
published_at 2026-04-13T12:55:00Z
10
value 0.00023
scoring_system epss
scoring_elements 0.06039
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-21571
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1093879
reference_id 1093879
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1093879
2
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.0.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.0.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.0.24:*:*:*:*:*:*:*
3
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.1.6:*:*:*:*:*:*:*
4
reference_url https://www.oracle.com/security-alerts/cpujan2025.html
reference_id cpujan2025.html
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-22T14:39:45Z/
url https://www.oracle.com/security-alerts/cpujan2025.html
fixed_packages
0
url pkg:deb/debian/virtualbox@7.0.26-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.0.26-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.0.26-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2025-21571
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-segw-gnkd-6ybu
308
url VCID-sjnq-f8tq-d3d4
vulnerability_id VCID-sjnq-f8tq-d3d4
summary Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 7.0.16. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21106
reference_id
reference_type
scores
0
value 0.00156
scoring_system epss
scoring_elements 0.36291
published_at 2026-04-21T12:55:00Z
1
value 0.00156
scoring_system epss
scoring_elements 0.36362
published_at 2026-04-16T12:55:00Z
2
value 0.00156
scoring_system epss
scoring_elements 0.36346
published_at 2026-04-18T12:55:00Z
3
value 0.00156
scoring_system epss
scoring_elements 0.36434
published_at 2026-04-02T12:55:00Z
4
value 0.00156
scoring_system epss
scoring_elements 0.36467
published_at 2026-04-04T12:55:00Z
5
value 0.00156
scoring_system epss
scoring_elements 0.36302
published_at 2026-04-07T12:55:00Z
6
value 0.00156
scoring_system epss
scoring_elements 0.3635
published_at 2026-04-08T12:55:00Z
7
value 0.00156
scoring_system epss
scoring_elements 0.36371
published_at 2026-04-09T12:55:00Z
8
value 0.00156
scoring_system epss
scoring_elements 0.36378
published_at 2026-04-11T12:55:00Z
9
value 0.00156
scoring_system epss
scoring_elements 0.36342
published_at 2026-04-12T12:55:00Z
10
value 0.00156
scoring_system epss
scoring_elements 0.3632
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21106
1
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.0.16:*:*:*:*:*:*:*
2
reference_url https://www.oracle.com/security-alerts/cpuapr2024.html
reference_id cpuapr2024.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-30T15:32:20Z/
url https://www.oracle.com/security-alerts/cpuapr2024.html
fixed_packages
0
url pkg:deb/debian/virtualbox@7.0.16-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.0.16-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.0.16-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2024-21106
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sjnq-f8tq-d3d4
309
url VCID-sjun-jhtp-hfce
vulnerability_id VCID-sjun-jhtp-hfce
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could result in privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2127
reference_id
reference_type
scores
0
value 0.00196
scoring_system epss
scoring_elements 0.41462
published_at 2026-04-21T12:55:00Z
1
value 0.00196
scoring_system epss
scoring_elements 0.41531
published_at 2026-04-12T12:55:00Z
2
value 0.00196
scoring_system epss
scoring_elements 0.41517
published_at 2026-04-13T12:55:00Z
3
value 0.00196
scoring_system epss
scoring_elements 0.41562
published_at 2026-04-16T12:55:00Z
4
value 0.00196
scoring_system epss
scoring_elements 0.41536
published_at 2026-04-18T12:55:00Z
5
value 0.00196
scoring_system epss
scoring_elements 0.4144
published_at 2026-04-01T12:55:00Z
6
value 0.00196
scoring_system epss
scoring_elements 0.4153
published_at 2026-04-02T12:55:00Z
7
value 0.00196
scoring_system epss
scoring_elements 0.41558
published_at 2026-04-04T12:55:00Z
8
value 0.00196
scoring_system epss
scoring_elements 0.41484
published_at 2026-04-07T12:55:00Z
9
value 0.00196
scoring_system epss
scoring_elements 0.41534
published_at 2026-04-08T12:55:00Z
10
value 0.00196
scoring_system epss
scoring_elements 0.41542
published_at 2026-04-09T12:55:00Z
11
value 0.00196
scoring_system epss
scoring_elements 0.41564
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2127
1
reference_url https://security.archlinux.org/ASA-202101-37
reference_id ASA-202101-37
reference_type
scores
url https://security.archlinux.org/ASA-202101-37
2
reference_url https://security.archlinux.org/AVG-1483
reference_id AVG-1483
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1483
3
reference_url https://security.gentoo.org/glsa/202101-15
reference_id GLSA-202101-15
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:53:14Z/
url https://security.gentoo.org/glsa/202101-15
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.18-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.18-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.18-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2021-2127
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sjun-jhtp-hfce
310
url VCID-sn3m-8amt-mbgg
vulnerability_id VCID-sn3m-8amt-mbgg
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2691
reference_id
reference_type
scores
0
value 0.00416
scoring_system epss
scoring_elements 0.61736
published_at 2026-04-21T12:55:00Z
1
value 0.00416
scoring_system epss
scoring_elements 0.61653
published_at 2026-04-07T12:55:00Z
2
value 0.00416
scoring_system epss
scoring_elements 0.61739
published_at 2026-04-11T12:55:00Z
3
value 0.00416
scoring_system epss
scoring_elements 0.61726
published_at 2026-04-12T12:55:00Z
4
value 0.00416
scoring_system epss
scoring_elements 0.61707
published_at 2026-04-13T12:55:00Z
5
value 0.00416
scoring_system epss
scoring_elements 0.61748
published_at 2026-04-16T12:55:00Z
6
value 0.00416
scoring_system epss
scoring_elements 0.61753
published_at 2026-04-18T12:55:00Z
7
value 0.00416
scoring_system epss
scoring_elements 0.61578
published_at 2026-04-01T12:55:00Z
8
value 0.00416
scoring_system epss
scoring_elements 0.61683
published_at 2026-04-04T12:55:00Z
9
value 0.00416
scoring_system epss
scoring_elements 0.61702
published_at 2026-04-08T12:55:00Z
10
value 0.00416
scoring_system epss
scoring_elements 0.61717
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2691
1
reference_url https://security.gentoo.org/glsa/202004-02
reference_id GLSA-202004-02
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:01:44Z/
url https://security.gentoo.org/glsa/202004-02
2
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:01:44Z/
url https://security.gentoo.org/glsa/202101-09
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.2-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.2-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.2-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2020-2691
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sn3m-8amt-mbgg
311
url VCID-sn5s-ywa3-u7c1
vulnerability_id VCID-sn5s-ywa3-u7c1
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which allows local users to escalate privileges.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5611
reference_id
reference_type
scores
0
value 0.00046
scoring_system epss
scoring_elements 0.14142
published_at 2026-04-21T12:55:00Z
1
value 0.00046
scoring_system epss
scoring_elements 0.14175
published_at 2026-04-13T12:55:00Z
2
value 0.00046
scoring_system epss
scoring_elements 0.14065
published_at 2026-04-16T12:55:00Z
3
value 0.00046
scoring_system epss
scoring_elements 0.14064
published_at 2026-04-18T12:55:00Z
4
value 0.00046
scoring_system epss
scoring_elements 0.14237
published_at 2026-04-01T12:55:00Z
5
value 0.00046
scoring_system epss
scoring_elements 0.14316
published_at 2026-04-02T12:55:00Z
6
value 0.00046
scoring_system epss
scoring_elements 0.14379
published_at 2026-04-04T12:55:00Z
7
value 0.00046
scoring_system epss
scoring_elements 0.14186
published_at 2026-04-07T12:55:00Z
8
value 0.00046
scoring_system epss
scoring_elements 0.14268
published_at 2026-04-08T12:55:00Z
9
value 0.00046
scoring_system epss
scoring_elements 0.14322
published_at 2026-04-09T12:55:00Z
10
value 0.00046
scoring_system epss
scoring_elements 0.14269
published_at 2026-04-11T12:55:00Z
11
value 0.00046
scoring_system epss
scoring_elements 0.14231
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5611
1
reference_url http://www.securityfocus.com/bid/93744
reference_id 93744
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:49Z/
url http://www.securityfocus.com/bid/93744
2
reference_url https://security.gentoo.org/glsa/201612-27
reference_id GLSA-201612-27
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:48:49Z/
url https://security.gentoo.org/glsa/201612-27
fixed_packages
0
url pkg:deb/debian/virtualbox@5.1.8-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.1.8-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.1.8-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2016-5611
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sn5s-ywa3-u7c1
312
url VCID-sqcp-u9uz-eugn
vulnerability_id VCID-sqcp-u9uz-eugn
summary Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 7.0.16. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 3.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21108
reference_id
reference_type
scores
0
value 0.00153
scoring_system epss
scoring_elements 0.35991
published_at 2026-04-21T12:55:00Z
1
value 0.00153
scoring_system epss
scoring_elements 0.36056
published_at 2026-04-16T12:55:00Z
2
value 0.00153
scoring_system epss
scoring_elements 0.36042
published_at 2026-04-18T12:55:00Z
3
value 0.00153
scoring_system epss
scoring_elements 0.36142
published_at 2026-04-02T12:55:00Z
4
value 0.00153
scoring_system epss
scoring_elements 0.36172
published_at 2026-04-04T12:55:00Z
5
value 0.00153
scoring_system epss
scoring_elements 0.36008
published_at 2026-04-07T12:55:00Z
6
value 0.00153
scoring_system epss
scoring_elements 0.36057
published_at 2026-04-08T12:55:00Z
7
value 0.00153
scoring_system epss
scoring_elements 0.36075
published_at 2026-04-09T12:55:00Z
8
value 0.00153
scoring_system epss
scoring_elements 0.36082
published_at 2026-04-11T12:55:00Z
9
value 0.00153
scoring_system epss
scoring_elements 0.36043
published_at 2026-04-12T12:55:00Z
10
value 0.00153
scoring_system epss
scoring_elements 0.36017
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21108
1
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.0.16:*:*:*:*:*:*:*
2
reference_url https://www.oracle.com/security-alerts/cpuapr2024.html
reference_id cpuapr2024.html
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-13T20:13:49Z/
url https://www.oracle.com/security-alerts/cpuapr2024.html
fixed_packages
0
url pkg:deb/debian/virtualbox@7.0.16-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.0.16-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.0.16-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2024-21108
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sqcp-u9uz-eugn
313
url VCID-srpe-czby-jue9
vulnerability_id VCID-srpe-czby-jue9
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.2.28 and prior to 6.0.6. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2721
reference_id
reference_type
scores
0
value 0.0125
scoring_system epss
scoring_elements 0.79281
published_at 2026-04-02T12:55:00Z
1
value 0.0125
scoring_system epss
scoring_elements 0.79348
published_at 2026-04-21T12:55:00Z
2
value 0.0125
scoring_system epss
scoring_elements 0.79346
published_at 2026-04-18T12:55:00Z
3
value 0.0125
scoring_system epss
scoring_elements 0.79274
published_at 2026-04-01T12:55:00Z
4
value 0.0125
scoring_system epss
scoring_elements 0.79305
published_at 2026-04-04T12:55:00Z
5
value 0.0125
scoring_system epss
scoring_elements 0.79291
published_at 2026-04-07T12:55:00Z
6
value 0.0125
scoring_system epss
scoring_elements 0.79317
published_at 2026-04-08T12:55:00Z
7
value 0.0125
scoring_system epss
scoring_elements 0.79326
published_at 2026-04-09T12:55:00Z
8
value 0.0125
scoring_system epss
scoring_elements 0.7935
published_at 2026-04-11T12:55:00Z
9
value 0.0125
scoring_system epss
scoring_elements 0.79335
published_at 2026-04-12T12:55:00Z
10
value 0.0125
scoring_system epss
scoring_elements 0.79324
published_at 2026-04-13T12:55:00Z
11
value 0.0125
scoring_system epss
scoring_elements 0.79351
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2721
1
reference_url https://www.exploit-db.com/exploits/46747/
reference_id 46747
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:55:41Z/
url https://www.exploit-db.com/exploits/46747/
2
reference_url https://bugs.chromium.org/p/project-zero/issues/detail?id=1811
reference_id CVE-2019-2721
reference_type exploit
scores
url https://bugs.chromium.org/p/project-zero/issues/detail?id=1811
3
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/46747.txt
reference_id CVE-2019-2721
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/46747.txt
fixed_packages
0
url pkg:deb/debian/virtualbox@6.0.6-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.0.6-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.0.6-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2019-2721
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-srpe-czby-jue9
314
url VCID-swkf-186u-1kgz
vulnerability_id VCID-swkf-186u-1kgz
summary Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 7.0.16. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. Note: This vulnerability applies to Linux hosts only. CVSS 3.1 Base Score 7.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21116
reference_id
reference_type
scores
0
value 0.002
scoring_system epss
scoring_elements 0.42019
published_at 2026-04-21T12:55:00Z
1
value 0.002
scoring_system epss
scoring_elements 0.42065
published_at 2026-04-13T12:55:00Z
2
value 0.002
scoring_system epss
scoring_elements 0.42116
published_at 2026-04-16T12:55:00Z
3
value 0.002
scoring_system epss
scoring_elements 0.42076
published_at 2026-04-02T12:55:00Z
4
value 0.002
scoring_system epss
scoring_elements 0.42104
published_at 2026-04-04T12:55:00Z
5
value 0.002
scoring_system epss
scoring_elements 0.42041
published_at 2026-04-07T12:55:00Z
6
value 0.002
scoring_system epss
scoring_elements 0.42093
published_at 2026-04-08T12:55:00Z
7
value 0.002
scoring_system epss
scoring_elements 0.42105
published_at 2026-04-09T12:55:00Z
8
value 0.002
scoring_system epss
scoring_elements 0.42127
published_at 2026-04-11T12:55:00Z
9
value 0.002
scoring_system epss
scoring_elements 0.4209
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21116
1
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.0.16:*:*:*:*:*:*:*
2
reference_url https://www.oracle.com/security-alerts/cpuapr2024.html
reference_id cpuapr2024.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-19T04:01:16Z/
url https://www.oracle.com/security-alerts/cpuapr2024.html
fixed_packages
0
url pkg:deb/debian/virtualbox@7.0.16-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.0.16-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.0.16-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2024-21116
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-swkf-186u-1kgz
315
url VCID-sxgh-wms4-hydr
vulnerability_id VCID-sxgh-wms4-hydr
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2873
reference_id
reference_type
scores
0
value 0.00151
scoring_system epss
scoring_elements 0.35886
published_at 2026-04-02T12:55:00Z
1
value 0.00151
scoring_system epss
scoring_elements 0.35745
published_at 2026-04-21T12:55:00Z
2
value 0.00151
scoring_system epss
scoring_elements 0.35793
published_at 2026-04-18T12:55:00Z
3
value 0.00151
scoring_system epss
scoring_elements 0.35689
published_at 2026-04-01T12:55:00Z
4
value 0.00151
scoring_system epss
scoring_elements 0.35916
published_at 2026-04-04T12:55:00Z
5
value 0.00151
scoring_system epss
scoring_elements 0.35747
published_at 2026-04-07T12:55:00Z
6
value 0.00151
scoring_system epss
scoring_elements 0.35797
published_at 2026-04-08T12:55:00Z
7
value 0.00151
scoring_system epss
scoring_elements 0.3582
published_at 2026-04-09T12:55:00Z
8
value 0.00151
scoring_system epss
scoring_elements 0.35828
published_at 2026-04-11T12:55:00Z
9
value 0.00151
scoring_system epss
scoring_elements 0.35787
published_at 2026-04-12T12:55:00Z
10
value 0.00151
scoring_system epss
scoring_elements 0.35765
published_at 2026-04-13T12:55:00Z
11
value 0.00151
scoring_system epss
scoring_elements 0.35805
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2873
1
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
reference_id cpujul2019-5072835.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:16:00Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
2
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:16:00Z/
url https://security.gentoo.org/glsa/202101-09
fixed_packages
0
url pkg:deb/debian/virtualbox@6.0.10-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.0.10-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.0.10-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2019-2873
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sxgh-wms4-hydr
316
url VCID-sxh8-hd5p-7bfq
vulnerability_id VCID-sxh8-hd5p-7bfq
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.2.28 and prior to 6.0.6. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2722
reference_id
reference_type
scores
0
value 0.0015
scoring_system epss
scoring_elements 0.35574
published_at 2026-04-02T12:55:00Z
1
value 0.0015
scoring_system epss
scoring_elements 0.35474
published_at 2026-04-21T12:55:00Z
2
value 0.0015
scoring_system epss
scoring_elements 0.35524
published_at 2026-04-18T12:55:00Z
3
value 0.0015
scoring_system epss
scoring_elements 0.35374
published_at 2026-04-01T12:55:00Z
4
value 0.0015
scoring_system epss
scoring_elements 0.35599
published_at 2026-04-04T12:55:00Z
5
value 0.0015
scoring_system epss
scoring_elements 0.35482
published_at 2026-04-07T12:55:00Z
6
value 0.0015
scoring_system epss
scoring_elements 0.35528
published_at 2026-04-08T12:55:00Z
7
value 0.0015
scoring_system epss
scoring_elements 0.35553
published_at 2026-04-09T12:55:00Z
8
value 0.0015
scoring_system epss
scoring_elements 0.35561
published_at 2026-04-11T12:55:00Z
9
value 0.0015
scoring_system epss
scoring_elements 0.35517
published_at 2026-04-12T12:55:00Z
10
value 0.0015
scoring_system epss
scoring_elements 0.35496
published_at 2026-04-13T12:55:00Z
11
value 0.0015
scoring_system epss
scoring_elements 0.35535
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2722
1
reference_url https://www.zerodayinitiative.com/advisories/ZDI-19-425/
reference_id ZDI-19-425
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T15:55:40Z/
url https://www.zerodayinitiative.com/advisories/ZDI-19-425/
fixed_packages
0
url pkg:deb/debian/virtualbox@6.0.6-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.0.6-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.0.6-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2019-2722
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sxh8-hd5p-7bfq
317
url VCID-t1gj-aa8j-jucx
vulnerability_id VCID-t1gj-aa8j-jucx
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html
reference_id
reference_type
scores
0
value 2.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:16Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2909
reference_id
reference_type
scores
0
value 0.00224
scoring_system epss
scoring_elements 0.44972
published_at 2026-04-01T12:55:00Z
1
value 0.00224
scoring_system epss
scoring_elements 0.45069
published_at 2026-04-09T12:55:00Z
2
value 0.00224
scoring_system epss
scoring_elements 0.45091
published_at 2026-04-11T12:55:00Z
3
value 0.00224
scoring_system epss
scoring_elements 0.45058
published_at 2026-04-12T12:55:00Z
4
value 0.00224
scoring_system epss
scoring_elements 0.45061
published_at 2026-04-13T12:55:00Z
5
value 0.00224
scoring_system epss
scoring_elements 0.45109
published_at 2026-04-16T12:55:00Z
6
value 0.00224
scoring_system epss
scoring_elements 0.45102
published_at 2026-04-18T12:55:00Z
7
value 0.00224
scoring_system epss
scoring_elements 0.45054
published_at 2026-04-21T12:55:00Z
8
value 0.00224
scoring_system epss
scoring_elements 0.45053
published_at 2026-04-02T12:55:00Z
9
value 0.00224
scoring_system epss
scoring_elements 0.45075
published_at 2026-04-04T12:55:00Z
10
value 0.00224
scoring_system epss
scoring_elements 0.45017
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2909
2
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 2.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:16Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
3
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2909
reference_id CVE-2020-2909
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 2.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
2
value 2.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
url https://nvd.nist.gov/vuln/detail/CVE-2020-2909
6
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value 2.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:16Z/
url https://security.gentoo.org/glsa/202101-09
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.6-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.6-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.6-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2020-2909
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t1gj-aa8j-jucx
318
url VCID-t2ad-r1aw-x3d7
vulnerability_id VCID-t2ad-r1aw-x3d7
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2877
reference_id
reference_type
scores
0
value 0.00151
scoring_system epss
scoring_elements 0.35886
published_at 2026-04-02T12:55:00Z
1
value 0.00151
scoring_system epss
scoring_elements 0.35745
published_at 2026-04-21T12:55:00Z
2
value 0.00151
scoring_system epss
scoring_elements 0.35793
published_at 2026-04-18T12:55:00Z
3
value 0.00151
scoring_system epss
scoring_elements 0.35689
published_at 2026-04-01T12:55:00Z
4
value 0.00151
scoring_system epss
scoring_elements 0.35916
published_at 2026-04-04T12:55:00Z
5
value 0.00151
scoring_system epss
scoring_elements 0.35747
published_at 2026-04-07T12:55:00Z
6
value 0.00151
scoring_system epss
scoring_elements 0.35797
published_at 2026-04-08T12:55:00Z
7
value 0.00151
scoring_system epss
scoring_elements 0.3582
published_at 2026-04-09T12:55:00Z
8
value 0.00151
scoring_system epss
scoring_elements 0.35828
published_at 2026-04-11T12:55:00Z
9
value 0.00151
scoring_system epss
scoring_elements 0.35787
published_at 2026-04-12T12:55:00Z
10
value 0.00151
scoring_system epss
scoring_elements 0.35765
published_at 2026-04-13T12:55:00Z
11
value 0.00151
scoring_system epss
scoring_elements 0.35805
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2877
1
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
reference_id cpujul2019-5072835.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:15:54Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
2
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:15:54Z/
url https://security.gentoo.org/glsa/202101-09
fixed_packages
0
url pkg:deb/debian/virtualbox@6.0.10-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.0.10-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.0.10-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2019-2877
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t2ad-r1aw-x3d7
319
url VCID-t3m7-zvcc-3qar
vulnerability_id VCID-t3m7-zvcc-3qar
summary Multiple vulnerabilities have been discovered in Oracle Virtualbox, the worst of which could result in root privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2306
reference_id
reference_type
scores
0
value 0.00065
scoring_system epss
scoring_elements 0.20189
published_at 2026-04-21T12:55:00Z
1
value 0.00065
scoring_system epss
scoring_elements 0.20253
published_at 2026-04-12T12:55:00Z
2
value 0.00065
scoring_system epss
scoring_elements 0.20194
published_at 2026-04-13T12:55:00Z
3
value 0.00065
scoring_system epss
scoring_elements 0.20186
published_at 2026-04-16T12:55:00Z
4
value 0.00065
scoring_system epss
scoring_elements 0.2019
published_at 2026-04-18T12:55:00Z
5
value 0.00065
scoring_system epss
scoring_elements 0.202
published_at 2026-04-01T12:55:00Z
6
value 0.00065
scoring_system epss
scoring_elements 0.20349
published_at 2026-04-02T12:55:00Z
7
value 0.00065
scoring_system epss
scoring_elements 0.20409
published_at 2026-04-04T12:55:00Z
8
value 0.00065
scoring_system epss
scoring_elements 0.20134
published_at 2026-04-07T12:55:00Z
9
value 0.00065
scoring_system epss
scoring_elements 0.20216
published_at 2026-04-08T12:55:00Z
10
value 0.00065
scoring_system epss
scoring_elements 0.20274
published_at 2026-04-09T12:55:00Z
11
value 0.00065
scoring_system epss
scoring_elements 0.20299
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2306
1
reference_url https://security.archlinux.org/ASA-202104-9
reference_id ASA-202104-9
reference_type
scores
url https://security.archlinux.org/ASA-202104-9
2
reference_url https://security.archlinux.org/AVG-1846
reference_id AVG-1846
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1846
3
reference_url https://security.gentoo.org/glsa/202208-36
reference_id GLSA-202208-36
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:36Z/
url https://security.gentoo.org/glsa/202208-36
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.20-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.20-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.20-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2021-2306
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t3m7-zvcc-3qar
320
url VCID-t3xc-jcau-dyhc
vulnerability_id VCID-t3xc-jcau-dyhc
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2831
reference_id
reference_type
scores
0
value 0.00108
scoring_system epss
scoring_elements 0.29012
published_at 2026-04-21T12:55:00Z
1
value 0.00108
scoring_system epss
scoring_elements 0.2915
published_at 2026-04-11T12:55:00Z
2
value 0.00108
scoring_system epss
scoring_elements 0.29105
published_at 2026-04-12T12:55:00Z
3
value 0.00108
scoring_system epss
scoring_elements 0.29054
published_at 2026-04-13T12:55:00Z
4
value 0.00108
scoring_system epss
scoring_elements 0.29082
published_at 2026-04-16T12:55:00Z
5
value 0.00108
scoring_system epss
scoring_elements 0.29058
published_at 2026-04-18T12:55:00Z
6
value 0.00108
scoring_system epss
scoring_elements 0.29103
published_at 2026-04-08T12:55:00Z
7
value 0.00108
scoring_system epss
scoring_elements 0.29178
published_at 2026-04-02T12:55:00Z
8
value 0.00108
scoring_system epss
scoring_elements 0.29229
published_at 2026-04-04T12:55:00Z
9
value 0.00108
scoring_system epss
scoring_elements 0.2904
published_at 2026-04-07T12:55:00Z
10
value 0.00108
scoring_system epss
scoring_elements 0.29145
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2831
1
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:59Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
2
reference_url http://www.securityfocus.com/bid/103863
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:59Z/
url http://www.securityfocus.com/bid/103863
3
reference_url http://www.securitytracker.com/id/1040707
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:59Z/
url http://www.securitytracker.com/id/1040707
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-2831
reference_id CVE-2018-2831
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:N
1
value 3.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2018-2831
6
reference_url https://security.gentoo.org/glsa/201805-08
reference_id GLSA-201805-08
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:59Z/
url https://security.gentoo.org/glsa/201805-08
fixed_packages
0
url pkg:deb/debian/virtualbox@5.2.10-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.2.10-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.10-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2018-2831
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t3xc-jcau-dyhc
321
url VCID-tcbn-c6e2-zycb
vulnerability_id VCID-tcbn-c6e2-zycb
summary Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization VirtualBox before 3.2.24, 4.0.26, 4.1.34, 4.2.26, and 4.3.12 allows local users to affect integrity and availability via unknown vectors related to Core, a different vulnerability than CVE-2014-2486.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-2477
reference_id
reference_type
scores
0
value 0.07491
scoring_system epss
scoring_elements 0.91803
published_at 2026-04-21T12:55:00Z
1
value 0.07491
scoring_system epss
scoring_elements 0.91748
published_at 2026-04-01T12:55:00Z
2
value 0.07491
scoring_system epss
scoring_elements 0.91756
published_at 2026-04-02T12:55:00Z
3
value 0.07491
scoring_system epss
scoring_elements 0.91763
published_at 2026-04-04T12:55:00Z
4
value 0.07491
scoring_system epss
scoring_elements 0.9177
published_at 2026-04-07T12:55:00Z
5
value 0.07491
scoring_system epss
scoring_elements 0.91782
published_at 2026-04-08T12:55:00Z
6
value 0.07491
scoring_system epss
scoring_elements 0.91789
published_at 2026-04-09T12:55:00Z
7
value 0.07491
scoring_system epss
scoring_elements 0.91792
published_at 2026-04-11T12:55:00Z
8
value 0.07491
scoring_system epss
scoring_elements 0.91794
published_at 2026-04-12T12:55:00Z
9
value 0.07491
scoring_system epss
scoring_elements 0.9179
published_at 2026-04-13T12:55:00Z
10
value 0.07491
scoring_system epss
scoring_elements 0.91809
published_at 2026-04-16T12:55:00Z
11
value 0.07491
scoring_system epss
scoring_elements 0.91802
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-2477
1
reference_url http://seclists.org/fulldisclosure/2014/Dec/23
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2014/Dec/23
2
reference_url http://www.exploit-db.com/exploits/34333
reference_id
reference_type
scores
url http://www.exploit-db.com/exploits/34333
3
reference_url http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
4
reference_url http://www.securityfocus.com/archive/1/534161/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/534161/100/0/threaded
5
reference_url http://www.securityfocus.com/bid/68613
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/68613
6
reference_url http://www.vmware.com/security/advisories/VMSA-2014-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2014-0012.html
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=754939
reference_id 754939
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=754939
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:3.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:3.2.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.10:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:3.2.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.12:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:3.2.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.14:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:3.2.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.16:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:3.2.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.18:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:3.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.2:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:3.2.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.20:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:3.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.4:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:3.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.6:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:3.2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.8:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.10:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.12:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.0.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.14:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.16:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.0.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.18:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.2:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.0.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.20:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.22:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.4:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.6:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.8:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.10:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.12:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.14:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.16:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.18:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.2:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.20:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.22:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.24:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.26:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.26:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.28:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.28:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.28:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.30:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.30:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.4:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.6:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.8:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.2.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.10:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.2.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.12:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.2.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.14:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.2.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.16:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.2.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.18:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.2:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.2.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.20:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.2.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.22:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.4:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.6:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.8:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.3.0:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.3.2:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.3.4:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.3.6:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.3.8:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-2477
reference_id CVE-2014-2477
reference_type
scores
0
value 3.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-2477
68
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/34333.rb
reference_id CVE-2014-2477;OSVDB-109152
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/34333.rb
fixed_packages
0
url pkg:deb/debian/virtualbox@4.3.12-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@4.3.12-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@4.3.12-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2014-2477
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tcbn-c6e2-zycb
322
url VCID-tdga-tubw-53db
vulnerability_id VCID-tdga-tubw-53db
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14677
reference_id
reference_type
scores
0
value 0.00124
scoring_system epss
scoring_elements 0.31559
published_at 2026-04-01T12:55:00Z
1
value 0.00124
scoring_system epss
scoring_elements 0.31696
published_at 2026-04-02T12:55:00Z
2
value 0.00124
scoring_system epss
scoring_elements 0.31643
published_at 2026-04-11T12:55:00Z
3
value 0.00124
scoring_system epss
scoring_elements 0.31601
published_at 2026-04-12T12:55:00Z
4
value 0.00124
scoring_system epss
scoring_elements 0.31565
published_at 2026-04-13T12:55:00Z
5
value 0.00124
scoring_system epss
scoring_elements 0.316
published_at 2026-04-16T12:55:00Z
6
value 0.00124
scoring_system epss
scoring_elements 0.31577
published_at 2026-04-18T12:55:00Z
7
value 0.00124
scoring_system epss
scoring_elements 0.31545
published_at 2026-04-21T12:55:00Z
8
value 0.00124
scoring_system epss
scoring_elements 0.3174
published_at 2026-04-04T12:55:00Z
9
value 0.00124
scoring_system epss
scoring_elements 0.31558
published_at 2026-04-07T12:55:00Z
10
value 0.00124
scoring_system epss
scoring_elements 0.3161
published_at 2026-04-08T12:55:00Z
11
value 0.00124
scoring_system epss
scoring_elements 0.31639
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14677
1
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:45Z/
url https://security.gentoo.org/glsa/202101-09
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html
reference_id msg00068.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:45Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html
reference_id msg00079.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:45Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html
4
reference_url https://www.zerodayinitiative.com/advisories/ZDI-20-893/
reference_id ZDI-20-893
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:45Z/
url https://www.zerodayinitiative.com/advisories/ZDI-20-893/
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.12-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.12-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.12-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2020-14677
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tdga-tubw-53db
323
url VCID-tehr-wkyz-8kcd
vulnerability_id VCID-tehr-wkyz-8kcd
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could result in privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2073
reference_id
reference_type
scores
0
value 0.00196
scoring_system epss
scoring_elements 0.41462
published_at 2026-04-21T12:55:00Z
1
value 0.00196
scoring_system epss
scoring_elements 0.41531
published_at 2026-04-12T12:55:00Z
2
value 0.00196
scoring_system epss
scoring_elements 0.41517
published_at 2026-04-13T12:55:00Z
3
value 0.00196
scoring_system epss
scoring_elements 0.41562
published_at 2026-04-16T12:55:00Z
4
value 0.00196
scoring_system epss
scoring_elements 0.41536
published_at 2026-04-18T12:55:00Z
5
value 0.00196
scoring_system epss
scoring_elements 0.4144
published_at 2026-04-01T12:55:00Z
6
value 0.00196
scoring_system epss
scoring_elements 0.4153
published_at 2026-04-02T12:55:00Z
7
value 0.00196
scoring_system epss
scoring_elements 0.41558
published_at 2026-04-04T12:55:00Z
8
value 0.00196
scoring_system epss
scoring_elements 0.41484
published_at 2026-04-07T12:55:00Z
9
value 0.00196
scoring_system epss
scoring_elements 0.41534
published_at 2026-04-08T12:55:00Z
10
value 0.00196
scoring_system epss
scoring_elements 0.41542
published_at 2026-04-09T12:55:00Z
11
value 0.00196
scoring_system epss
scoring_elements 0.41564
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2073
1
reference_url https://security.archlinux.org/ASA-202101-37
reference_id ASA-202101-37
reference_type
scores
url https://security.archlinux.org/ASA-202101-37
2
reference_url https://security.archlinux.org/AVG-1483
reference_id AVG-1483
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1483
3
reference_url https://security.gentoo.org/glsa/202101-15
reference_id GLSA-202101-15
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:35Z/
url https://security.gentoo.org/glsa/202101-15
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.18-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.18-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.18-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2021-2073
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tehr-wkyz-8kcd
324
url VCID-tewa-96fw-nffy
vulnerability_id VCID-tewa-96fw-nffy
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.1.24. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10204
reference_id
reference_type
scores
0
value 0.00125
scoring_system epss
scoring_elements 0.31795
published_at 2026-04-02T12:55:00Z
1
value 0.00125
scoring_system epss
scoring_elements 0.31647
published_at 2026-04-21T12:55:00Z
2
value 0.00125
scoring_system epss
scoring_elements 0.31668
published_at 2026-04-13T12:55:00Z
3
value 0.00125
scoring_system epss
scoring_elements 0.31701
published_at 2026-04-16T12:55:00Z
4
value 0.00125
scoring_system epss
scoring_elements 0.31679
published_at 2026-04-18T12:55:00Z
5
value 0.00125
scoring_system epss
scoring_elements 0.31663
published_at 2026-04-01T12:55:00Z
6
value 0.00125
scoring_system epss
scoring_elements 0.31839
published_at 2026-04-04T12:55:00Z
7
value 0.00125
scoring_system epss
scoring_elements 0.3166
published_at 2026-04-07T12:55:00Z
8
value 0.00125
scoring_system epss
scoring_elements 0.31711
published_at 2026-04-08T12:55:00Z
9
value 0.00125
scoring_system epss
scoring_elements 0.31741
published_at 2026-04-09T12:55:00Z
10
value 0.00125
scoring_system epss
scoring_elements 0.31745
published_at 2026-04-11T12:55:00Z
11
value 0.00125
scoring_system epss
scoring_elements 0.31704
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10204
1
reference_url http://www.securitytracker.com/id/1038929
reference_id 1038929
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:20Z/
url http://www.securitytracker.com/id/1038929
2
reference_url https://www.exploit-db.com/exploits/42425/
reference_id 42425
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:20Z/
url https://www.exploit-db.com/exploits/42425/
3
reference_url http://www.securityfocus.com/bid/99631
reference_id 99631
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:20Z/
url http://www.securityfocus.com/bid/99631
4
reference_url https://bugs.chromium.org/p/project-zero/issues/detail?id=1257
reference_id CVE-2017-10204
reference_type exploit
scores
url https://bugs.chromium.org/p/project-zero/issues/detail?id=1257
5
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/42425.txt
reference_id CVE-2017-10204
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/42425.txt
6
reference_url http://packetstormsecurity.com/files/152617/VirtualBox-COM-RPC-Interface-Code-Injection-Privilege-Escalation.html
reference_id VirtualBox-COM-RPC-Interface-Code-Injection-Privilege-Escalation.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:20Z/
url http://packetstormsecurity.com/files/152617/VirtualBox-COM-RPC-Interface-Code-Injection-Privilege-Escalation.html
fixed_packages
0
url pkg:deb/debian/virtualbox@5.1.24-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.1.24-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.1.24-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2017-10204
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tewa-96fw-nffy
325
url VCID-tfs5-nd8b-g3g5
vulnerability_id VCID-tfs5-nd8b-g3g5
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-3289
reference_id
reference_type
scores
0
value 0.0045
scoring_system epss
scoring_elements 0.63619
published_at 2026-04-02T12:55:00Z
1
value 0.0045
scoring_system epss
scoring_elements 0.63669
published_at 2026-04-21T12:55:00Z
2
value 0.0045
scoring_system epss
scoring_elements 0.63676
published_at 2026-04-16T12:55:00Z
3
value 0.0045
scoring_system epss
scoring_elements 0.63686
published_at 2026-04-18T12:55:00Z
4
value 0.0045
scoring_system epss
scoring_elements 0.63559
published_at 2026-04-01T12:55:00Z
5
value 0.0045
scoring_system epss
scoring_elements 0.63645
published_at 2026-04-04T12:55:00Z
6
value 0.0045
scoring_system epss
scoring_elements 0.63604
published_at 2026-04-07T12:55:00Z
7
value 0.0045
scoring_system epss
scoring_elements 0.63656
published_at 2026-04-08T12:55:00Z
8
value 0.0045
scoring_system epss
scoring_elements 0.63672
published_at 2026-04-12T12:55:00Z
9
value 0.0045
scoring_system epss
scoring_elements 0.63687
published_at 2026-04-11T12:55:00Z
10
value 0.0045
scoring_system epss
scoring_elements 0.63639
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-3289
1
reference_url http://www.securitytracker.com/id/1041887
reference_id 1041887
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:01Z/
url http://www.securitytracker.com/id/1041887
2
reference_url http://www.securityfocus.com/bid/105619
reference_id 105619
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:01Z/
url http://www.securityfocus.com/bid/105619
fixed_packages
0
url pkg:deb/debian/virtualbox@5.2.20-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.2.20-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.20-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2018-3289
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tfs5-nd8b-g3g5
326
url VCID-tfs7-wh6p-hbgq
vulnerability_id VCID-tfs7-wh6p-hbgq
summary Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 6.1.46 and Prior to 7.0.10. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. Note: This vulnerability applies to Windows VMs only. CVSS 3.1 Base Score 5.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22017
reference_id
reference_type
scores
0
value 0.0006
scoring_system epss
scoring_elements 0.18811
published_at 2026-04-02T12:55:00Z
1
value 0.0006
scoring_system epss
scoring_elements 0.18864
published_at 2026-04-04T12:55:00Z
2
value 0.0006
scoring_system epss
scoring_elements 0.18586
published_at 2026-04-07T12:55:00Z
3
value 0.0006
scoring_system epss
scoring_elements 0.18666
published_at 2026-04-08T12:55:00Z
4
value 0.0006
scoring_system epss
scoring_elements 0.18721
published_at 2026-04-09T12:55:00Z
5
value 0.0006
scoring_system epss
scoring_elements 0.18726
published_at 2026-04-11T12:55:00Z
6
value 0.00066
scoring_system epss
scoring_elements 0.20449
published_at 2026-04-18T12:55:00Z
7
value 0.00066
scoring_system epss
scoring_elements 0.20446
published_at 2026-04-21T12:55:00Z
8
value 0.00066
scoring_system epss
scoring_elements 0.20512
published_at 2026-04-12T12:55:00Z
9
value 0.00066
scoring_system epss
scoring_elements 0.20457
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22017
1
reference_url https://www.oracle.com/security-alerts/cpujul2023.html
reference_id cpujul2023.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T17:57:12Z/
url https://www.oracle.com/security-alerts/cpujul2023.html
fixed_packages
0
url pkg:deb/debian/virtualbox@7.0.10-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.0.10-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.0.10-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2023-22017
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tfs7-wh6p-hbgq
327
url VCID-tgdf-c4sz-xfdf
vulnerability_id VCID-tgdf-c4sz-xfdf
summary Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization VirtualBox before 3.2.24, 4.0.26, 4.1.34, 4.2.26, and 4.3.12 allows local users to affect integrity and availability via unknown vectors related to Core, a different vulnerability than CVE-2014-2477.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-2486
reference_id
reference_type
scores
0
value 0.0008
scoring_system epss
scoring_elements 0.23511
published_at 2026-04-21T12:55:00Z
1
value 0.0008
scoring_system epss
scoring_elements 0.2351
published_at 2026-04-01T12:55:00Z
2
value 0.0008
scoring_system epss
scoring_elements 0.2367
published_at 2026-04-02T12:55:00Z
3
value 0.0008
scoring_system epss
scoring_elements 0.23712
published_at 2026-04-04T12:55:00Z
4
value 0.0008
scoring_system epss
scoring_elements 0.23492
published_at 2026-04-07T12:55:00Z
5
value 0.0008
scoring_system epss
scoring_elements 0.23562
published_at 2026-04-08T12:55:00Z
6
value 0.0008
scoring_system epss
scoring_elements 0.23608
published_at 2026-04-09T12:55:00Z
7
value 0.0008
scoring_system epss
scoring_elements 0.23624
published_at 2026-04-11T12:55:00Z
8
value 0.0008
scoring_system epss
scoring_elements 0.23583
published_at 2026-04-12T12:55:00Z
9
value 0.0008
scoring_system epss
scoring_elements 0.23526
published_at 2026-04-13T12:55:00Z
10
value 0.0008
scoring_system epss
scoring_elements 0.23538
published_at 2026-04-16T12:55:00Z
11
value 0.0008
scoring_system epss
scoring_elements 0.23531
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-2486
1
reference_url http://seclists.org/fulldisclosure/2014/Dec/23
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2014/Dec/23
2
reference_url http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
3
reference_url http://www.securityfocus.com/archive/1/534161/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/534161/100/0/threaded
4
reference_url http://www.vmware.com/security/advisories/VMSA-2014-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2014-0012.html
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=754939
reference_id 754939
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=754939
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:3.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.0:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:3.2.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.10:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:3.2.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.12:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:3.2.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.14:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:3.2.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.16:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:3.2.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.18:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:3.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.2:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:3.2.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.20:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:3.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.4:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:3.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.6:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:3.2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.8:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.10:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.12:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.0.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.14:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.16:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.0.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.18:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.2:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.0.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.20:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.22:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.4:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.6:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.8:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.10:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.12:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.14:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.16:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.18:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.2:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.20:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.22:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.24:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.26:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.26:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.28:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.28:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.28:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.30:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.30:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.4:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.6:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.8:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.2.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.10:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.2.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.12:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.2.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.14:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.2.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.16:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.2.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.18:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.2:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.2.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.20:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.2.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.22:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.4:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.6:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.8:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.3.0:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.3.2:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.3.4:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.3.6:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.3.8:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-2486
reference_id CVE-2014-2486
reference_type
scores
0
value 3.0
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:S/C:N/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-2486
fixed_packages
0
url pkg:deb/debian/virtualbox@4.3.12-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@4.3.12-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@4.3.12-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2014-2486
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tgdf-c4sz-xfdf
328
url VCID-th8u-azds-w7eg
vulnerability_id VCID-th8u-azds-w7eg
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14699
reference_id
reference_type
scores
0
value 0.0016
scoring_system epss
scoring_elements 0.36832
published_at 2026-04-01T12:55:00Z
1
value 0.0016
scoring_system epss
scoring_elements 0.36989
published_at 2026-04-02T12:55:00Z
2
value 0.0016
scoring_system epss
scoring_elements 0.36926
published_at 2026-04-11T12:55:00Z
3
value 0.0016
scoring_system epss
scoring_elements 0.36891
published_at 2026-04-12T12:55:00Z
4
value 0.0016
scoring_system epss
scoring_elements 0.36866
published_at 2026-04-13T12:55:00Z
5
value 0.0016
scoring_system epss
scoring_elements 0.36911
published_at 2026-04-16T12:55:00Z
6
value 0.0016
scoring_system epss
scoring_elements 0.36895
published_at 2026-04-18T12:55:00Z
7
value 0.0016
scoring_system epss
scoring_elements 0.36837
published_at 2026-04-21T12:55:00Z
8
value 0.0016
scoring_system epss
scoring_elements 0.37024
published_at 2026-04-04T12:55:00Z
9
value 0.0016
scoring_system epss
scoring_elements 0.36852
published_at 2026-04-07T12:55:00Z
10
value 0.0016
scoring_system epss
scoring_elements 0.36902
published_at 2026-04-08T12:55:00Z
11
value 0.0016
scoring_system epss
scoring_elements 0.36918
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14699
1
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T19:54:26Z/
url https://security.gentoo.org/glsa/202101-09
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html
reference_id msg00068.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T19:54:26Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html
reference_id msg00079.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T19:54:26Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html
4
reference_url https://www.zerodayinitiative.com/advisories/ZDI-20-902/
reference_id ZDI-20-902
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T19:54:26Z/
url https://www.zerodayinitiative.com/advisories/ZDI-20-902/
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.12-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.12-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.12-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2020-14699
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-th8u-azds-w7eg
329
url VCID-tj4t-44dk-x7bt
vulnerability_id VCID-tj4t-44dk-x7bt
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html
reference_id
reference_type
scores
0
value 6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:29Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2743
reference_id
reference_type
scores
0
value 0.00102
scoring_system epss
scoring_elements 0.28016
published_at 2026-04-01T12:55:00Z
1
value 0.00102
scoring_system epss
scoring_elements 0.27926
published_at 2026-04-07T12:55:00Z
2
value 0.00102
scoring_system epss
scoring_elements 0.27993
published_at 2026-04-08T12:55:00Z
3
value 0.00102
scoring_system epss
scoring_elements 0.28034
published_at 2026-04-09T12:55:00Z
4
value 0.00102
scoring_system epss
scoring_elements 0.2804
published_at 2026-04-11T12:55:00Z
5
value 0.00102
scoring_system epss
scoring_elements 0.27998
published_at 2026-04-12T12:55:00Z
6
value 0.00102
scoring_system epss
scoring_elements 0.27939
published_at 2026-04-13T12:55:00Z
7
value 0.00102
scoring_system epss
scoring_elements 0.27949
published_at 2026-04-16T12:55:00Z
8
value 0.00102
scoring_system epss
scoring_elements 0.27932
published_at 2026-04-18T12:55:00Z
9
value 0.00102
scoring_system epss
scoring_elements 0.27885
published_at 2026-04-21T12:55:00Z
10
value 0.00102
scoring_system epss
scoring_elements 0.28088
published_at 2026-04-02T12:55:00Z
11
value 0.00102
scoring_system epss
scoring_elements 0.28131
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2743
2
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:29Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
3
reference_url https://www.zerodayinitiative.com/advisories/ZDI-20-500/
reference_id
reference_type
scores
0
value 6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:29Z/
url https://www.zerodayinitiative.com/advisories/ZDI-20-500/
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2743
reference_id CVE-2020-2743
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:N
1
value 6.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
2
value 6.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2020-2743
7
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value 6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:29Z/
url https://security.gentoo.org/glsa/202101-09
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.2-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.2-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.2-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2020-2743
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tj4t-44dk-x7bt
330
url VCID-tmny-4bf3-vqcp
vulnerability_id VCID-tmny-4bf3-vqcp
summary Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 7.0.24 and prior to 7.1.6. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 5.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-21533
reference_id
reference_type
scores
0
value 0.00078
scoring_system epss
scoring_elements 0.23138
published_at 2026-04-21T12:55:00Z
1
value 0.00078
scoring_system epss
scoring_elements 0.23177
published_at 2026-04-18T12:55:00Z
2
value 0.00078
scoring_system epss
scoring_elements 0.23285
published_at 2026-04-02T12:55:00Z
3
value 0.00078
scoring_system epss
scoring_elements 0.23328
published_at 2026-04-04T12:55:00Z
4
value 0.00078
scoring_system epss
scoring_elements 0.23117
published_at 2026-04-07T12:55:00Z
5
value 0.00078
scoring_system epss
scoring_elements 0.23191
published_at 2026-04-08T12:55:00Z
6
value 0.00078
scoring_system epss
scoring_elements 0.23242
published_at 2026-04-09T12:55:00Z
7
value 0.00078
scoring_system epss
scoring_elements 0.23264
published_at 2026-04-11T12:55:00Z
8
value 0.00078
scoring_system epss
scoring_elements 0.23226
published_at 2026-04-12T12:55:00Z
9
value 0.00078
scoring_system epss
scoring_elements 0.23168
published_at 2026-04-13T12:55:00Z
10
value 0.00078
scoring_system epss
scoring_elements 0.23184
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-21533
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1093879
reference_id 1093879
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1093879
2
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.0.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.0.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.0.24:*:*:*:*:*:*:*
3
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.1.6:*:*:*:*:*:*:*
4
reference_url https://www.oracle.com/security-alerts/cpujan2025.html
reference_id cpujan2025.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-22T18:28:32Z/
url https://www.oracle.com/security-alerts/cpujan2025.html
fixed_packages
0
url pkg:deb/debian/virtualbox@7.0.26-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.0.26-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.0.26-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2025-21533
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tmny-4bf3-vqcp
331
url VCID-tmt2-zsug-n3bq
vulnerability_id VCID-tmt2-zsug-n3bq
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0495
reference_id
reference_type
scores
0
value 0.01001
scoring_system epss
scoring_elements 0.77026
published_at 2026-04-21T12:55:00Z
1
value 0.01001
scoring_system epss
scoring_elements 0.76927
published_at 2026-04-01T12:55:00Z
2
value 0.01001
scoring_system epss
scoring_elements 0.76933
published_at 2026-04-02T12:55:00Z
3
value 0.01001
scoring_system epss
scoring_elements 0.76963
published_at 2026-04-04T12:55:00Z
4
value 0.01001
scoring_system epss
scoring_elements 0.76945
published_at 2026-04-07T12:55:00Z
5
value 0.01001
scoring_system epss
scoring_elements 0.76977
published_at 2026-04-08T12:55:00Z
6
value 0.01001
scoring_system epss
scoring_elements 0.76988
published_at 2026-04-09T12:55:00Z
7
value 0.01001
scoring_system epss
scoring_elements 0.77015
published_at 2026-04-11T12:55:00Z
8
value 0.01001
scoring_system epss
scoring_elements 0.76994
published_at 2026-04-12T12:55:00Z
9
value 0.01001
scoring_system epss
scoring_elements 0.76989
published_at 2026-04-13T12:55:00Z
10
value 0.01001
scoring_system epss
scoring_elements 0.7703
published_at 2026-04-16T12:55:00Z
11
value 0.01001
scoring_system epss
scoring_elements 0.77033
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0495
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5307
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8104
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8104
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0495
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0495
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0592
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0592
5
reference_url http://www.debian.org/security/2016/dsa-3454
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3454
6
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
7
reference_url http://www.securityfocus.com/bid/81214
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/81214
8
reference_url http://www.securitytracker.com/id/1034731
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034731
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0495
reference_id CVE-2016-0495
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2016-0495
fixed_packages
0
url pkg:deb/debian/virtualbox@5.0.14-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.0.14-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.0.14-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2016-0495
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tmt2-zsug-n3bq
332
url VCID-ttey-8sw1-e7av
vulnerability_id VCID-ttey-8sw1-e7av
summary Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 6.1.44 and Prior to 7.0.8. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22002
reference_id
reference_type
scores
0
value 0.00076
scoring_system epss
scoring_elements 0.22848
published_at 2026-04-02T12:55:00Z
1
value 0.00076
scoring_system epss
scoring_elements 0.22739
published_at 2026-04-13T12:55:00Z
2
value 0.00076
scoring_system epss
scoring_elements 0.22755
published_at 2026-04-16T12:55:00Z
3
value 0.00076
scoring_system epss
scoring_elements 0.2275
published_at 2026-04-18T12:55:00Z
4
value 0.00076
scoring_system epss
scoring_elements 0.22893
published_at 2026-04-04T12:55:00Z
5
value 0.00076
scoring_system epss
scoring_elements 0.22685
published_at 2026-04-07T12:55:00Z
6
value 0.00076
scoring_system epss
scoring_elements 0.2276
published_at 2026-04-08T12:55:00Z
7
value 0.00076
scoring_system epss
scoring_elements 0.22812
published_at 2026-04-09T12:55:00Z
8
value 0.00076
scoring_system epss
scoring_elements 0.22834
published_at 2026-04-11T12:55:00Z
9
value 0.00076
scoring_system epss
scoring_elements 0.22796
published_at 2026-04-12T12:55:00Z
10
value 0.0008
scoring_system epss
scoring_elements 0.23519
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22002
fixed_packages
0
url pkg:deb/debian/virtualbox@7.0.8-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.0.8-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.0.8-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2023-22002
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ttey-8sw1-e7av
333
url VCID-tumg-4rxf-kuf4
vulnerability_id VCID-tumg-4rxf-kuf4
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2694
reference_id
reference_type
scores
0
value 0.00082
scoring_system epss
scoring_elements 0.24125
published_at 2026-04-21T12:55:00Z
1
value 0.00082
scoring_system epss
scoring_elements 0.24301
published_at 2026-04-02T12:55:00Z
2
value 0.00082
scoring_system epss
scoring_elements 0.24162
published_at 2026-04-16T12:55:00Z
3
value 0.00082
scoring_system epss
scoring_elements 0.24148
published_at 2026-04-18T12:55:00Z
4
value 0.00082
scoring_system epss
scoring_elements 0.24172
published_at 2026-04-01T12:55:00Z
5
value 0.00082
scoring_system epss
scoring_elements 0.24335
published_at 2026-04-04T12:55:00Z
6
value 0.00082
scoring_system epss
scoring_elements 0.24121
published_at 2026-04-07T12:55:00Z
7
value 0.00082
scoring_system epss
scoring_elements 0.24187
published_at 2026-04-08T12:55:00Z
8
value 0.00082
scoring_system epss
scoring_elements 0.2423
published_at 2026-04-09T12:55:00Z
9
value 0.00082
scoring_system epss
scoring_elements 0.24246
published_at 2026-04-11T12:55:00Z
10
value 0.00082
scoring_system epss
scoring_elements 0.24204
published_at 2026-04-12T12:55:00Z
11
value 0.00082
scoring_system epss
scoring_elements 0.24147
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2694
1
reference_url http://www.securityfocus.com/bid/102687
reference_id 102687
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:15Z/
url http://www.securityfocus.com/bid/102687
2
reference_url http://www.securitytracker.com/id/1040202
reference_id 1040202
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:15Z/
url http://www.securitytracker.com/id/1040202
3
reference_url https://security.gentoo.org/glsa/201802-01
reference_id GLSA-201802-01
reference_type
scores
url https://security.gentoo.org/glsa/201802-01
fixed_packages
0
url pkg:deb/debian/virtualbox@5.2.6-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.2.6-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.6-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2018-2694
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tumg-4rxf-kuf4
334
url VCID-tvbr-1a2x-vfhn
vulnerability_id VCID-tvbr-1a2x-vfhn
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-3005
reference_id
reference_type
scores
0
value 0.00167
scoring_system epss
scoring_elements 0.3771
published_at 2026-04-01T12:55:00Z
1
value 0.00167
scoring_system epss
scoring_elements 0.37845
published_at 2026-04-08T12:55:00Z
2
value 0.00167
scoring_system epss
scoring_elements 0.37857
published_at 2026-04-16T12:55:00Z
3
value 0.00167
scoring_system epss
scoring_elements 0.37872
published_at 2026-04-11T12:55:00Z
4
value 0.00167
scoring_system epss
scoring_elements 0.37836
published_at 2026-04-12T12:55:00Z
5
value 0.00167
scoring_system epss
scoring_elements 0.37811
published_at 2026-04-13T12:55:00Z
6
value 0.00167
scoring_system epss
scoring_elements 0.37838
published_at 2026-04-18T12:55:00Z
7
value 0.00167
scoring_system epss
scoring_elements 0.37891
published_at 2026-04-02T12:55:00Z
8
value 0.00167
scoring_system epss
scoring_elements 0.37916
published_at 2026-04-04T12:55:00Z
9
value 0.00167
scoring_system epss
scoring_elements 0.37794
published_at 2026-04-07T12:55:00Z
10
value 0.00216
scoring_system epss
scoring_elements 0.4411
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-3005
1
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:22Z/
url http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
2
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
3
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-3005
reference_id CVE-2019-3005
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
1
value 6.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-3005
4
reference_url https://security.gentoo.org/glsa/202004-02
reference_id GLSA-202004-02
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:22Z/
url https://security.gentoo.org/glsa/202004-02
5
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:22Z/
url https://security.gentoo.org/glsa/202101-09
fixed_packages
0
url pkg:deb/debian/virtualbox@6.0.14-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.0.14-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.0.14-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2019-3005
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tvbr-1a2x-vfhn
335
url VCID-tw27-8dua-m3h2
vulnerability_id VCID-tw27-8dua-m3h2
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.1.24. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox as well as unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 7.3 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10233
reference_id
reference_type
scores
0
value 0.00073
scoring_system epss
scoring_elements 0.22021
published_at 2026-04-21T12:55:00Z
1
value 0.00073
scoring_system epss
scoring_elements 0.22189
published_at 2026-04-02T12:55:00Z
2
value 0.00073
scoring_system epss
scoring_elements 0.22074
published_at 2026-04-16T12:55:00Z
3
value 0.00073
scoring_system epss
scoring_elements 0.22067
published_at 2026-04-18T12:55:00Z
4
value 0.00073
scoring_system epss
scoring_elements 0.22031
published_at 2026-04-01T12:55:00Z
5
value 0.00073
scoring_system epss
scoring_elements 0.22237
published_at 2026-04-04T12:55:00Z
6
value 0.00073
scoring_system epss
scoring_elements 0.2202
published_at 2026-04-07T12:55:00Z
7
value 0.00073
scoring_system epss
scoring_elements 0.221
published_at 2026-04-08T12:55:00Z
8
value 0.00073
scoring_system epss
scoring_elements 0.22155
published_at 2026-04-09T12:55:00Z
9
value 0.00073
scoring_system epss
scoring_elements 0.22175
published_at 2026-04-11T12:55:00Z
10
value 0.00073
scoring_system epss
scoring_elements 0.22134
published_at 2026-04-12T12:55:00Z
11
value 0.00073
scoring_system epss
scoring_elements 0.22075
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10233
1
reference_url http://www.securitytracker.com/id/1038929
reference_id 1038929
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:49:16Z/
url http://www.securitytracker.com/id/1038929
2
reference_url http://www.securityfocus.com/bid/99642
reference_id 99642
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:49:16Z/
url http://www.securityfocus.com/bid/99642
fixed_packages
0
url pkg:deb/debian/virtualbox@5.1.24-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.1.24-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.1.24-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2017-10233
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tw27-8dua-m3h2
336
url VCID-tztw-eec3-6kaz
vulnerability_id VCID-tztw-eec3-6kaz
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could result in privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14892
reference_id
reference_type
scores
0
value 0.00057
scoring_system epss
scoring_elements 0.1788
published_at 2026-04-01T12:55:00Z
1
value 0.00057
scoring_system epss
scoring_elements 0.1804
published_at 2026-04-02T12:55:00Z
2
value 0.00057
scoring_system epss
scoring_elements 0.18095
published_at 2026-04-04T12:55:00Z
3
value 0.00057
scoring_system epss
scoring_elements 0.17797
published_at 2026-04-07T12:55:00Z
4
value 0.00057
scoring_system epss
scoring_elements 0.17884
published_at 2026-04-08T12:55:00Z
5
value 0.00057
scoring_system epss
scoring_elements 0.17944
published_at 2026-04-09T12:55:00Z
6
value 0.00057
scoring_system epss
scoring_elements 0.17961
published_at 2026-04-11T12:55:00Z
7
value 0.00057
scoring_system epss
scoring_elements 0.17916
published_at 2026-04-12T12:55:00Z
8
value 0.00057
scoring_system epss
scoring_elements 0.17867
published_at 2026-04-13T12:55:00Z
9
value 0.00057
scoring_system epss
scoring_elements 0.17809
published_at 2026-04-16T12:55:00Z
10
value 0.00057
scoring_system epss
scoring_elements 0.17819
published_at 2026-04-18T12:55:00Z
11
value 0.00057
scoring_system epss
scoring_elements 0.17856
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14892
1
reference_url https://security.gentoo.org/glsa/202101-15
reference_id GLSA-202101-15
reference_type
scores
url https://security.gentoo.org/glsa/202101-15
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.16-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.16-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.16-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2020-14892
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tztw-eec3-6kaz
337
url VCID-u1n4-8wg1-cfea
vulnerability_id VCID-u1n4-8wg1-cfea
summary Multiple vulnerabilities have been discovered in Oracle Virtualbox, the worst of which could result in root privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2284
reference_id
reference_type
scores
0
value 0.00169
scoring_system epss
scoring_elements 0.38081
published_at 2026-04-21T12:55:00Z
1
value 0.00169
scoring_system epss
scoring_elements 0.38143
published_at 2026-04-12T12:55:00Z
2
value 0.00169
scoring_system epss
scoring_elements 0.38119
published_at 2026-04-13T12:55:00Z
3
value 0.00169
scoring_system epss
scoring_elements 0.38165
published_at 2026-04-16T12:55:00Z
4
value 0.00169
scoring_system epss
scoring_elements 0.38146
published_at 2026-04-18T12:55:00Z
5
value 0.00169
scoring_system epss
scoring_elements 0.3803
published_at 2026-04-01T12:55:00Z
6
value 0.00169
scoring_system epss
scoring_elements 0.3821
published_at 2026-04-02T12:55:00Z
7
value 0.00169
scoring_system epss
scoring_elements 0.38233
published_at 2026-04-04T12:55:00Z
8
value 0.00169
scoring_system epss
scoring_elements 0.38103
published_at 2026-04-07T12:55:00Z
9
value 0.00169
scoring_system epss
scoring_elements 0.38153
published_at 2026-04-08T12:55:00Z
10
value 0.00169
scoring_system epss
scoring_elements 0.38161
published_at 2026-04-09T12:55:00Z
11
value 0.00169
scoring_system epss
scoring_elements 0.38179
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2284
1
reference_url https://security.archlinux.org/ASA-202104-9
reference_id ASA-202104-9
reference_type
scores
url https://security.archlinux.org/ASA-202104-9
2
reference_url https://security.archlinux.org/AVG-1846
reference_id AVG-1846
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1846
3
reference_url https://security.gentoo.org/glsa/202208-36
reference_id GLSA-202208-36
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:42:39Z/
url https://security.gentoo.org/glsa/202208-36
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.20-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.20-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.20-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2021-2284
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u1n4-8wg1-cfea
338
url VCID-u558-4xcy-u3e8
vulnerability_id VCID-u558-4xcy-u3e8
summary Multiple vulnerabilities have been discovered in VirtualBox, leading to compomise of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21885
reference_id
reference_type
scores
0
value 0.00073
scoring_system epss
scoring_elements 0.2219
published_at 2026-04-21T12:55:00Z
1
value 0.00073
scoring_system epss
scoring_elements 0.22239
published_at 2026-04-13T12:55:00Z
2
value 0.00073
scoring_system epss
scoring_elements 0.22243
published_at 2026-04-16T12:55:00Z
3
value 0.00073
scoring_system epss
scoring_elements 0.22237
published_at 2026-04-18T12:55:00Z
4
value 0.00073
scoring_system epss
scoring_elements 0.22352
published_at 2026-04-02T12:55:00Z
5
value 0.00073
scoring_system epss
scoring_elements 0.22397
published_at 2026-04-04T12:55:00Z
6
value 0.00073
scoring_system epss
scoring_elements 0.22181
published_at 2026-04-07T12:55:00Z
7
value 0.00073
scoring_system epss
scoring_elements 0.22264
published_at 2026-04-08T12:55:00Z
8
value 0.00073
scoring_system epss
scoring_elements 0.22318
published_at 2026-04-09T12:55:00Z
9
value 0.00073
scoring_system epss
scoring_elements 0.22339
published_at 2026-04-11T12:55:00Z
10
value 0.00073
scoring_system epss
scoring_elements 0.22298
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21885
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029153
reference_id 1029153
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029153
2
reference_url https://security.gentoo.org/glsa/202310-07
reference_id GLSA-202310-07
reference_type
scores
0
value 3.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T14:03:12Z/
url https://security.gentoo.org/glsa/202310-07
fixed_packages
0
url pkg:deb/debian/virtualbox@7.0.6-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.0.6-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.0.6-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2023-21885
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u558-4xcy-u3e8
339
url VCID-u7nr-m2yz-rqg6
vulnerability_id VCID-u7nr-m2yz-rqg6
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2705
reference_id
reference_type
scores
0
value 0.00123
scoring_system epss
scoring_elements 0.31474
published_at 2026-04-21T12:55:00Z
1
value 0.00123
scoring_system epss
scoring_elements 0.31623
published_at 2026-04-02T12:55:00Z
2
value 0.00123
scoring_system epss
scoring_elements 0.31573
published_at 2026-04-11T12:55:00Z
3
value 0.00123
scoring_system epss
scoring_elements 0.31531
published_at 2026-04-12T12:55:00Z
4
value 0.00123
scoring_system epss
scoring_elements 0.31494
published_at 2026-04-13T12:55:00Z
5
value 0.00123
scoring_system epss
scoring_elements 0.31527
published_at 2026-04-16T12:55:00Z
6
value 0.00123
scoring_system epss
scoring_elements 0.31505
published_at 2026-04-18T12:55:00Z
7
value 0.00123
scoring_system epss
scoring_elements 0.31486
published_at 2026-04-01T12:55:00Z
8
value 0.00123
scoring_system epss
scoring_elements 0.31668
published_at 2026-04-04T12:55:00Z
9
value 0.00123
scoring_system epss
scoring_elements 0.31487
published_at 2026-04-07T12:55:00Z
10
value 0.00123
scoring_system epss
scoring_elements 0.31539
published_at 2026-04-08T12:55:00Z
11
value 0.00123
scoring_system epss
scoring_elements 0.31569
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2705
1
reference_url https://security.gentoo.org/glsa/202004-02
reference_id GLSA-202004-02
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:01:30Z/
url https://security.gentoo.org/glsa/202004-02
2
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:01:30Z/
url https://security.gentoo.org/glsa/202101-09
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.2-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.2-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.2-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2020-2705
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u7nr-m2yz-rqg6
340
url VCID-u7zj-kgmx-gbch
vulnerability_id VCID-u7zj-kgmx-gbch
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2830
reference_id
reference_type
scores
0
value 0.00135
scoring_system epss
scoring_elements 0.33171
published_at 2026-04-21T12:55:00Z
1
value 0.00135
scoring_system epss
scoring_elements 0.33253
published_at 2026-04-11T12:55:00Z
2
value 0.00135
scoring_system epss
scoring_elements 0.33213
published_at 2026-04-12T12:55:00Z
3
value 0.00135
scoring_system epss
scoring_elements 0.33189
published_at 2026-04-13T12:55:00Z
4
value 0.00135
scoring_system epss
scoring_elements 0.33229
published_at 2026-04-16T12:55:00Z
5
value 0.00135
scoring_system epss
scoring_elements 0.33207
published_at 2026-04-18T12:55:00Z
6
value 0.00135
scoring_system epss
scoring_elements 0.3318
published_at 2026-04-01T12:55:00Z
7
value 0.00135
scoring_system epss
scoring_elements 0.33307
published_at 2026-04-02T12:55:00Z
8
value 0.00135
scoring_system epss
scoring_elements 0.3334
published_at 2026-04-04T12:55:00Z
9
value 0.00135
scoring_system epss
scoring_elements 0.33173
published_at 2026-04-07T12:55:00Z
10
value 0.00135
scoring_system epss
scoring_elements 0.33216
published_at 2026-04-08T12:55:00Z
11
value 0.00135
scoring_system epss
scoring_elements 0.33249
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2830
1
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:49Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
2
reference_url http://www.securityfocus.com/bid/103856
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:49Z/
url http://www.securityfocus.com/bid/103856
3
reference_url http://www.securitytracker.com/id/1040707
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:49Z/
url http://www.securitytracker.com/id/1040707
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-2830
reference_id CVE-2018-2830
reference_type
scores
0
value 4.4
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:P/A:P
1
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-2830
6
reference_url https://security.gentoo.org/glsa/201805-08
reference_id GLSA-201805-08
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:49Z/
url https://security.gentoo.org/glsa/201805-08
fixed_packages
0
url pkg:deb/debian/virtualbox@5.2.10-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.2.10-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.10-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2018-2830
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u7zj-kgmx-gbch
341
url VCID-u8r5-ru5x-e7fp
vulnerability_id VCID-u8r5-ru5x-e7fp
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2698
reference_id
reference_type
scores
0
value 0.00167
scoring_system epss
scoring_elements 0.3781
published_at 2026-04-21T12:55:00Z
1
value 0.00167
scoring_system epss
scoring_elements 0.37926
published_at 2026-04-02T12:55:00Z
2
value 0.00167
scoring_system epss
scoring_elements 0.37907
published_at 2026-04-11T12:55:00Z
3
value 0.00167
scoring_system epss
scoring_elements 0.37871
published_at 2026-04-12T12:55:00Z
4
value 0.00167
scoring_system epss
scoring_elements 0.37846
published_at 2026-04-13T12:55:00Z
5
value 0.00167
scoring_system epss
scoring_elements 0.37893
published_at 2026-04-16T12:55:00Z
6
value 0.00167
scoring_system epss
scoring_elements 0.37873
published_at 2026-04-18T12:55:00Z
7
value 0.00167
scoring_system epss
scoring_elements 0.37743
published_at 2026-04-01T12:55:00Z
8
value 0.00167
scoring_system epss
scoring_elements 0.37951
published_at 2026-04-04T12:55:00Z
9
value 0.00167
scoring_system epss
scoring_elements 0.37829
published_at 2026-04-07T12:55:00Z
10
value 0.00167
scoring_system epss
scoring_elements 0.37879
published_at 2026-04-08T12:55:00Z
11
value 0.00167
scoring_system epss
scoring_elements 0.37892
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2698
1
reference_url https://security.gentoo.org/glsa/202004-02
reference_id GLSA-202004-02
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:41:58Z/
url https://security.gentoo.org/glsa/202004-02
2
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:41:58Z/
url https://security.gentoo.org/glsa/202101-09
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.2-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.2-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.2-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2020-2698
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u8r5-ru5x-e7fp
342
url VCID-ucb5-szgt-n3de
vulnerability_id VCID-ucb5-szgt-n3de
summary Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization VirtualBox before 5.0.18 allows local users to affect confidentiality, integrity, and availability via vectors related to Core.
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2016-05/msg00130.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:46Z/
url http://lists.opensuse.org/opensuse-updates/2016-05/msg00130.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2016-06/msg00002.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:46Z/
url http://lists.opensuse.org/opensuse-updates/2016-06/msg00002.html
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0678
reference_id
reference_type
scores
0
value 0.00112
scoring_system epss
scoring_elements 0.29555
published_at 2026-04-21T12:55:00Z
1
value 0.00112
scoring_system epss
scoring_elements 0.29606
published_at 2026-04-13T12:55:00Z
2
value 0.00112
scoring_system epss
scoring_elements 0.29625
published_at 2026-04-16T12:55:00Z
3
value 0.00112
scoring_system epss
scoring_elements 0.29601
published_at 2026-04-18T12:55:00Z
4
value 0.00112
scoring_system epss
scoring_elements 0.29666
published_at 2026-04-01T12:55:00Z
5
value 0.00112
scoring_system epss
scoring_elements 0.29734
published_at 2026-04-02T12:55:00Z
6
value 0.00112
scoring_system epss
scoring_elements 0.2978
published_at 2026-04-04T12:55:00Z
7
value 0.00112
scoring_system epss
scoring_elements 0.29599
published_at 2026-04-07T12:55:00Z
8
value 0.00112
scoring_system epss
scoring_elements 0.29662
published_at 2026-04-08T12:55:00Z
9
value 0.00112
scoring_system epss
scoring_elements 0.29699
published_at 2026-04-09T12:55:00Z
10
value 0.00112
scoring_system epss
scoring_elements 0.29701
published_at 2026-04-11T12:55:00Z
11
value 0.00112
scoring_system epss
scoring_elements 0.29657
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0678
3
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:46Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
4
reference_url http://www.securitytracker.com/id/1035607
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:46Z/
url http://www.securitytracker.com/id/1035607
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:5.0.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:5.0.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:5.0.18:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0678
reference_id CVE-2016-0678
reference_type
scores
0
value 4.1
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:S/C:P/I:P/A:P
1
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-0678
fixed_packages
0
url pkg:deb/debian/virtualbox@5.0.18-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.0.18-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.0.18-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2016-0678
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ucb5-szgt-n3de
343
url VCID-uga2-91s8-ufck
vulnerability_id VCID-uga2-91s8-ufck
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could result in privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14889
reference_id
reference_type
scores
0
value 0.00054
scoring_system epss
scoring_elements 0.16852
published_at 2026-04-21T12:55:00Z
1
value 0.00054
scoring_system epss
scoring_elements 0.17031
published_at 2026-04-02T12:55:00Z
2
value 0.00054
scoring_system epss
scoring_elements 0.16884
published_at 2026-04-13T12:55:00Z
3
value 0.00054
scoring_system epss
scoring_elements 0.1682
published_at 2026-04-16T12:55:00Z
4
value 0.00054
scoring_system epss
scoring_elements 0.16822
published_at 2026-04-18T12:55:00Z
5
value 0.00054
scoring_system epss
scoring_elements 0.16864
published_at 2026-04-01T12:55:00Z
6
value 0.00054
scoring_system epss
scoring_elements 0.17085
published_at 2026-04-04T12:55:00Z
7
value 0.00054
scoring_system epss
scoring_elements 0.16867
published_at 2026-04-07T12:55:00Z
8
value 0.00054
scoring_system epss
scoring_elements 0.16956
published_at 2026-04-08T12:55:00Z
9
value 0.00054
scoring_system epss
scoring_elements 0.17013
published_at 2026-04-09T12:55:00Z
10
value 0.00054
scoring_system epss
scoring_elements 0.16988
published_at 2026-04-11T12:55:00Z
11
value 0.00054
scoring_system epss
scoring_elements 0.16943
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14889
1
reference_url https://security.gentoo.org/glsa/202101-15
reference_id GLSA-202101-15
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:42:55Z/
url https://security.gentoo.org/glsa/202101-15
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.16-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.16-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.16-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2020-14889
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uga2-91s8-ufck
344
url VCID-uk8u-t1km-zqd6
vulnerability_id VCID-uk8u-t1km-zqd6
summary core: From CVEorg collector
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21263.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21263.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21263
reference_id
reference_type
scores
0
value 0.00079
scoring_system epss
scoring_elements 0.23376
published_at 2026-04-21T12:55:00Z
1
value 0.00079
scoring_system epss
scoring_elements 0.234
published_at 2026-04-16T12:55:00Z
2
value 0.00079
scoring_system epss
scoring_elements 0.23395
published_at 2026-04-18T12:55:00Z
3
value 0.00079
scoring_system epss
scoring_elements 0.23513
published_at 2026-04-02T12:55:00Z
4
value 0.00079
scoring_system epss
scoring_elements 0.23549
published_at 2026-04-04T12:55:00Z
5
value 0.00079
scoring_system epss
scoring_elements 0.23333
published_at 2026-04-07T12:55:00Z
6
value 0.00079
scoring_system epss
scoring_elements 0.23406
published_at 2026-04-08T12:55:00Z
7
value 0.00079
scoring_system epss
scoring_elements 0.23456
published_at 2026-04-09T12:55:00Z
8
value 0.00079
scoring_system epss
scoring_elements 0.23476
published_at 2026-04-11T12:55:00Z
9
value 0.00079
scoring_system epss
scoring_elements 0.23437
published_at 2026-04-12T12:55:00Z
10
value 0.00079
scoring_system epss
scoring_elements 0.23382
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21263
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085440
reference_id 1085440
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085440
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2318920
reference_id 2318920
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2318920
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.0.22:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.1.2:*:*:*:*:*:*:*
fixed_packages
0
url pkg:deb/debian/virtualbox@7.0.26-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.0.26-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.0.26-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2024-21263
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uk8u-t1km-zqd6
345
url VCID-upn9-pff4-ukg4
vulnerability_id VCID-upn9-pff4-ukg4
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html
reference_id
reference_type
scores
0
value 3.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:18Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2748
reference_id
reference_type
scores
0
value 0.00071
scoring_system epss
scoring_elements 0.21611
published_at 2026-04-01T12:55:00Z
1
value 0.00071
scoring_system epss
scoring_elements 0.21591
published_at 2026-04-07T12:55:00Z
2
value 0.00071
scoring_system epss
scoring_elements 0.21667
published_at 2026-04-08T12:55:00Z
3
value 0.00071
scoring_system epss
scoring_elements 0.21725
published_at 2026-04-09T12:55:00Z
4
value 0.00071
scoring_system epss
scoring_elements 0.21736
published_at 2026-04-11T12:55:00Z
5
value 0.00071
scoring_system epss
scoring_elements 0.21696
published_at 2026-04-12T12:55:00Z
6
value 0.00071
scoring_system epss
scoring_elements 0.21639
published_at 2026-04-13T12:55:00Z
7
value 0.00071
scoring_system epss
scoring_elements 0.21638
published_at 2026-04-16T12:55:00Z
8
value 0.00071
scoring_system epss
scoring_elements 0.21645
published_at 2026-04-18T12:55:00Z
9
value 0.00071
scoring_system epss
scoring_elements 0.21613
published_at 2026-04-21T12:55:00Z
10
value 0.00071
scoring_system epss
scoring_elements 0.21785
published_at 2026-04-02T12:55:00Z
11
value 0.00071
scoring_system epss
scoring_elements 0.21838
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2748
2
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 3.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:18Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
3
reference_url https://www.zerodayinitiative.com/advisories/ZDI-20-506/
reference_id
reference_type
scores
0
value 3.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:18Z/
url https://www.zerodayinitiative.com/advisories/ZDI-20-506/
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2748
reference_id CVE-2020-2748
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:N
1
value 3.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N
2
value 3.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2020-2748
7
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value 3.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:18Z/
url https://security.gentoo.org/glsa/202101-09
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.6-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.6-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.6-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2020-2748
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-upn9-pff4-ukg4
346
url VCID-urn6-pugx-pudm
vulnerability_id VCID-urn6-pugx-pudm
summary Multiple vulnerabilities have been discovered in Oracle Virtualbox, the worst of which could result in root privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2442
reference_id
reference_type
scores
0
value 0.00105
scoring_system epss
scoring_elements 0.28482
published_at 2026-04-21T12:55:00Z
1
value 0.00105
scoring_system epss
scoring_elements 0.28583
published_at 2026-04-12T12:55:00Z
2
value 0.00105
scoring_system epss
scoring_elements 0.28535
published_at 2026-04-13T12:55:00Z
3
value 0.00105
scoring_system epss
scoring_elements 0.28555
published_at 2026-04-16T12:55:00Z
4
value 0.00105
scoring_system epss
scoring_elements 0.2853
published_at 2026-04-18T12:55:00Z
5
value 0.00105
scoring_system epss
scoring_elements 0.28581
published_at 2026-04-01T12:55:00Z
6
value 0.00105
scoring_system epss
scoring_elements 0.28668
published_at 2026-04-02T12:55:00Z
7
value 0.00105
scoring_system epss
scoring_elements 0.28713
published_at 2026-04-04T12:55:00Z
8
value 0.00105
scoring_system epss
scoring_elements 0.28519
published_at 2026-04-07T12:55:00Z
9
value 0.00105
scoring_system epss
scoring_elements 0.28584
published_at 2026-04-08T12:55:00Z
10
value 0.00105
scoring_system epss
scoring_elements 0.28624
published_at 2026-04-09T12:55:00Z
11
value 0.00105
scoring_system epss
scoring_elements 0.28627
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2442
1
reference_url https://security.archlinux.org/ASA-202107-52
reference_id ASA-202107-52
reference_type
scores
url https://security.archlinux.org/ASA-202107-52
2
reference_url https://security.archlinux.org/AVG-2187
reference_id AVG-2187
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2187
3
reference_url https://security.gentoo.org/glsa/202208-36
reference_id GLSA-202208-36
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:26Z/
url https://security.gentoo.org/glsa/202208-36
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.26-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.26-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.26-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2021-2442
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-urn6-pugx-pudm
347
url VCID-urqu-t1ke-j3aw
vulnerability_id VCID-urqu-t1ke-j3aw
summary Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is 7.1.10. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-53025
reference_id
reference_type
scores
0
value 0.0003
scoring_system epss
scoring_elements 0.08673
published_at 2026-04-21T12:55:00Z
1
value 0.0003
scoring_system epss
scoring_elements 0.08521
published_at 2026-04-18T12:55:00Z
2
value 0.0003
scoring_system epss
scoring_elements 0.08423
published_at 2026-04-02T12:55:00Z
3
value 0.0003
scoring_system epss
scoring_elements 0.08477
published_at 2026-04-04T12:55:00Z
4
value 0.0003
scoring_system epss
scoring_elements 0.08396
published_at 2026-04-07T12:55:00Z
5
value 0.0003
scoring_system epss
scoring_elements 0.08468
published_at 2026-04-08T12:55:00Z
6
value 0.0003
scoring_system epss
scoring_elements 0.08487
published_at 2026-04-09T12:55:00Z
7
value 0.0003
scoring_system epss
scoring_elements 0.0868
published_at 2026-04-11T12:55:00Z
8
value 0.0003
scoring_system epss
scoring_elements 0.08657
published_at 2026-04-12T12:55:00Z
9
value 0.0003
scoring_system epss
scoring_elements 0.08644
published_at 2026-04-13T12:55:00Z
10
value 0.0003
scoring_system epss
scoring_elements 0.08534
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-53025
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109373
reference_id 1109373
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109373
2
reference_url https://www.oracle.com/security-alerts/cpujul2025.html
reference_id cpujul2025.html
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-15T20:01:06Z/
url https://www.oracle.com/security-alerts/cpujul2025.html
fixed_packages
0
url pkg:deb/debian/virtualbox@7.1.12-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.1.12-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.1.12-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2025-53025
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-urqu-t1ke-j3aw
348
url VCID-uvp9-fefd-9kgq
vulnerability_id VCID-uvp9-fefd-9kgq
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14715
reference_id
reference_type
scores
0
value 0.00094
scoring_system epss
scoring_elements 0.26064
published_at 2026-04-21T12:55:00Z
1
value 0.00094
scoring_system epss
scoring_elements 0.26287
published_at 2026-04-02T12:55:00Z
2
value 0.00094
scoring_system epss
scoring_elements 0.26119
published_at 2026-04-13T12:55:00Z
3
value 0.00094
scoring_system epss
scoring_elements 0.26124
published_at 2026-04-16T12:55:00Z
4
value 0.00094
scoring_system epss
scoring_elements 0.26102
published_at 2026-04-18T12:55:00Z
5
value 0.00094
scoring_system epss
scoring_elements 0.26207
published_at 2026-04-01T12:55:00Z
6
value 0.00094
scoring_system epss
scoring_elements 0.26328
published_at 2026-04-04T12:55:00Z
7
value 0.00094
scoring_system epss
scoring_elements 0.261
published_at 2026-04-07T12:55:00Z
8
value 0.00094
scoring_system epss
scoring_elements 0.26167
published_at 2026-04-08T12:55:00Z
9
value 0.00094
scoring_system epss
scoring_elements 0.26215
published_at 2026-04-09T12:55:00Z
10
value 0.00094
scoring_system epss
scoring_elements 0.26224
published_at 2026-04-11T12:55:00Z
11
value 0.00094
scoring_system epss
scoring_elements 0.26178
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14715
1
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:08Z/
url https://security.gentoo.org/glsa/202101-09
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html
reference_id msg00068.html
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:08Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html
reference_id msg00079.html
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:46:08Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.12-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.12-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.12-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2020-14715
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uvp9-fefd-9kgq
349
url VCID-uvz8-g6m2-6yd4
vulnerability_id VCID-uvz8-g6m2-6yd4
summary Multiple vulnerabilities have been discovered in Oracle Virtualbox, the worst of which could result in root privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2409
reference_id
reference_type
scores
0
value 0.00081
scoring_system epss
scoring_elements 0.238
published_at 2026-04-21T12:55:00Z
1
value 0.00081
scoring_system epss
scoring_elements 0.23854
published_at 2026-04-08T12:55:00Z
2
value 0.00081
scoring_system epss
scoring_elements 0.239
published_at 2026-04-09T12:55:00Z
3
value 0.00081
scoring_system epss
scoring_elements 0.23917
published_at 2026-04-11T12:55:00Z
4
value 0.00081
scoring_system epss
scoring_elements 0.23873
published_at 2026-04-12T12:55:00Z
5
value 0.00081
scoring_system epss
scoring_elements 0.23819
published_at 2026-04-18T12:55:00Z
6
value 0.00081
scoring_system epss
scoring_elements 0.2383
published_at 2026-04-16T12:55:00Z
7
value 0.00081
scoring_system epss
scoring_elements 0.23845
published_at 2026-04-01T12:55:00Z
8
value 0.00081
scoring_system epss
scoring_elements 0.23965
published_at 2026-04-02T12:55:00Z
9
value 0.00081
scoring_system epss
scoring_elements 0.24002
published_at 2026-04-04T12:55:00Z
10
value 0.00081
scoring_system epss
scoring_elements 0.23788
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2409
1
reference_url https://security.archlinux.org/ASA-202107-52
reference_id ASA-202107-52
reference_type
scores
url https://security.archlinux.org/ASA-202107-52
2
reference_url https://security.archlinux.org/AVG-2187
reference_id AVG-2187
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2187
3
reference_url https://security.gentoo.org/glsa/202208-36
reference_id GLSA-202208-36
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T13:58:09Z/
url https://security.gentoo.org/glsa/202208-36
4
reference_url https://www.zerodayinitiative.com/advisories/ZDI-21-888/
reference_id ZDI-21-888
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T13:58:09Z/
url https://www.zerodayinitiative.com/advisories/ZDI-21-888/
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.26-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.26-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.26-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2021-2409
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uvz8-g6m2-6yd4
350
url VCID-v1gj-3p1p-1yep
vulnerability_id VCID-v1gj-3p1p-1yep
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2850
reference_id
reference_type
scores
0
value 0.00206
scoring_system epss
scoring_elements 0.42716
published_at 2026-04-02T12:55:00Z
1
value 0.00206
scoring_system epss
scoring_elements 0.42705
published_at 2026-04-21T12:55:00Z
2
value 0.00206
scoring_system epss
scoring_elements 0.42767
published_at 2026-04-18T12:55:00Z
3
value 0.00206
scoring_system epss
scoring_elements 0.42646
published_at 2026-04-01T12:55:00Z
4
value 0.00206
scoring_system epss
scoring_elements 0.42744
published_at 2026-04-04T12:55:00Z
5
value 0.00206
scoring_system epss
scoring_elements 0.42684
published_at 2026-04-07T12:55:00Z
6
value 0.00206
scoring_system epss
scoring_elements 0.42735
published_at 2026-04-12T12:55:00Z
7
value 0.00206
scoring_system epss
scoring_elements 0.42748
published_at 2026-04-09T12:55:00Z
8
value 0.00206
scoring_system epss
scoring_elements 0.4277
published_at 2026-04-11T12:55:00Z
9
value 0.00206
scoring_system epss
scoring_elements 0.42718
published_at 2026-04-13T12:55:00Z
10
value 0.00206
scoring_system epss
scoring_elements 0.42779
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2850
1
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
reference_id cpujul2019-5072835.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:16:13Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
2
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:16:13Z/
url https://security.gentoo.org/glsa/202101-09
fixed_packages
0
url pkg:deb/debian/virtualbox@6.0.10-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.0.10-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.0.10-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2019-2850
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v1gj-3p1p-1yep
351
url VCID-v1k2-6k5x-hqgb
vulnerability_id VCID-v1k2-6k5x-hqgb
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.16. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-3089
reference_id
reference_type
scores
0
value 0.0045
scoring_system epss
scoring_elements 0.63669
published_at 2026-04-21T12:55:00Z
1
value 0.0045
scoring_system epss
scoring_elements 0.63687
published_at 2026-04-11T12:55:00Z
2
value 0.0045
scoring_system epss
scoring_elements 0.63639
published_at 2026-04-13T12:55:00Z
3
value 0.0045
scoring_system epss
scoring_elements 0.63676
published_at 2026-04-16T12:55:00Z
4
value 0.0045
scoring_system epss
scoring_elements 0.63686
published_at 2026-04-18T12:55:00Z
5
value 0.0045
scoring_system epss
scoring_elements 0.63559
published_at 2026-04-01T12:55:00Z
6
value 0.0045
scoring_system epss
scoring_elements 0.63619
published_at 2026-04-02T12:55:00Z
7
value 0.0045
scoring_system epss
scoring_elements 0.63645
published_at 2026-04-04T12:55:00Z
8
value 0.0045
scoring_system epss
scoring_elements 0.63604
published_at 2026-04-07T12:55:00Z
9
value 0.0045
scoring_system epss
scoring_elements 0.63656
published_at 2026-04-08T12:55:00Z
10
value 0.0045
scoring_system epss
scoring_elements 0.63672
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-3089
1
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:24Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
2
reference_url http://www.securityfocus.com/bid/104764
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:24Z/
url http://www.securityfocus.com/bid/104764
3
reference_url http://www.securitytracker.com/id/1041296
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:24Z/
url http://www.securitytracker.com/id/1041296
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-3089
reference_id CVE-2018-3089
reference_type
scores
0
value 4.4
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:P/A:P
1
value 8.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-3089
fixed_packages
0
url pkg:deb/debian/virtualbox@5.2.16-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.2.16-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.16-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2018-3089
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v1k2-6k5x-hqgb
352
url VCID-v418-2cz8-eyby
vulnerability_id VCID-v418-2cz8-eyby
summary Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization VirtualBox before 3.2.24, 4.0.26, 4.1.34, 4.2.26, and 4.3.12 allows local users to affect confidentiality via unknown vectors related to Core.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-2488
reference_id
reference_type
scores
0
value 0.00121
scoring_system epss
scoring_elements 0.31006
published_at 2026-04-21T12:55:00Z
1
value 0.00121
scoring_system epss
scoring_elements 0.31031
published_at 2026-04-01T12:55:00Z
2
value 0.00121
scoring_system epss
scoring_elements 0.31156
published_at 2026-04-02T12:55:00Z
3
value 0.00121
scoring_system epss
scoring_elements 0.31203
published_at 2026-04-04T12:55:00Z
4
value 0.00121
scoring_system epss
scoring_elements 0.31022
published_at 2026-04-07T12:55:00Z
5
value 0.00121
scoring_system epss
scoring_elements 0.31078
published_at 2026-04-08T12:55:00Z
6
value 0.00121
scoring_system epss
scoring_elements 0.31107
published_at 2026-04-09T12:55:00Z
7
value 0.00121
scoring_system epss
scoring_elements 0.31114
published_at 2026-04-11T12:55:00Z
8
value 0.00121
scoring_system epss
scoring_elements 0.3107
published_at 2026-04-12T12:55:00Z
9
value 0.00121
scoring_system epss
scoring_elements 0.31025
published_at 2026-04-13T12:55:00Z
10
value 0.00121
scoring_system epss
scoring_elements 0.31057
published_at 2026-04-16T12:55:00Z
11
value 0.00121
scoring_system epss
scoring_elements 0.31038
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-2488
1
reference_url http://seclists.org/fulldisclosure/2014/Dec/23
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2014/Dec/23
2
reference_url http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
3
reference_url http://www.securityfocus.com/archive/1/534161/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/534161/100/0/threaded
4
reference_url http://www.vmware.com/security/advisories/VMSA-2014-0012.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2014-0012.html
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=754939
reference_id 754939
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=754939
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:3.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.0:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:3.2.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.10:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:3.2.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.12:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:3.2.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.14:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:3.2.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.16:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:3.2.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.18:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:3.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.2:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:3.2.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.20:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:3.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.4:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:3.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.6:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:3.2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:3.2.8:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.10:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.12:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.0.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.14:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.16:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.0.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.18:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.2:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.0.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.20:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.22:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.4:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.6:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.8:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.10:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.12:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.14:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.16:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.18:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.2:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.20:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.22:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.24:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.26:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.26:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.28:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.28:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.28:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.30:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.30:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.4:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.6:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.8:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.2.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.10:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.2.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.12:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.2.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.14:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.2.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.16:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.2.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.18:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.2:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.2.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.20:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.2.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.22:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.4:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.6:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.8:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.3.0:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.3.2:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.3.4:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.3.6:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.3.8:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-2488
reference_id CVE-2014-2488
reference_type
scores
0
value 1.0
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:S/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2014-2488
fixed_packages
0
url pkg:deb/debian/virtualbox@4.3.12-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@4.3.12-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@4.3.12-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2014-2488
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v418-2cz8-eyby
353
url VCID-v4bm-hyfq-gygs
vulnerability_id VCID-v4bm-hyfq-gygs
summary Multiple vulnerabilities have been discovered in Oracle Virtualbox, the worst of which could result in root privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21554
reference_id
reference_type
scores
0
value 0.00111
scoring_system epss
scoring_elements 0.29426
published_at 2026-04-21T12:55:00Z
1
value 0.00111
scoring_system epss
scoring_elements 0.29605
published_at 2026-04-02T12:55:00Z
2
value 0.00111
scoring_system epss
scoring_elements 0.29578
published_at 2026-04-11T12:55:00Z
3
value 0.00111
scoring_system epss
scoring_elements 0.29532
published_at 2026-04-12T12:55:00Z
4
value 0.00111
scoring_system epss
scoring_elements 0.2948
published_at 2026-04-13T12:55:00Z
5
value 0.00111
scoring_system epss
scoring_elements 0.29499
published_at 2026-04-16T12:55:00Z
6
value 0.00111
scoring_system epss
scoring_elements 0.29471
published_at 2026-04-18T12:55:00Z
7
value 0.00111
scoring_system epss
scoring_elements 0.29653
published_at 2026-04-04T12:55:00Z
8
value 0.00111
scoring_system epss
scoring_elements 0.29474
published_at 2026-04-07T12:55:00Z
9
value 0.00111
scoring_system epss
scoring_elements 0.29537
published_at 2026-04-08T12:55:00Z
10
value 0.00111
scoring_system epss
scoring_elements 0.29576
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21554
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://security.gentoo.org/glsa/202208-36
reference_id GLSA-202208-36
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:08Z/
url https://security.gentoo.org/glsa/202208-36
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.36-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.36-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.36-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2022-21554
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v4bm-hyfq-gygs
354
url VCID-v8fp-rzfq-e3bs
vulnerability_id VCID-v8fp-rzfq-e3bs
summary Information leak via side effects of speculative execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5715.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5715.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-5715
reference_id
reference_type
scores
0
value 0.88597
scoring_system epss
scoring_elements 0.995
published_at 2026-04-02T12:55:00Z
1
value 0.88597
scoring_system epss
scoring_elements 0.99501
published_at 2026-04-04T12:55:00Z
2
value 0.89094
scoring_system epss
scoring_elements 0.9953
published_at 2026-04-13T12:55:00Z
3
value 0.89094
scoring_system epss
scoring_elements 0.99529
published_at 2026-04-09T12:55:00Z
4
value 0.89094
scoring_system epss
scoring_elements 0.99533
published_at 2026-04-16T12:55:00Z
5
value 0.89094
scoring_system epss
scoring_elements 0.99534
published_at 2026-04-18T12:55:00Z
6
value 0.89198
scoring_system epss
scoring_elements 0.99534
published_at 2026-04-08T12:55:00Z
7
value 0.89198
scoring_system epss
scoring_elements 0.99539
published_at 2026-04-21T12:55:00Z
8
value 0.89198
scoring_system epss
scoring_elements 0.99533
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-5715
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17975
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18193
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18218
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18222
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18224
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18224
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18257
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18257
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10471
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10471
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10472
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10472
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1065
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1093
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1093
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10981
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10982
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10982
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7480
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995
57
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8087
58
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781
59
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822
60
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897
61
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:N/A:N
1
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
62
reference_url http://www.securityfocus.com/bid/102376
reference_id 102376
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url http://www.securityfocus.com/bid/102376
63
reference_url http://www.securitytracker.com/id/1040071
reference_id 1040071
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url http://www.securitytracker.com/id/1040071
64
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1519780
reference_id 1519780
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1519780
65
reference_url https://www.kb.cert.org/vuls/id/180049
reference_id 180049
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://www.kb.cert.org/vuls/id/180049
66
reference_url https://seclists.org/bugtraq/2019/Jun/36
reference_id 36
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://seclists.org/bugtraq/2019/Jun/36
67
reference_url https://www.exploit-db.com/exploits/43427/
reference_id 43427
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://www.exploit-db.com/exploits/43427/
68
reference_url http://nvidia.custhelp.com/app/answers/detail/a_id/4609
reference_id 4609
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url http://nvidia.custhelp.com/app/answers/detail/a_id/4609
69
reference_url http://nvidia.custhelp.com/app/answers/detail/a_id/4611
reference_id 4611
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url http://nvidia.custhelp.com/app/answers/detail/a_id/4611
70
reference_url http://nvidia.custhelp.com/app/answers/detail/a_id/4613
reference_id 4613
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url http://nvidia.custhelp.com/app/answers/detail/a_id/4613
71
reference_url http://nvidia.custhelp.com/app/answers/detail/a_id/4614
reference_id 4614
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url http://nvidia.custhelp.com/app/answers/detail/a_id/4614
72
reference_url http://www.kb.cert.org/vuls/id/584653
reference_id 584653
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url http://www.kb.cert.org/vuls/id/584653
73
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886532
reference_id 886532
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886532
74
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886852
reference_id 886852
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886852
75
reference_url https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002
reference_id ADV180002
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002
76
reference_url http://xenbits.xen.org/xsa/advisory-254.html
reference_id advisory-254.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url http://xenbits.xen.org/xsa/advisory-254.html
77
reference_url https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr
reference_id advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr
78
reference_url http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt
reference_id ARUBA-PSA-2018-001.txt
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt
79
reference_url http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt
reference_id ARUBA-PSA-2019-003.txt
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt
80
reference_url https://security.archlinux.org/ASA-201801-10
reference_id ASA-201801-10
reference_type
scores
url https://security.archlinux.org/ASA-201801-10
81
reference_url https://security.archlinux.org/AVG-557
reference_id AVG-557
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-557
82
reference_url https://security.archlinux.org/AVG-558
reference_id AVG-558
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-558
83
reference_url https://security.archlinux.org/AVG-559
reference_id AVG-559
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-559
84
reference_url https://security.archlinux.org/AVG-582
reference_id AVG-582
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-582
85
reference_url https://security.archlinux.org/AVG-583
reference_id AVG-583
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-583
86
reference_url https://security.archlinux.org/AVG-987
reference_id AVG-987
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-987
87
reference_url https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/
reference_id AWS-2018-013
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/
88
reference_url https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel
reference_id cisco-sa-20180104-cpusidechannel
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel
89
reference_url https://support.citrix.com/article/CTX231399
reference_id CTX231399
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://support.citrix.com/article/CTX231399
90
reference_url https://security.paloaltonetworks.com/CVE-2017-5715
reference_id CVE-2017-5715
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://security.paloaltonetworks.com/CVE-2017-5715
91
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/43427.c
reference_id CVE-2017-5753;CVE-2017-5715
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/43427.c
92
reference_url https://spectreattack.com/spectre.pdf
reference_id CVE-2017-5753;CVE-2017-5715
reference_type exploit
scores
url https://spectreattack.com/spectre.pdf
93
reference_url https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us
reference_id display?docId=emr_na-hpesbhf03805en_us
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us
94
reference_url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us
reference_id display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us
95
reference_url https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc
reference_id FreeBSD-SA-18:03.speculative_execution.asc
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc
96
reference_url https://security.gentoo.org/glsa/201804-08
reference_id GLSA-201804-08
reference_type
scores
url https://security.gentoo.org/glsa/201804-08
97
reference_url https://security.gentoo.org/glsa/201810-06
reference_id GLSA-201810-06
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://security.gentoo.org/glsa/201810-06
98
reference_url https://support.f5.com/csp/article/K91229003
reference_id K91229003
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://support.f5.com/csp/article/K91229003
99
reference_url https://support.lenovo.com/us/en/solutions/LEN-18282
reference_id LEN-18282
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://support.lenovo.com/us/en/solutions/LEN-18282
100
reference_url https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001
reference_id mitel-product-security-advisory-18-0001
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001
101
reference_url https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/
reference_id mitigations-landing-new-class-timing-attack
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/
102
reference_url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html
reference_id msg00002.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html
103
reference_url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html
reference_id msg00003.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html
104
reference_url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html
reference_id msg00004.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html
105
reference_url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html
reference_id msg00005.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html
106
reference_url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html
reference_id msg00009.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html
107
reference_url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html
reference_id msg00012.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html
108
reference_url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html
reference_id msg00013.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html
109
reference_url https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html
reference_id msg00017.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html
110
reference_url https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html
reference_id msg00019.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html
111
reference_url https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html
reference_id msg00025.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html
112
reference_url https://security.netapp.com/advisory/ntap-20180104-0001/
reference_id ntap-20180104-0001
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://security.netapp.com/advisory/ntap-20180104-0001/
113
reference_url https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html
reference_id reading-privileged-memory-with-side.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html
114
reference_url https://access.redhat.com/errata/RHSA-2018:0016
reference_id RHSA-2018:0016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0016
115
reference_url https://access.redhat.com/errata/RHSA-2018:0017
reference_id RHSA-2018:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0017
116
reference_url https://access.redhat.com/errata/RHSA-2018:0018
reference_id RHSA-2018:0018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0018
117
reference_url https://access.redhat.com/errata/RHSA-2018:0020
reference_id RHSA-2018:0020
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0020
118
reference_url https://access.redhat.com/errata/RHSA-2018:0021
reference_id RHSA-2018:0021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0021
119
reference_url https://access.redhat.com/errata/RHSA-2018:0022
reference_id RHSA-2018:0022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0022
120
reference_url https://access.redhat.com/errata/RHSA-2018:0023
reference_id RHSA-2018:0023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0023
121
reference_url https://access.redhat.com/errata/RHSA-2018:0027
reference_id RHSA-2018:0027
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0027
122
reference_url https://access.redhat.com/errata/RHSA-2018:0028
reference_id RHSA-2018:0028
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0028
123
reference_url https://access.redhat.com/errata/RHSA-2018:0292
reference_id RHSA-2018:0292
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://access.redhat.com/errata/RHSA-2018:0292
124
reference_url https://access.redhat.com/errata/RHSA-2018:1062
reference_id RHSA-2018:1062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1062
125
reference_url https://access.redhat.com/errata/RHSA-2018:1129
reference_id RHSA-2018:1129
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1129
126
reference_url https://access.redhat.com/errata/RHSA-2018:1130
reference_id RHSA-2018:1130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1130
127
reference_url https://access.redhat.com/errata/RHSA-2018:1196
reference_id RHSA-2018:1196
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1196
128
reference_url https://access.redhat.com/errata/RHSA-2018:1216
reference_id RHSA-2018:1216
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1216
129
reference_url https://access.redhat.com/errata/RHSA-2018:1252
reference_id RHSA-2018:1252
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1252
130
reference_url https://access.redhat.com/errata/RHSA-2018:1319
reference_id RHSA-2018:1319
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1319
131
reference_url https://access.redhat.com/errata/RHSA-2018:1346
reference_id RHSA-2018:1346
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1346
132
reference_url https://access.redhat.com/errata/RHSA-2018:1967
reference_id RHSA-2018:1967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1967
133
reference_url https://spectreattack.com/
reference_id spectreattack.com
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://spectreattack.com/
134
reference_url http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html
reference_id Spectre-Information-Disclosure-Proof-Of-Concept.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html
135
reference_url https://access.redhat.com/security/vulnerabilities/speculativeexecution
reference_id speculativeexecution
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://access.redhat.com/security/vulnerabilities/speculativeexecution
136
reference_url https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
reference_id speculative-processor-vulnerability
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
137
reference_url https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf
reference_id ssa-608355.pdf
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf
138
reference_url https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/
reference_id suse-addresses-meltdown-spectre-vulnerabilities
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/
139
reference_url https://www.synology.com/support/security/Synology_SA_18_01
reference_id Synology_SA_18_01
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://www.synology.com/support/security/Synology_SA_18_01
140
reference_url https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html
reference_id todays-cpu-vulnerability-what-you-need.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html
141
reference_url https://usn.ubuntu.com/usn/usn-3516-1/
reference_id usn-3516-1
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/usn/usn-3516-1/
142
reference_url https://usn.ubuntu.com/3516-1/
reference_id USN-3516-1
reference_type
scores
url https://usn.ubuntu.com/3516-1/
143
reference_url https://usn.ubuntu.com/3530-1/
reference_id USN-3530-1
reference_type
scores
url https://usn.ubuntu.com/3530-1/
144
reference_url https://usn.ubuntu.com/3531-1/
reference_id USN-3531-1
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3531-1/
145
reference_url https://usn.ubuntu.com/3531-3/
reference_id USN-3531-3
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3531-3/
146
reference_url https://usn.ubuntu.com/3540-1/
reference_id USN-3540-1
reference_type
scores
url https://usn.ubuntu.com/3540-1/
147
reference_url https://usn.ubuntu.com/3540-2/
reference_id USN-3540-2
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3540-2/
148
reference_url https://usn.ubuntu.com/3541-1/
reference_id USN-3541-1
reference_type
scores
url https://usn.ubuntu.com/3541-1/
149
reference_url https://usn.ubuntu.com/3541-2/
reference_id USN-3541-2
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3541-2/
150
reference_url https://usn.ubuntu.com/3542-1/
reference_id USN-3542-1
reference_type
scores
url https://usn.ubuntu.com/3542-1/
151
reference_url https://usn.ubuntu.com/3542-2/
reference_id USN-3542-2
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3542-2/
152
reference_url https://usn.ubuntu.com/3549-1/
reference_id USN-3549-1
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3549-1/
153
reference_url https://usn.ubuntu.com/3560-1/
reference_id USN-3560-1
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3560-1/
154
reference_url https://usn.ubuntu.com/3561-1/
reference_id USN-3561-1
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3561-1/
155
reference_url https://usn.ubuntu.com/3580-1/
reference_id USN-3580-1
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3580-1/
156
reference_url https://usn.ubuntu.com/3581-1/
reference_id USN-3581-1
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3581-1/
157
reference_url https://usn.ubuntu.com/3581-2/
reference_id USN-3581-2
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3581-2/
158
reference_url https://usn.ubuntu.com/3582-1/
reference_id USN-3582-1
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3582-1/
159
reference_url https://usn.ubuntu.com/3582-2/
reference_id USN-3582-2
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3582-2/
160
reference_url https://usn.ubuntu.com/3594-1/
reference_id USN-3594-1
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3594-1/
161
reference_url https://usn.ubuntu.com/3597-1/
reference_id USN-3597-1
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3597-1/
162
reference_url https://usn.ubuntu.com/3597-2/
reference_id USN-3597-2
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3597-2/
163
reference_url https://usn.ubuntu.com/3620-2/
reference_id USN-3620-2
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3620-2/
164
reference_url https://usn.ubuntu.com/3690-1/
reference_id USN-3690-1
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3690-1/
165
reference_url https://usn.ubuntu.com/3777-3/
reference_id USN-3777-3
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3777-3/
166
reference_url https://cert.vde.com/en-us/advisories/vde-2018-002
reference_id vde-2018-002
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://cert.vde.com/en-us/advisories/vde-2018-002
167
reference_url https://cert.vde.com/en-us/advisories/vde-2018-003
reference_id vde-2018-003
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://cert.vde.com/en-us/advisories/vde-2018-003
168
reference_url https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html
reference_id VMSA-2018-0002.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html
169
reference_url https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html
reference_id VMSA-2018-0004.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html
170
reference_url https://www.vmware.com/security/advisories/VMSA-2018-0007.html
reference_id VMSA-2018-0007.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://www.vmware.com/security/advisories/VMSA-2018-0007.html
171
reference_url https://xenbits.xen.org/xsa/advisory-254.html
reference_id XSA-254
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-254.html
fixed_packages
0
url pkg:deb/debian/virtualbox@5.2.6-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.2.6-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.6-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2017-5715
risk_score 10.0
exploitability 2.0
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v8fp-rzfq-e3bs
355
url VCID-va8t-xvrn-kfec
vulnerability_id VCID-va8t-xvrn-kfec
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14646
reference_id
reference_type
scores
0
value 0.0016
scoring_system epss
scoring_elements 0.36832
published_at 2026-04-01T12:55:00Z
1
value 0.0016
scoring_system epss
scoring_elements 0.36989
published_at 2026-04-02T12:55:00Z
2
value 0.0016
scoring_system epss
scoring_elements 0.36926
published_at 2026-04-11T12:55:00Z
3
value 0.0016
scoring_system epss
scoring_elements 0.36891
published_at 2026-04-12T12:55:00Z
4
value 0.0016
scoring_system epss
scoring_elements 0.36866
published_at 2026-04-13T12:55:00Z
5
value 0.0016
scoring_system epss
scoring_elements 0.36911
published_at 2026-04-16T12:55:00Z
6
value 0.0016
scoring_system epss
scoring_elements 0.36895
published_at 2026-04-18T12:55:00Z
7
value 0.0016
scoring_system epss
scoring_elements 0.36837
published_at 2026-04-21T12:55:00Z
8
value 0.0016
scoring_system epss
scoring_elements 0.37024
published_at 2026-04-04T12:55:00Z
9
value 0.0016
scoring_system epss
scoring_elements 0.36852
published_at 2026-04-07T12:55:00Z
10
value 0.0016
scoring_system epss
scoring_elements 0.36902
published_at 2026-04-08T12:55:00Z
11
value 0.0016
scoring_system epss
scoring_elements 0.36918
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14646
1
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:56Z/
url https://security.gentoo.org/glsa/202101-09
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html
reference_id msg00068.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:56Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html
reference_id msg00079.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:56Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html
4
reference_url https://www.zerodayinitiative.com/advisories/ZDI-20-888/
reference_id ZDI-20-888
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:56Z/
url https://www.zerodayinitiative.com/advisories/ZDI-20-888/
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.12-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.12-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.12-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2020-14646
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-va8t-xvrn-kfec
356
url VCID-vahw-w2sj-b3bh
vulnerability_id VCID-vahw-w2sj-b3bh
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:36Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2905
reference_id
reference_type
scores
0
value 0.00167
scoring_system epss
scoring_elements 0.37743
published_at 2026-04-01T12:55:00Z
1
value 0.00167
scoring_system epss
scoring_elements 0.37892
published_at 2026-04-09T12:55:00Z
2
value 0.00167
scoring_system epss
scoring_elements 0.37907
published_at 2026-04-11T12:55:00Z
3
value 0.00167
scoring_system epss
scoring_elements 0.37871
published_at 2026-04-12T12:55:00Z
4
value 0.00167
scoring_system epss
scoring_elements 0.37846
published_at 2026-04-13T12:55:00Z
5
value 0.00167
scoring_system epss
scoring_elements 0.37893
published_at 2026-04-16T12:55:00Z
6
value 0.00167
scoring_system epss
scoring_elements 0.37873
published_at 2026-04-18T12:55:00Z
7
value 0.00167
scoring_system epss
scoring_elements 0.3781
published_at 2026-04-21T12:55:00Z
8
value 0.00167
scoring_system epss
scoring_elements 0.37926
published_at 2026-04-02T12:55:00Z
9
value 0.00167
scoring_system epss
scoring_elements 0.37951
published_at 2026-04-04T12:55:00Z
10
value 0.00167
scoring_system epss
scoring_elements 0.37829
published_at 2026-04-07T12:55:00Z
11
value 0.00167
scoring_system epss
scoring_elements 0.37879
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2905
2
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:36Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
3
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2905
reference_id CVE-2020-2905
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
1
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
2
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-2905
6
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:36Z/
url https://security.gentoo.org/glsa/202101-09
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.6-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.6-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.6-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2020-2905
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vahw-w2sj-b3bh
357
url VCID-vbg3-an3a-cfem
vulnerability_id VCID-vbg3-an3a-cfem
summary Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization VirtualBox prior to 3.2.18, 4.0.20, 4.1.28, and 4.2.18 allows local users to affect availability via unknown vectors related to Core.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-3792
reference_id
reference_type
scores
0
value 0.00247
scoring_system epss
scoring_elements 0.47957
published_at 2026-04-01T12:55:00Z
1
value 0.00247
scoring_system epss
scoring_elements 0.47996
published_at 2026-04-02T12:55:00Z
2
value 0.00247
scoring_system epss
scoring_elements 0.48017
published_at 2026-04-04T12:55:00Z
3
value 0.00247
scoring_system epss
scoring_elements 0.47966
published_at 2026-04-07T12:55:00Z
4
value 0.00247
scoring_system epss
scoring_elements 0.48018
published_at 2026-04-08T12:55:00Z
5
value 0.00247
scoring_system epss
scoring_elements 0.48012
published_at 2026-04-09T12:55:00Z
6
value 0.00247
scoring_system epss
scoring_elements 0.48036
published_at 2026-04-11T12:55:00Z
7
value 0.00247
scoring_system epss
scoring_elements 0.48013
published_at 2026-04-12T12:55:00Z
8
value 0.00247
scoring_system epss
scoring_elements 0.48024
published_at 2026-04-13T12:55:00Z
9
value 0.00247
scoring_system epss
scoring_elements 0.48076
published_at 2026-04-16T12:55:00Z
10
value 0.00247
scoring_system epss
scoring_elements 0.48071
published_at 2026-04-18T12:55:00Z
11
value 0.00247
scoring_system epss
scoring_elements 0.48028
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-3792
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=715327
reference_id 715327
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=715327
2
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/38595.txt
reference_id CVE-2013-3792;OSVDB-94460
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/38595.txt
3
reference_url https://www.securityfocus.com/bid/60794/info
reference_id CVE-2013-3792;OSVDB-94460
reference_type exploit
scores
url https://www.securityfocus.com/bid/60794/info
fixed_packages
0
url pkg:deb/debian/virtualbox@4.2.16-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@4.2.16-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@4.2.16-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2013-3792
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vbg3-an3a-cfem
358
url VCID-vgkt-g8k1-4uct
vulnerability_id VCID-vgkt-g8k1-4uct
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-3287
reference_id
reference_type
scores
0
value 0.0045
scoring_system epss
scoring_elements 0.63669
published_at 2026-04-21T12:55:00Z
1
value 0.0045
scoring_system epss
scoring_elements 0.63619
published_at 2026-04-02T12:55:00Z
2
value 0.0045
scoring_system epss
scoring_elements 0.63676
published_at 2026-04-16T12:55:00Z
3
value 0.0045
scoring_system epss
scoring_elements 0.63686
published_at 2026-04-18T12:55:00Z
4
value 0.0045
scoring_system epss
scoring_elements 0.63559
published_at 2026-04-01T12:55:00Z
5
value 0.0045
scoring_system epss
scoring_elements 0.63645
published_at 2026-04-04T12:55:00Z
6
value 0.0045
scoring_system epss
scoring_elements 0.63604
published_at 2026-04-07T12:55:00Z
7
value 0.0045
scoring_system epss
scoring_elements 0.63656
published_at 2026-04-08T12:55:00Z
8
value 0.0045
scoring_system epss
scoring_elements 0.63672
published_at 2026-04-12T12:55:00Z
9
value 0.0045
scoring_system epss
scoring_elements 0.63687
published_at 2026-04-11T12:55:00Z
10
value 0.0045
scoring_system epss
scoring_elements 0.63639
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-3287
1
reference_url http://www.securitytracker.com/id/1041887
reference_id 1041887
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:04Z/
url http://www.securitytracker.com/id/1041887
2
reference_url http://www.securityfocus.com/bid/105619
reference_id 105619
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:04Z/
url http://www.securityfocus.com/bid/105619
fixed_packages
0
url pkg:deb/debian/virtualbox@5.2.20-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.2.20-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.20-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2018-3287
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vgkt-g8k1-4uct
359
url VCID-vmc1-vb8g-yqcy
vulnerability_id VCID-vmc1-vb8g-yqcy
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are prior to 5.2.24 and prior to 6.0.2. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H).
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:04Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:04Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2508
reference_id
reference_type
scores
0
value 0.00171
scoring_system epss
scoring_elements 0.38261
published_at 2026-04-21T12:55:00Z
1
value 0.00171
scoring_system epss
scoring_elements 0.38398
published_at 2026-04-02T12:55:00Z
2
value 0.00171
scoring_system epss
scoring_elements 0.38325
published_at 2026-04-18T12:55:00Z
3
value 0.00171
scoring_system epss
scoring_elements 0.38299
published_at 2026-04-13T12:55:00Z
4
value 0.00171
scoring_system epss
scoring_elements 0.38347
published_at 2026-04-16T12:55:00Z
5
value 0.00171
scoring_system epss
scoring_elements 0.38262
published_at 2026-04-01T12:55:00Z
6
value 0.00171
scoring_system epss
scoring_elements 0.38421
published_at 2026-04-04T12:55:00Z
7
value 0.00171
scoring_system epss
scoring_elements 0.38285
published_at 2026-04-07T12:55:00Z
8
value 0.00171
scoring_system epss
scoring_elements 0.38335
published_at 2026-04-08T12:55:00Z
9
value 0.00171
scoring_system epss
scoring_elements 0.38344
published_at 2026-04-09T12:55:00Z
10
value 0.00171
scoring_system epss
scoring_elements 0.38361
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2508
3
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:04Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
4
reference_url http://www.securityfocus.com/bid/106568
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T14:02:04Z/
url http://www.securityfocus.com/bid/106568
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-2508
reference_id CVE-2019-2508
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-2508
fixed_packages
0
url pkg:deb/debian/virtualbox@5.2.24-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.2.24-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.24-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2019-2508
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vmc1-vb8g-yqcy
360
url VCID-vvr9-723e-4fcj
vulnerability_id VCID-vvr9-723e-4fcj
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Shared Folder). Supported versions that are affected are Prior to 5.0.38 and Prior to 5.1.20. Easily "exploitable" vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.4 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3587
reference_id
reference_type
scores
0
value 0.00265
scoring_system epss
scoring_elements 0.49972
published_at 2026-04-21T12:55:00Z
1
value 0.00265
scoring_system epss
scoring_elements 0.49985
published_at 2026-04-11T12:55:00Z
2
value 0.00265
scoring_system epss
scoring_elements 0.49956
published_at 2026-04-12T12:55:00Z
3
value 0.00265
scoring_system epss
scoring_elements 0.49953
published_at 2026-04-13T12:55:00Z
4
value 0.00265
scoring_system epss
scoring_elements 0.49997
published_at 2026-04-16T12:55:00Z
5
value 0.00265
scoring_system epss
scoring_elements 0.49999
published_at 2026-04-18T12:55:00Z
6
value 0.00265
scoring_system epss
scoring_elements 0.49904
published_at 2026-04-01T12:55:00Z
7
value 0.00265
scoring_system epss
scoring_elements 0.49941
published_at 2026-04-02T12:55:00Z
8
value 0.00265
scoring_system epss
scoring_elements 0.49968
published_at 2026-04-04T12:55:00Z
9
value 0.00265
scoring_system epss
scoring_elements 0.49919
published_at 2026-04-07T12:55:00Z
10
value 0.00265
scoring_system epss
scoring_elements 0.49973
published_at 2026-04-08T12:55:00Z
11
value 0.00265
scoring_system epss
scoring_elements 0.49966
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3587
1
reference_url https://www.exploit-db.com/exploits/41932/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:32Z/
url https://www.exploit-db.com/exploits/41932/
2
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:32Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
3
reference_url http://www.securityfocus.com/bid/97750
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:32Z/
url http://www.securityfocus.com/bid/97750
4
reference_url http://www.securitytracker.com/id/1038288
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:32Z/
url http://www.securitytracker.com/id/1038288
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
6
reference_url https://bugs.chromium.org/p/project-zero/issues/detail?id=1227
reference_id CVE-2017-3587
reference_type exploit
scores
url https://bugs.chromium.org/p/project-zero/issues/detail?id=1227
7
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/41932.cpp
reference_id CVE-2017-3587
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/41932.cpp
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-3587
reference_id CVE-2017-3587
reference_type
scores
0
value 3.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:P/A:P
1
value 8.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-3587
fixed_packages
0
url pkg:deb/debian/virtualbox@5.1.20-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.1.20-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.1.20-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2017-3587
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vvr9-723e-4fcj
361
url VCID-w247-sjrb-qkfv
vulnerability_id VCID-w247-sjrb-qkfv
summary Multiple vulnerabilities have been discovered in Oracle Virtualbox, the worst of which could result in root privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35538
reference_id
reference_type
scores
0
value 0.00252
scoring_system epss
scoring_elements 0.48573
published_at 2026-04-21T12:55:00Z
1
value 0.00252
scoring_system epss
scoring_elements 0.48502
published_at 2026-04-01T12:55:00Z
2
value 0.00252
scoring_system epss
scoring_elements 0.48584
published_at 2026-04-11T12:55:00Z
3
value 0.00252
scoring_system epss
scoring_elements 0.48557
published_at 2026-04-12T12:55:00Z
4
value 0.00252
scoring_system epss
scoring_elements 0.4857
published_at 2026-04-13T12:55:00Z
5
value 0.00252
scoring_system epss
scoring_elements 0.4862
published_at 2026-04-16T12:55:00Z
6
value 0.00252
scoring_system epss
scoring_elements 0.48616
published_at 2026-04-18T12:55:00Z
7
value 0.00252
scoring_system epss
scoring_elements 0.48538
published_at 2026-04-02T12:55:00Z
8
value 0.00252
scoring_system epss
scoring_elements 0.4856
published_at 2026-04-04T12:55:00Z
9
value 0.00252
scoring_system epss
scoring_elements 0.48512
published_at 2026-04-07T12:55:00Z
10
value 0.00252
scoring_system epss
scoring_elements 0.48567
published_at 2026-04-08T12:55:00Z
11
value 0.00252
scoring_system epss
scoring_elements 0.48563
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35538
1
reference_url https://security.archlinux.org/ASA-202110-3
reference_id ASA-202110-3
reference_type
scores
url https://security.archlinux.org/ASA-202110-3
2
reference_url https://security.archlinux.org/AVG-2476
reference_id AVG-2476
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2476
3
reference_url https://security.gentoo.org/glsa/202208-36
reference_id GLSA-202208-36
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-25T19:25:05Z/
url https://security.gentoo.org/glsa/202208-36
fixed_packages
0
url pkg:deb/debian/virtualbox@0?distro=sid
purl pkg:deb/debian/virtualbox@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@0%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2021-35538
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w247-sjrb-qkfv
362
url VCID-w2dh-qrtu-7ue3
vulnerability_id VCID-w2dh-qrtu-7ue3
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could result in privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2129
reference_id
reference_type
scores
0
value 0.00135
scoring_system epss
scoring_elements 0.33158
published_at 2026-04-21T12:55:00Z
1
value 0.00135
scoring_system epss
scoring_elements 0.332
published_at 2026-04-12T12:55:00Z
2
value 0.00135
scoring_system epss
scoring_elements 0.33177
published_at 2026-04-13T12:55:00Z
3
value 0.00135
scoring_system epss
scoring_elements 0.33217
published_at 2026-04-16T12:55:00Z
4
value 0.00135
scoring_system epss
scoring_elements 0.33195
published_at 2026-04-18T12:55:00Z
5
value 0.00135
scoring_system epss
scoring_elements 0.33169
published_at 2026-04-01T12:55:00Z
6
value 0.00135
scoring_system epss
scoring_elements 0.33296
published_at 2026-04-02T12:55:00Z
7
value 0.00135
scoring_system epss
scoring_elements 0.33328
published_at 2026-04-04T12:55:00Z
8
value 0.00135
scoring_system epss
scoring_elements 0.33161
published_at 2026-04-07T12:55:00Z
9
value 0.00135
scoring_system epss
scoring_elements 0.33204
published_at 2026-04-08T12:55:00Z
10
value 0.00135
scoring_system epss
scoring_elements 0.33238
published_at 2026-04-09T12:55:00Z
11
value 0.00135
scoring_system epss
scoring_elements 0.33241
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2129
1
reference_url https://security.archlinux.org/ASA-202101-37
reference_id ASA-202101-37
reference_type
scores
url https://security.archlinux.org/ASA-202101-37
2
reference_url https://security.archlinux.org/AVG-1483
reference_id AVG-1483
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1483
3
reference_url https://security.gentoo.org/glsa/202101-15
reference_id GLSA-202101-15
reference_type
scores
0
value 7.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T18:11:40Z/
url https://security.gentoo.org/glsa/202101-15
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.18-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.18-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.18-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2021-2129
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w2dh-qrtu-7ue3
363
url VCID-w48d-rr4m-sqac
vulnerability_id VCID-w48d-rr4m-sqac
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-0404
reference_id
reference_type
scores
0
value 0.00059
scoring_system epss
scoring_elements 0.18474
published_at 2026-04-01T12:55:00Z
1
value 0.00059
scoring_system epss
scoring_elements 0.18619
published_at 2026-04-02T12:55:00Z
2
value 0.00059
scoring_system epss
scoring_elements 0.18674
published_at 2026-04-04T12:55:00Z
3
value 0.00059
scoring_system epss
scoring_elements 0.18388
published_at 2026-04-07T12:55:00Z
4
value 0.00059
scoring_system epss
scoring_elements 0.1847
published_at 2026-04-08T12:55:00Z
5
value 0.00059
scoring_system epss
scoring_elements 0.18522
published_at 2026-04-09T12:55:00Z
6
value 0.00059
scoring_system epss
scoring_elements 0.18523
published_at 2026-04-11T12:55:00Z
7
value 0.00059
scoring_system epss
scoring_elements 0.18475
published_at 2026-04-12T12:55:00Z
8
value 0.00059
scoring_system epss
scoring_elements 0.18424
published_at 2026-04-13T12:55:00Z
9
value 0.00059
scoring_system epss
scoring_elements 0.18368
published_at 2026-04-16T12:55:00Z
10
value 0.00059
scoring_system epss
scoring_elements 0.18381
published_at 2026-04-18T12:55:00Z
11
value 0.00059
scoring_system epss
scoring_elements 0.18405
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-0404
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5892
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5892
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0404
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0404
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0406
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0406
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0407
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0407
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=735410
reference_id 735410
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=735410
6
reference_url https://security.gentoo.org/glsa/201401-13
reference_id GLSA-201401-13
reference_type
scores
url https://security.gentoo.org/glsa/201401-13
fixed_packages
0
url pkg:deb/debian/virtualbox@4.3.6-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@4.3.6-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@4.3.6-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2014-0404
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w48d-rr4m-sqac
364
url VCID-wcsg-earr-87dm
vulnerability_id VCID-wcsg-earr-87dm
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14674
reference_id
reference_type
scores
0
value 0.00116
scoring_system epss
scoring_elements 0.30363
published_at 2026-04-01T12:55:00Z
1
value 0.00116
scoring_system epss
scoring_elements 0.30392
published_at 2026-04-02T12:55:00Z
2
value 0.00116
scoring_system epss
scoring_elements 0.30346
published_at 2026-04-11T12:55:00Z
3
value 0.00116
scoring_system epss
scoring_elements 0.30302
published_at 2026-04-12T12:55:00Z
4
value 0.00116
scoring_system epss
scoring_elements 0.30254
published_at 2026-04-13T12:55:00Z
5
value 0.00116
scoring_system epss
scoring_elements 0.30269
published_at 2026-04-16T12:55:00Z
6
value 0.00116
scoring_system epss
scoring_elements 0.30251
published_at 2026-04-18T12:55:00Z
7
value 0.00116
scoring_system epss
scoring_elements 0.30207
published_at 2026-04-21T12:55:00Z
8
value 0.00116
scoring_system epss
scoring_elements 0.30438
published_at 2026-04-04T12:55:00Z
9
value 0.00116
scoring_system epss
scoring_elements 0.30248
published_at 2026-04-07T12:55:00Z
10
value 0.00116
scoring_system epss
scoring_elements 0.30308
published_at 2026-04-08T12:55:00Z
11
value 0.00116
scoring_system epss
scoring_elements 0.30342
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14674
1
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:49Z/
url https://security.gentoo.org/glsa/202101-09
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html
reference_id msg00068.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:49Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html
reference_id msg00079.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:49Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html
4
reference_url https://www.zerodayinitiative.com/advisories/ZDI-20-896/
reference_id ZDI-20-896
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:49Z/
url https://www.zerodayinitiative.com/advisories/ZDI-20-896/
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.12-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.12-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.12-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2020-14674
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wcsg-earr-87dm
365
url VCID-wqgx-swqt-gfcz
vulnerability_id VCID-wqgx-swqt-gfcz
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-3298
reference_id
reference_type
scores
0
value 0.0045
scoring_system epss
scoring_elements 0.63619
published_at 2026-04-02T12:55:00Z
1
value 0.0045
scoring_system epss
scoring_elements 0.63669
published_at 2026-04-21T12:55:00Z
2
value 0.0045
scoring_system epss
scoring_elements 0.63676
published_at 2026-04-16T12:55:00Z
3
value 0.0045
scoring_system epss
scoring_elements 0.63686
published_at 2026-04-18T12:55:00Z
4
value 0.0045
scoring_system epss
scoring_elements 0.63559
published_at 2026-04-01T12:55:00Z
5
value 0.0045
scoring_system epss
scoring_elements 0.63645
published_at 2026-04-04T12:55:00Z
6
value 0.0045
scoring_system epss
scoring_elements 0.63604
published_at 2026-04-07T12:55:00Z
7
value 0.0045
scoring_system epss
scoring_elements 0.63656
published_at 2026-04-08T12:55:00Z
8
value 0.0045
scoring_system epss
scoring_elements 0.63672
published_at 2026-04-12T12:55:00Z
9
value 0.0045
scoring_system epss
scoring_elements 0.63687
published_at 2026-04-11T12:55:00Z
10
value 0.0045
scoring_system epss
scoring_elements 0.63639
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-3298
1
reference_url http://www.securitytracker.com/id/1041887
reference_id 1041887
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:15:50Z/
url http://www.securitytracker.com/id/1041887
2
reference_url http://www.securityfocus.com/bid/105619
reference_id 105619
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:15:50Z/
url http://www.securityfocus.com/bid/105619
fixed_packages
0
url pkg:deb/debian/virtualbox@5.2.20-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.2.20-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.20-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2018-3298
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wqgx-swqt-gfcz
366
url VCID-wqqw-mv61-p7ff
vulnerability_id VCID-wqqw-mv61-p7ff
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.20. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-3293
reference_id
reference_type
scores
0
value 0.0045
scoring_system epss
scoring_elements 0.63619
published_at 2026-04-02T12:55:00Z
1
value 0.0045
scoring_system epss
scoring_elements 0.63669
published_at 2026-04-21T12:55:00Z
2
value 0.0045
scoring_system epss
scoring_elements 0.63676
published_at 2026-04-16T12:55:00Z
3
value 0.0045
scoring_system epss
scoring_elements 0.63686
published_at 2026-04-18T12:55:00Z
4
value 0.0045
scoring_system epss
scoring_elements 0.63559
published_at 2026-04-01T12:55:00Z
5
value 0.0045
scoring_system epss
scoring_elements 0.63645
published_at 2026-04-04T12:55:00Z
6
value 0.0045
scoring_system epss
scoring_elements 0.63604
published_at 2026-04-07T12:55:00Z
7
value 0.0045
scoring_system epss
scoring_elements 0.63656
published_at 2026-04-08T12:55:00Z
8
value 0.0045
scoring_system epss
scoring_elements 0.63672
published_at 2026-04-12T12:55:00Z
9
value 0.0045
scoring_system epss
scoring_elements 0.63687
published_at 2026-04-11T12:55:00Z
10
value 0.0045
scoring_system epss
scoring_elements 0.63639
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-3293
1
reference_url http://www.securitytracker.com/id/1041887
reference_id 1041887
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:15:56Z/
url http://www.securitytracker.com/id/1041887
2
reference_url http://www.securityfocus.com/bid/105619
reference_id 105619
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:15:56Z/
url http://www.securityfocus.com/bid/105619
fixed_packages
0
url pkg:deb/debian/virtualbox@5.2.20-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.2.20-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.20-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2018-3293
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wqqw-mv61-p7ff
367
url VCID-wwca-1xwz-c7e5
vulnerability_id VCID-wwca-1xwz-c7e5
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.2.28 and prior to 6.0.6. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2656
reference_id
reference_type
scores
0
value 0.00139
scoring_system epss
scoring_elements 0.34061
published_at 2026-04-02T12:55:00Z
1
value 0.00139
scoring_system epss
scoring_elements 0.33944
published_at 2026-04-21T12:55:00Z
2
value 0.00139
scoring_system epss
scoring_elements 0.33718
published_at 2026-04-01T12:55:00Z
3
value 0.00139
scoring_system epss
scoring_elements 0.34092
published_at 2026-04-04T12:55:00Z
4
value 0.00139
scoring_system epss
scoring_elements 0.3395
published_at 2026-04-07T12:55:00Z
5
value 0.00139
scoring_system epss
scoring_elements 0.33991
published_at 2026-04-16T12:55:00Z
6
value 0.00139
scoring_system epss
scoring_elements 0.34023
published_at 2026-04-11T12:55:00Z
7
value 0.00139
scoring_system epss
scoring_elements 0.3398
published_at 2026-04-12T12:55:00Z
8
value 0.00139
scoring_system epss
scoring_elements 0.33956
published_at 2026-04-13T12:55:00Z
9
value 0.00139
scoring_system epss
scoring_elements 0.33977
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2656
fixed_packages
0
url pkg:deb/debian/virtualbox@6.0.6-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.0.6-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.0.6-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2019-2656
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wwca-1xwz-c7e5
368
url VCID-wxzp-7uu6-ukbu
vulnerability_id VCID-wxzp-7uu6-ukbu
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2848
reference_id
reference_type
scores
0
value 0.00145
scoring_system epss
scoring_elements 0.34921
published_at 2026-04-02T12:55:00Z
1
value 0.00145
scoring_system epss
scoring_elements 0.3482
published_at 2026-04-21T12:55:00Z
2
value 0.00145
scoring_system epss
scoring_elements 0.34865
published_at 2026-04-18T12:55:00Z
3
value 0.00145
scoring_system epss
scoring_elements 0.34713
published_at 2026-04-01T12:55:00Z
4
value 0.00145
scoring_system epss
scoring_elements 0.34947
published_at 2026-04-04T12:55:00Z
5
value 0.00145
scoring_system epss
scoring_elements 0.34827
published_at 2026-04-07T12:55:00Z
6
value 0.00145
scoring_system epss
scoring_elements 0.34872
published_at 2026-04-08T12:55:00Z
7
value 0.00145
scoring_system epss
scoring_elements 0.349
published_at 2026-04-09T12:55:00Z
8
value 0.00145
scoring_system epss
scoring_elements 0.34903
published_at 2026-04-11T12:55:00Z
9
value 0.00145
scoring_system epss
scoring_elements 0.34866
published_at 2026-04-12T12:55:00Z
10
value 0.00145
scoring_system epss
scoring_elements 0.34843
published_at 2026-04-13T12:55:00Z
11
value 0.00145
scoring_system epss
scoring_elements 0.34882
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2848
1
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
reference_id cpujul2019-5072835.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:16:15Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
2
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:16:15Z/
url https://security.gentoo.org/glsa/202101-09
fixed_packages
0
url pkg:deb/debian/virtualbox@6.0.10-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.0.10-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.0.10-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2019-2848
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wxzp-7uu6-ukbu
369
url VCID-wz9q-jwj2-m3c2
vulnerability_id VCID-wz9q-jwj2-m3c2
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.16. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.0 Base Score 4.0 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-3005
reference_id
reference_type
scores
0
value 0.00377
scoring_system epss
scoring_elements 0.59258
published_at 2026-04-21T12:55:00Z
1
value 0.00377
scoring_system epss
scoring_elements 0.59253
published_at 2026-04-12T12:55:00Z
2
value 0.00377
scoring_system epss
scoring_elements 0.59234
published_at 2026-04-13T12:55:00Z
3
value 0.00377
scoring_system epss
scoring_elements 0.59271
published_at 2026-04-16T12:55:00Z
4
value 0.00377
scoring_system epss
scoring_elements 0.59277
published_at 2026-04-18T12:55:00Z
5
value 0.00377
scoring_system epss
scoring_elements 0.59122
published_at 2026-04-01T12:55:00Z
6
value 0.00377
scoring_system epss
scoring_elements 0.59196
published_at 2026-04-02T12:55:00Z
7
value 0.00377
scoring_system epss
scoring_elements 0.59221
published_at 2026-04-04T12:55:00Z
8
value 0.00377
scoring_system epss
scoring_elements 0.59185
published_at 2026-04-07T12:55:00Z
9
value 0.00377
scoring_system epss
scoring_elements 0.59237
published_at 2026-04-08T12:55:00Z
10
value 0.00377
scoring_system epss
scoring_elements 0.59251
published_at 2026-04-09T12:55:00Z
11
value 0.00377
scoring_system epss
scoring_elements 0.5927
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-3005
1
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:10:21Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
2
reference_url http://www.securityfocus.com/bid/104764
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:10:21Z/
url http://www.securityfocus.com/bid/104764
3
reference_url http://www.securitytracker.com/id/1041296
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:10:21Z/
url http://www.securitytracker.com/id/1041296
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-3005
reference_id CVE-2018-3005
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
1
value 4.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://nvd.nist.gov/vuln/detail/CVE-2018-3005
fixed_packages
0
url pkg:deb/debian/virtualbox@5.2.16-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.2.16-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.16-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2018-3005
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wz9q-jwj2-m3c2
370
url VCID-x35w-ge5m-rbar
vulnerability_id VCID-x35w-ge5m-rbar
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are prior to 5.2.24 and prior to 6.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via SOAP to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-02T15:53:29Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-02T15:53:29Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2511
reference_id
reference_type
scores
0
value 0.01525
scoring_system epss
scoring_elements 0.8132
published_at 2026-04-21T12:55:00Z
1
value 0.01525
scoring_system epss
scoring_elements 0.81227
published_at 2026-04-02T12:55:00Z
2
value 0.01525
scoring_system epss
scoring_elements 0.81281
published_at 2026-04-13T12:55:00Z
3
value 0.01525
scoring_system epss
scoring_elements 0.81319
published_at 2026-04-16T12:55:00Z
4
value 0.01525
scoring_system epss
scoring_elements 0.81321
published_at 2026-04-18T12:55:00Z
5
value 0.01525
scoring_system epss
scoring_elements 0.81218
published_at 2026-04-01T12:55:00Z
6
value 0.01525
scoring_system epss
scoring_elements 0.8125
published_at 2026-04-04T12:55:00Z
7
value 0.01525
scoring_system epss
scoring_elements 0.81249
published_at 2026-04-07T12:55:00Z
8
value 0.01525
scoring_system epss
scoring_elements 0.81277
published_at 2026-04-08T12:55:00Z
9
value 0.01525
scoring_system epss
scoring_elements 0.81282
published_at 2026-04-09T12:55:00Z
10
value 0.01525
scoring_system epss
scoring_elements 0.81303
published_at 2026-04-11T12:55:00Z
11
value 0.01525
scoring_system epss
scoring_elements 0.81289
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2511
3
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-02T15:53:29Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
4
reference_url http://www.securityfocus.com/bid/106574
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-02T15:53:29Z/
url http://www.securityfocus.com/bid/106574
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:6.0.0:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-2511
reference_id CVE-2019-2511
reference_type
scores
0
value 7.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:C
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-2511
fixed_packages
0
url pkg:deb/debian/virtualbox@5.2.24-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.2.24-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.24-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2019-2511
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x35w-ge5m-rbar
371
url VCID-x5x9-w5gw-1qh3
vulnerability_id VCID-x5x9-w5gw-1qh3
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.2.28 and prior to 6.0.6. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 7.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2657
reference_id
reference_type
scores
0
value 0.00139
scoring_system epss
scoring_elements 0.34061
published_at 2026-04-02T12:55:00Z
1
value 0.00139
scoring_system epss
scoring_elements 0.33944
published_at 2026-04-21T12:55:00Z
2
value 0.00139
scoring_system epss
scoring_elements 0.33718
published_at 2026-04-01T12:55:00Z
3
value 0.00139
scoring_system epss
scoring_elements 0.34092
published_at 2026-04-04T12:55:00Z
4
value 0.00139
scoring_system epss
scoring_elements 0.3395
published_at 2026-04-07T12:55:00Z
5
value 0.00139
scoring_system epss
scoring_elements 0.33991
published_at 2026-04-16T12:55:00Z
6
value 0.00139
scoring_system epss
scoring_elements 0.34023
published_at 2026-04-11T12:55:00Z
7
value 0.00139
scoring_system epss
scoring_elements 0.3398
published_at 2026-04-12T12:55:00Z
8
value 0.00139
scoring_system epss
scoring_elements 0.33956
published_at 2026-04-13T12:55:00Z
9
value 0.00139
scoring_system epss
scoring_elements 0.33977
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2657
fixed_packages
0
url pkg:deb/debian/virtualbox@6.0.6-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.0.6-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.0.6-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2019-2657
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x5x9-w5gw-1qh3
372
url VCID-x72x-baf3-wfet
vulnerability_id VCID-x72x-baf3-wfet
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html
reference_id
reference_type
scores
0
value 6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:30Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2741
reference_id
reference_type
scores
0
value 0.00102
scoring_system epss
scoring_elements 0.27885
published_at 2026-04-21T12:55:00Z
1
value 0.00102
scoring_system epss
scoring_elements 0.27926
published_at 2026-04-07T12:55:00Z
2
value 0.00102
scoring_system epss
scoring_elements 0.27993
published_at 2026-04-08T12:55:00Z
3
value 0.00102
scoring_system epss
scoring_elements 0.28034
published_at 2026-04-09T12:55:00Z
4
value 0.00102
scoring_system epss
scoring_elements 0.2804
published_at 2026-04-11T12:55:00Z
5
value 0.00102
scoring_system epss
scoring_elements 0.27998
published_at 2026-04-12T12:55:00Z
6
value 0.00102
scoring_system epss
scoring_elements 0.27939
published_at 2026-04-13T12:55:00Z
7
value 0.00102
scoring_system epss
scoring_elements 0.27949
published_at 2026-04-16T12:55:00Z
8
value 0.00102
scoring_system epss
scoring_elements 0.27932
published_at 2026-04-18T12:55:00Z
9
value 0.00102
scoring_system epss
scoring_elements 0.28016
published_at 2026-04-01T12:55:00Z
10
value 0.00102
scoring_system epss
scoring_elements 0.28088
published_at 2026-04-02T12:55:00Z
11
value 0.00102
scoring_system epss
scoring_elements 0.28131
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2741
2
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:30Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
3
reference_url https://www.zerodayinitiative.com/advisories/ZDI-20-498/
reference_id
reference_type
scores
0
value 6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:30Z/
url https://www.zerodayinitiative.com/advisories/ZDI-20-498/
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2741
reference_id CVE-2020-2741
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:N
1
value 6.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
2
value 6.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2020-2741
7
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value 6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:00:30Z/
url https://security.gentoo.org/glsa/202101-09
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.6-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.6-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.6-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2020-2741
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x72x-baf3-wfet
373
url VCID-x9yp-dmxp-fkfg
vulnerability_id VCID-x9yp-dmxp-fkfg
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2689
reference_id
reference_type
scores
0
value 0.00178
scoring_system epss
scoring_elements 0.39267
published_at 2026-04-21T12:55:00Z
1
value 0.00178
scoring_system epss
scoring_elements 0.39366
published_at 2026-04-02T12:55:00Z
2
value 0.00178
scoring_system epss
scoring_elements 0.39382
published_at 2026-04-16T12:55:00Z
3
value 0.00178
scoring_system epss
scoring_elements 0.39353
published_at 2026-04-18T12:55:00Z
4
value 0.00178
scoring_system epss
scoring_elements 0.39179
published_at 2026-04-01T12:55:00Z
5
value 0.00178
scoring_system epss
scoring_elements 0.39389
published_at 2026-04-04T12:55:00Z
6
value 0.00178
scoring_system epss
scoring_elements 0.39303
published_at 2026-04-07T12:55:00Z
7
value 0.00178
scoring_system epss
scoring_elements 0.39358
published_at 2026-04-08T12:55:00Z
8
value 0.00178
scoring_system epss
scoring_elements 0.39375
published_at 2026-04-09T12:55:00Z
9
value 0.00178
scoring_system epss
scoring_elements 0.39387
published_at 2026-04-11T12:55:00Z
10
value 0.00178
scoring_system epss
scoring_elements 0.39348
published_at 2026-04-12T12:55:00Z
11
value 0.00178
scoring_system epss
scoring_elements 0.39329
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2689
1
reference_url http://www.securityfocus.com/bid/102693
reference_id 102693
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:26Z/
url http://www.securityfocus.com/bid/102693
2
reference_url http://www.securitytracker.com/id/1040202
reference_id 1040202
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:26Z/
url http://www.securitytracker.com/id/1040202
3
reference_url https://security.gentoo.org/glsa/201802-01
reference_id GLSA-201802-01
reference_type
scores
url https://security.gentoo.org/glsa/201802-01
fixed_packages
0
url pkg:deb/debian/virtualbox@5.2.6-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.2.6-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.6-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2018-2689
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x9yp-dmxp-fkfg
374
url VCID-xbus-k1re-k3cg
vulnerability_id VCID-xbus-k1re-k3cg
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14629
reference_id
reference_type
scores
0
value 0.00164
scoring_system epss
scoring_elements 0.37271
published_at 2026-04-01T12:55:00Z
1
value 0.00164
scoring_system epss
scoring_elements 0.37436
published_at 2026-04-02T12:55:00Z
2
value 0.00164
scoring_system epss
scoring_elements 0.37363
published_at 2026-04-11T12:55:00Z
3
value 0.00164
scoring_system epss
scoring_elements 0.37329
published_at 2026-04-12T12:55:00Z
4
value 0.00164
scoring_system epss
scoring_elements 0.37301
published_at 2026-04-13T12:55:00Z
5
value 0.00164
scoring_system epss
scoring_elements 0.37348
published_at 2026-04-16T12:55:00Z
6
value 0.00164
scoring_system epss
scoring_elements 0.37331
published_at 2026-04-18T12:55:00Z
7
value 0.00164
scoring_system epss
scoring_elements 0.37276
published_at 2026-04-21T12:55:00Z
8
value 0.00164
scoring_system epss
scoring_elements 0.3746
published_at 2026-04-04T12:55:00Z
9
value 0.00164
scoring_system epss
scoring_elements 0.37289
published_at 2026-04-07T12:55:00Z
10
value 0.00164
scoring_system epss
scoring_elements 0.3734
published_at 2026-04-08T12:55:00Z
11
value 0.00164
scoring_system epss
scoring_elements 0.37351
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14629
1
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:00Z/
url https://security.gentoo.org/glsa/202101-09
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html
reference_id msg00068.html
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:00Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00068.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html
reference_id msg00079.html
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:00Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00079.html
4
reference_url https://www.zerodayinitiative.com/advisories/ZDI-20-887/
reference_id ZDI-20-887
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:58:00Z/
url https://www.zerodayinitiative.com/advisories/ZDI-20-887/
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.12-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.12-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.12-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2020-14629
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xbus-k1re-k3cg
375
url VCID-xecm-fy4r-a7cs
vulnerability_id VCID-xecm-fy4r-a7cs
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2865
reference_id
reference_type
scores
0
value 0.0016
scoring_system epss
scoring_elements 0.37041
published_at 2026-04-02T12:55:00Z
1
value 0.0016
scoring_system epss
scoring_elements 0.36882
published_at 2026-04-21T12:55:00Z
2
value 0.0016
scoring_system epss
scoring_elements 0.36942
published_at 2026-04-18T12:55:00Z
3
value 0.0016
scoring_system epss
scoring_elements 0.36871
published_at 2026-04-01T12:55:00Z
4
value 0.0016
scoring_system epss
scoring_elements 0.37074
published_at 2026-04-04T12:55:00Z
5
value 0.0016
scoring_system epss
scoring_elements 0.36902
published_at 2026-04-07T12:55:00Z
6
value 0.0016
scoring_system epss
scoring_elements 0.36953
published_at 2026-04-08T12:55:00Z
7
value 0.0016
scoring_system epss
scoring_elements 0.36966
published_at 2026-04-09T12:55:00Z
8
value 0.0016
scoring_system epss
scoring_elements 0.36974
published_at 2026-04-11T12:55:00Z
9
value 0.0016
scoring_system epss
scoring_elements 0.36939
published_at 2026-04-12T12:55:00Z
10
value 0.0016
scoring_system epss
scoring_elements 0.36913
published_at 2026-04-13T12:55:00Z
11
value 0.0016
scoring_system epss
scoring_elements 0.36958
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2865
1
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
reference_id cpujul2019-5072835.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:16:36Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
2
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:16:36Z/
url https://security.gentoo.org/glsa/202101-09
fixed_packages
0
url pkg:deb/debian/virtualbox@6.0.10-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.0.10-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.0.10-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2019-2865
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xecm-fy4r-a7cs
376
url VCID-xesb-ayzp-5bd4
vulnerability_id VCID-xesb-ayzp-5bd4
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2843
reference_id
reference_type
scores
0
value 0.00137
scoring_system epss
scoring_elements 0.33452
published_at 2026-04-21T12:55:00Z
1
value 0.00137
scoring_system epss
scoring_elements 0.3354
published_at 2026-04-11T12:55:00Z
2
value 0.00137
scoring_system epss
scoring_elements 0.33499
published_at 2026-04-12T12:55:00Z
3
value 0.00137
scoring_system epss
scoring_elements 0.33475
published_at 2026-04-13T12:55:00Z
4
value 0.00137
scoring_system epss
scoring_elements 0.33511
published_at 2026-04-16T12:55:00Z
5
value 0.00137
scoring_system epss
scoring_elements 0.33486
published_at 2026-04-18T12:55:00Z
6
value 0.00137
scoring_system epss
scoring_elements 0.33441
published_at 2026-04-01T12:55:00Z
7
value 0.00137
scoring_system epss
scoring_elements 0.33598
published_at 2026-04-02T12:55:00Z
8
value 0.00137
scoring_system epss
scoring_elements 0.33631
published_at 2026-04-04T12:55:00Z
9
value 0.00137
scoring_system epss
scoring_elements 0.3347
published_at 2026-04-07T12:55:00Z
10
value 0.00137
scoring_system epss
scoring_elements 0.33513
published_at 2026-04-08T12:55:00Z
11
value 0.00137
scoring_system epss
scoring_elements 0.33547
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2843
1
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:21:00Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
2
reference_url http://www.securityfocus.com/bid/103854
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:21:00Z/
url http://www.securityfocus.com/bid/103854
3
reference_url http://www.securitytracker.com/id/1040707
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:21:00Z/
url http://www.securitytracker.com/id/1040707
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-2843
reference_id CVE-2018-2843
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-2843
6
reference_url https://security.gentoo.org/glsa/201805-08
reference_id GLSA-201805-08
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:21:00Z/
url https://security.gentoo.org/glsa/201805-08
fixed_packages
0
url pkg:deb/debian/virtualbox@5.2.10-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.2.10-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.10-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2018-2843
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xesb-ayzp-5bd4
377
url VCID-xh4p-m9fs-y3eb
vulnerability_id VCID-xh4p-m9fs-y3eb
summary Multiple vulnerabilities have been discovered in Oracle Virtualbox, the worst of which could result in root privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2297
reference_id
reference_type
scores
0
value 0.00092
scoring_system epss
scoring_elements 0.25818
published_at 2026-04-21T12:55:00Z
1
value 0.00092
scoring_system epss
scoring_elements 0.25956
published_at 2026-04-09T12:55:00Z
2
value 0.00092
scoring_system epss
scoring_elements 0.25966
published_at 2026-04-11T12:55:00Z
3
value 0.00092
scoring_system epss
scoring_elements 0.25921
published_at 2026-04-12T12:55:00Z
4
value 0.00092
scoring_system epss
scoring_elements 0.25862
published_at 2026-04-13T12:55:00Z
5
value 0.00092
scoring_system epss
scoring_elements 0.25866
published_at 2026-04-16T12:55:00Z
6
value 0.00092
scoring_system epss
scoring_elements 0.25847
published_at 2026-04-18T12:55:00Z
7
value 0.00092
scoring_system epss
scoring_elements 0.25945
published_at 2026-04-01T12:55:00Z
8
value 0.00092
scoring_system epss
scoring_elements 0.26027
published_at 2026-04-02T12:55:00Z
9
value 0.00092
scoring_system epss
scoring_elements 0.26069
published_at 2026-04-04T12:55:00Z
10
value 0.00092
scoring_system epss
scoring_elements 0.25835
published_at 2026-04-07T12:55:00Z
11
value 0.00092
scoring_system epss
scoring_elements 0.25904
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2297
1
reference_url https://security.archlinux.org/ASA-202104-9
reference_id ASA-202104-9
reference_type
scores
url https://security.archlinux.org/ASA-202104-9
2
reference_url https://security.archlinux.org/AVG-1846
reference_id AVG-1846
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1846
3
reference_url https://security.gentoo.org/glsa/202208-36
reference_id GLSA-202208-36
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:46Z/
url https://security.gentoo.org/glsa/202208-36
4
reference_url https://www.zerodayinitiative.com/advisories/ZDI-21-462/
reference_id ZDI-21-462
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:46Z/
url https://www.zerodayinitiative.com/advisories/ZDI-21-462/
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.20-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.20-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.20-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2021-2297
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xh4p-m9fs-y3eb
378
url VCID-xr9h-znb2-7beb
vulnerability_id VCID-xr9h-znb2-7beb
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:26Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2913
reference_id
reference_type
scores
0
value 0.00208
scoring_system epss
scoring_elements 0.4309
published_at 2026-04-01T12:55:00Z
1
value 0.00208
scoring_system epss
scoring_elements 0.43168
published_at 2026-04-12T12:55:00Z
2
value 0.00208
scoring_system epss
scoring_elements 0.4318
published_at 2026-04-09T12:55:00Z
3
value 0.00208
scoring_system epss
scoring_elements 0.43201
published_at 2026-04-11T12:55:00Z
4
value 0.00208
scoring_system epss
scoring_elements 0.43153
published_at 2026-04-13T12:55:00Z
5
value 0.00208
scoring_system epss
scoring_elements 0.43213
published_at 2026-04-16T12:55:00Z
6
value 0.00208
scoring_system epss
scoring_elements 0.43202
published_at 2026-04-18T12:55:00Z
7
value 0.00208
scoring_system epss
scoring_elements 0.43135
published_at 2026-04-21T12:55:00Z
8
value 0.00208
scoring_system epss
scoring_elements 0.43149
published_at 2026-04-02T12:55:00Z
9
value 0.00208
scoring_system epss
scoring_elements 0.43177
published_at 2026-04-04T12:55:00Z
10
value 0.00208
scoring_system epss
scoring_elements 0.43115
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2913
2
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:26Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
3
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2913
reference_id CVE-2020-2913
reference_type
scores
0
value 4.4
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:P/A:P
1
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
2
value 7.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-2913
6
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value 7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:55:26Z/
url https://security.gentoo.org/glsa/202101-09
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.6-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.6-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.6-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2020-2913
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xr9h-znb2-7beb
379
url VCID-xsrj-jf8g-t3gk
vulnerability_id VCID-xsrj-jf8g-t3gk
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.1.30. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox as well as unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data and unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 7.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10407
reference_id
reference_type
scores
0
value 0.00068
scoring_system epss
scoring_elements 0.20836
published_at 2026-04-21T12:55:00Z
1
value 0.00068
scoring_system epss
scoring_elements 0.20961
published_at 2026-04-11T12:55:00Z
2
value 0.00068
scoring_system epss
scoring_elements 0.20918
published_at 2026-04-12T12:55:00Z
3
value 0.00068
scoring_system epss
scoring_elements 0.20864
published_at 2026-04-13T12:55:00Z
4
value 0.00068
scoring_system epss
scoring_elements 0.20855
published_at 2026-04-18T12:55:00Z
5
value 0.00068
scoring_system epss
scoring_elements 0.20882
published_at 2026-04-01T12:55:00Z
6
value 0.00068
scoring_system epss
scoring_elements 0.21032
published_at 2026-04-02T12:55:00Z
7
value 0.00068
scoring_system epss
scoring_elements 0.21088
published_at 2026-04-04T12:55:00Z
8
value 0.00068
scoring_system epss
scoring_elements 0.20804
published_at 2026-04-07T12:55:00Z
9
value 0.00068
scoring_system epss
scoring_elements 0.20884
published_at 2026-04-08T12:55:00Z
10
value 0.00068
scoring_system epss
scoring_elements 0.20945
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10407
1
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:11Z/
url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
2
reference_url http://www.securityfocus.com/bid/101370
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:11Z/
url http://www.securityfocus.com/bid/101370
3
reference_url http://www.securitytracker.com/id/1039599
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:42:11Z/
url http://www.securitytracker.com/id/1039599
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-10407
reference_id CVE-2017-10407
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:P/I:P/A:P
1
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-10407
fixed_packages
0
url pkg:deb/debian/virtualbox@5.1.30-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.1.30-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.1.30-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2017-10407
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xsrj-jf8g-t3gk
380
url VCID-xxh2-rcth-ayae
vulnerability_id VCID-xxh2-rcth-ayae
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which might allow unauthorized changes to some critical or all
    accessible data.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-3316
reference_id
reference_type
scores
0
value 0.02825
scoring_system epss
scoring_elements 0.8618
published_at 2026-04-21T12:55:00Z
1
value 0.02825
scoring_system epss
scoring_elements 0.86111
published_at 2026-04-02T12:55:00Z
2
value 0.02825
scoring_system epss
scoring_elements 0.8617
published_at 2026-04-12T12:55:00Z
3
value 0.02825
scoring_system epss
scoring_elements 0.86166
published_at 2026-04-13T12:55:00Z
4
value 0.02825
scoring_system epss
scoring_elements 0.86183
published_at 2026-04-16T12:55:00Z
5
value 0.02825
scoring_system epss
scoring_elements 0.86189
published_at 2026-04-18T12:55:00Z
6
value 0.02825
scoring_system epss
scoring_elements 0.86101
published_at 2026-04-01T12:55:00Z
7
value 0.02825
scoring_system epss
scoring_elements 0.86127
published_at 2026-04-07T12:55:00Z
8
value 0.02825
scoring_system epss
scoring_elements 0.86146
published_at 2026-04-08T12:55:00Z
9
value 0.02825
scoring_system epss
scoring_elements 0.86158
published_at 2026-04-09T12:55:00Z
10
value 0.02825
scoring_system epss
scoring_elements 0.86171
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-3316
1
reference_url http://www.securitytracker.com/id/1037638
reference_id 1037638
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:00Z/
url http://www.securitytracker.com/id/1037638
2
reference_url https://www.exploit-db.com/exploits/41196/
reference_id 41196
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:00Z/
url https://www.exploit-db.com/exploits/41196/
3
reference_url http://www.securityfocus.com/bid/95579
reference_id 95579
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:00Z/
url http://www.securityfocus.com/bid/95579
4
reference_url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
reference_id cpujan2017-2881727.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:00Z/
url http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
5
reference_url http://seclists.org/fulldisclosure/2017/Jan/75
reference_id CVE-2017-3316
reference_type exploit
scores
url http://seclists.org/fulldisclosure/2017/Jan/75
6
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/41196.txt
reference_id CVE-2017-3316
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/41196.txt
7
reference_url https://security.gentoo.org/glsa/201702-08
reference_id GLSA-201702-08
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:00Z/
url https://security.gentoo.org/glsa/201702-08
fixed_packages
0
url pkg:deb/debian/virtualbox@5.1.14-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.1.14-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.1.14-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2017-3316
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xxh2-rcth-ayae
381
url VCID-xy4k-b4dy-n7gb
vulnerability_id VCID-xy4k-b4dy-n7gb
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could result in privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2130
reference_id
reference_type
scores
0
value 0.00174
scoring_system epss
scoring_elements 0.38688
published_at 2026-04-21T12:55:00Z
1
value 0.00174
scoring_system epss
scoring_elements 0.38773
published_at 2026-04-12T12:55:00Z
2
value 0.00174
scoring_system epss
scoring_elements 0.38745
published_at 2026-04-13T12:55:00Z
3
value 0.00174
scoring_system epss
scoring_elements 0.38791
published_at 2026-04-16T12:55:00Z
4
value 0.00174
scoring_system epss
scoring_elements 0.38769
published_at 2026-04-18T12:55:00Z
5
value 0.00174
scoring_system epss
scoring_elements 0.38657
published_at 2026-04-01T12:55:00Z
6
value 0.00174
scoring_system epss
scoring_elements 0.38787
published_at 2026-04-02T12:55:00Z
7
value 0.00174
scoring_system epss
scoring_elements 0.38808
published_at 2026-04-04T12:55:00Z
8
value 0.00174
scoring_system epss
scoring_elements 0.38737
published_at 2026-04-07T12:55:00Z
9
value 0.00174
scoring_system epss
scoring_elements 0.38786
published_at 2026-04-08T12:55:00Z
10
value 0.00174
scoring_system epss
scoring_elements 0.38797
published_at 2026-04-09T12:55:00Z
11
value 0.00174
scoring_system epss
scoring_elements 0.38809
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2130
1
reference_url https://security.archlinux.org/ASA-202101-37
reference_id ASA-202101-37
reference_type
scores
url https://security.archlinux.org/ASA-202101-37
2
reference_url https://security.archlinux.org/AVG-1483
reference_id AVG-1483
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1483
3
reference_url https://security.gentoo.org/glsa/202101-15
reference_id GLSA-202101-15
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:53:11Z/
url https://security.gentoo.org/glsa/202101-15
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.18-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.18-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.18-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2021-2130
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xy4k-b4dy-n7gb
382
url VCID-xz6g-fayv-vudw
vulnerability_id VCID-xz6g-fayv-vudw
summary Multiple vulnerabilities have been discovered in Oracle Virtualbox, the worst of which could result in privilege escalation from a guest to the host.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21620
reference_id
reference_type
scores
0
value 0.00245
scoring_system epss
scoring_elements 0.47795
published_at 2026-04-21T12:55:00Z
1
value 0.00245
scoring_system epss
scoring_elements 0.47794
published_at 2026-04-13T12:55:00Z
2
value 0.00245
scoring_system epss
scoring_elements 0.47848
published_at 2026-04-16T12:55:00Z
3
value 0.00245
scoring_system epss
scoring_elements 0.47841
published_at 2026-04-18T12:55:00Z
4
value 0.00245
scoring_system epss
scoring_elements 0.47765
published_at 2026-04-02T12:55:00Z
5
value 0.00245
scoring_system epss
scoring_elements 0.47784
published_at 2026-04-12T12:55:00Z
6
value 0.00245
scoring_system epss
scoring_elements 0.47733
published_at 2026-04-07T12:55:00Z
7
value 0.00245
scoring_system epss
scoring_elements 0.47787
published_at 2026-04-08T12:55:00Z
8
value 0.00245
scoring_system epss
scoring_elements 0.47783
published_at 2026-04-09T12:55:00Z
9
value 0.00245
scoring_system epss
scoring_elements 0.47808
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21620
1
reference_url https://security.gentoo.org/glsa/202212-03
reference_id GLSA-202212-03
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-23T15:25:21Z/
url https://security.gentoo.org/glsa/202212-03
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.40-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.40-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.40-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2022-21620
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xz6g-fayv-vudw
383
url VCID-y4xt-atn4-g7bv
vulnerability_id VCID-y4xt-atn4-g7bv
summary Multiple vulnerabilities have been discovered in Oracle Virtualbox, the worst of which could result in root privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2266
reference_id
reference_type
scores
0
value 0.00072
scoring_system epss
scoring_elements 0.2194
published_at 2026-04-21T12:55:00Z
1
value 0.00072
scoring_system epss
scoring_elements 0.22052
published_at 2026-04-12T12:55:00Z
2
value 0.00072
scoring_system epss
scoring_elements 0.21992
published_at 2026-04-13T12:55:00Z
3
value 0.00072
scoring_system epss
scoring_elements 0.2199
published_at 2026-04-16T12:55:00Z
4
value 0.00072
scoring_system epss
scoring_elements 0.21985
published_at 2026-04-18T12:55:00Z
5
value 0.00072
scoring_system epss
scoring_elements 0.21951
published_at 2026-04-01T12:55:00Z
6
value 0.00072
scoring_system epss
scoring_elements 0.22112
published_at 2026-04-02T12:55:00Z
7
value 0.00072
scoring_system epss
scoring_elements 0.2216
published_at 2026-04-04T12:55:00Z
8
value 0.00072
scoring_system epss
scoring_elements 0.21943
published_at 2026-04-07T12:55:00Z
9
value 0.00072
scoring_system epss
scoring_elements 0.22023
published_at 2026-04-08T12:55:00Z
10
value 0.00072
scoring_system epss
scoring_elements 0.22078
published_at 2026-04-09T12:55:00Z
11
value 0.00072
scoring_system epss
scoring_elements 0.22093
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2266
1
reference_url https://security.archlinux.org/ASA-202104-9
reference_id ASA-202104-9
reference_type
scores
url https://security.archlinux.org/ASA-202104-9
2
reference_url https://security.archlinux.org/AVG-1846
reference_id AVG-1846
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1846
3
reference_url https://security.gentoo.org/glsa/202208-36
reference_id GLSA-202208-36
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:42:48Z/
url https://security.gentoo.org/glsa/202208-36
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.20-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.20-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.20-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2021-2266
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y4xt-atn4-g7bv
384
url VCID-ya37-anz7-jbea
vulnerability_id VCID-ya37-anz7-jbea
summary Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 7.0.16. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. Note: This vulnerability applies to Windows hosts only. CVSS 3.1 Base Score 7.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21111
reference_id
reference_type
scores
0
value 0.09561
scoring_system epss
scoring_elements 0.92876
published_at 2026-04-21T12:55:00Z
1
value 0.09561
scoring_system epss
scoring_elements 0.9287
published_at 2026-04-16T12:55:00Z
2
value 0.09561
scoring_system epss
scoring_elements 0.92871
published_at 2026-04-18T12:55:00Z
3
value 0.09561
scoring_system epss
scoring_elements 0.92841
published_at 2026-04-02T12:55:00Z
4
value 0.09561
scoring_system epss
scoring_elements 0.92845
published_at 2026-04-04T12:55:00Z
5
value 0.09561
scoring_system epss
scoring_elements 0.92843
published_at 2026-04-07T12:55:00Z
6
value 0.09561
scoring_system epss
scoring_elements 0.92852
published_at 2026-04-08T12:55:00Z
7
value 0.09561
scoring_system epss
scoring_elements 0.92855
published_at 2026-04-09T12:55:00Z
8
value 0.09561
scoring_system epss
scoring_elements 0.9286
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21111
1
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.0.16:*:*:*:*:*:*:*
2
reference_url https://www.oracle.com/security-alerts/cpuapr2024.html
reference_id cpuapr2024.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-04-30T04:00:07Z/
url https://www.oracle.com/security-alerts/cpuapr2024.html
3
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/52287.C++
reference_id CVE-2024-21111
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/52287.C++
fixed_packages
0
url pkg:deb/debian/virtualbox@7.0.16-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.0.16-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.0.16-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2024-21111
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ya37-anz7-jbea
385
url VCID-yayq-xa1q-9kb9
vulnerability_id VCID-yayq-xa1q-9kb9
summary Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.2.28 and prior to 6.0.6. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2574
reference_id
reference_type
scores
0
value 0.00149
scoring_system epss
scoring_elements 0.35478
published_at 2026-04-02T12:55:00Z
1
value 0.00149
scoring_system epss
scoring_elements 0.35373
published_at 2026-04-21T12:55:00Z
2
value 0.00149
scoring_system epss
scoring_elements 0.35278
published_at 2026-04-01T12:55:00Z
3
value 0.00149
scoring_system epss
scoring_elements 0.35502
published_at 2026-04-04T12:55:00Z
4
value 0.00149
scoring_system epss
scoring_elements 0.35385
published_at 2026-04-07T12:55:00Z
5
value 0.00149
scoring_system epss
scoring_elements 0.35431
published_at 2026-04-08T12:55:00Z
6
value 0.00149
scoring_system epss
scoring_elements 0.35456
published_at 2026-04-09T12:55:00Z
7
value 0.00149
scoring_system epss
scoring_elements 0.35465
published_at 2026-04-11T12:55:00Z
8
value 0.00149
scoring_system epss
scoring_elements 0.35422
published_at 2026-04-12T12:55:00Z
9
value 0.00149
scoring_system epss
scoring_elements 0.35399
published_at 2026-04-13T12:55:00Z
10
value 0.00149
scoring_system epss
scoring_elements 0.35438
published_at 2026-04-16T12:55:00Z
11
value 0.00149
scoring_system epss
scoring_elements 0.35426
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2574
fixed_packages
0
url pkg:deb/debian/virtualbox@6.0.6-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.0.6-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.0.6-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2019-2574
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yayq-xa1q-9kb9
386
url VCID-ymrq-asq4-xbhp
vulnerability_id VCID-ymrq-asq4-xbhp
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2682
reference_id
reference_type
scores
0
value 0.00167
scoring_system epss
scoring_elements 0.3781
published_at 2026-04-21T12:55:00Z
1
value 0.00167
scoring_system epss
scoring_elements 0.37926
published_at 2026-04-02T12:55:00Z
2
value 0.00167
scoring_system epss
scoring_elements 0.37907
published_at 2026-04-11T12:55:00Z
3
value 0.00167
scoring_system epss
scoring_elements 0.37871
published_at 2026-04-12T12:55:00Z
4
value 0.00167
scoring_system epss
scoring_elements 0.37846
published_at 2026-04-13T12:55:00Z
5
value 0.00167
scoring_system epss
scoring_elements 0.37893
published_at 2026-04-16T12:55:00Z
6
value 0.00167
scoring_system epss
scoring_elements 0.37873
published_at 2026-04-18T12:55:00Z
7
value 0.00167
scoring_system epss
scoring_elements 0.37743
published_at 2026-04-01T12:55:00Z
8
value 0.00167
scoring_system epss
scoring_elements 0.37951
published_at 2026-04-04T12:55:00Z
9
value 0.00167
scoring_system epss
scoring_elements 0.37829
published_at 2026-04-07T12:55:00Z
10
value 0.00167
scoring_system epss
scoring_elements 0.37879
published_at 2026-04-08T12:55:00Z
11
value 0.00167
scoring_system epss
scoring_elements 0.37892
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2682
1
reference_url https://security.gentoo.org/glsa/202004-02
reference_id GLSA-202004-02
reference_type
scores
0
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:42:01Z/
url https://security.gentoo.org/glsa/202004-02
2
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-30T14:42:01Z/
url https://security.gentoo.org/glsa/202101-09
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.2-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.2-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.2-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2020-2682
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ymrq-asq4-xbhp
387
url VCID-yn5f-kds4-cygg
vulnerability_id VCID-yn5f-kds4-cygg
summary Multiple vulnerabilities have been discovered in Oracle Virtualbox, the worst of which could result in root privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35540
reference_id
reference_type
scores
0
value 0.0011
scoring_system epss
scoring_elements 0.29248
published_at 2026-04-21T12:55:00Z
1
value 0.0011
scoring_system epss
scoring_elements 0.29391
published_at 2026-04-11T12:55:00Z
2
value 0.0011
scoring_system epss
scoring_elements 0.29293
published_at 2026-04-13T12:55:00Z
3
value 0.0011
scoring_system epss
scoring_elements 0.29317
published_at 2026-04-16T12:55:00Z
4
value 0.0011
scoring_system epss
scoring_elements 0.29292
published_at 2026-04-18T12:55:00Z
5
value 0.0011
scoring_system epss
scoring_elements 0.29353
published_at 2026-04-01T12:55:00Z
6
value 0.0011
scoring_system epss
scoring_elements 0.29422
published_at 2026-04-02T12:55:00Z
7
value 0.0011
scoring_system epss
scoring_elements 0.29469
published_at 2026-04-04T12:55:00Z
8
value 0.0011
scoring_system epss
scoring_elements 0.29282
published_at 2026-04-07T12:55:00Z
9
value 0.0011
scoring_system epss
scoring_elements 0.29346
published_at 2026-04-12T12:55:00Z
10
value 0.0011
scoring_system epss
scoring_elements 0.29387
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35540
1
reference_url https://security.archlinux.org/ASA-202110-3
reference_id ASA-202110-3
reference_type
scores
url https://security.archlinux.org/ASA-202110-3
2
reference_url https://security.archlinux.org/AVG-2476
reference_id AVG-2476
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2476
3
reference_url https://security.gentoo.org/glsa/202208-36
reference_id GLSA-202208-36
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:06Z/
url https://security.gentoo.org/glsa/202208-36
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.28-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.28-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.28-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2021-35540
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yn5f-kds4-cygg
388
url VCID-ynca-p4m9-8yc3
vulnerability_id VCID-ynca-p4m9-8yc3
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-3021
reference_id
reference_type
scores
0
value 0.00104
scoring_system epss
scoring_elements 0.28457
published_at 2026-04-01T12:55:00Z
1
value 0.00104
scoring_system epss
scoring_elements 0.28504
published_at 2026-04-09T12:55:00Z
2
value 0.00104
scoring_system epss
scoring_elements 0.28507
published_at 2026-04-11T12:55:00Z
3
value 0.00104
scoring_system epss
scoring_elements 0.28464
published_at 2026-04-12T12:55:00Z
4
value 0.00104
scoring_system epss
scoring_elements 0.28415
published_at 2026-04-13T12:55:00Z
5
value 0.00104
scoring_system epss
scoring_elements 0.2843
published_at 2026-04-16T12:55:00Z
6
value 0.00104
scoring_system epss
scoring_elements 0.28408
published_at 2026-04-18T12:55:00Z
7
value 0.00104
scoring_system epss
scoring_elements 0.28551
published_at 2026-04-02T12:55:00Z
8
value 0.00104
scoring_system epss
scoring_elements 0.28594
published_at 2026-04-04T12:55:00Z
9
value 0.00104
scoring_system epss
scoring_elements 0.28397
published_at 2026-04-07T12:55:00Z
10
value 0.00104
scoring_system epss
scoring_elements 0.28463
published_at 2026-04-08T12:55:00Z
11
value 0.002
scoring_system epss
scoring_elements 0.42028
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-3021
1
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:12Z/
url http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
2
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
3
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-3021
reference_id CVE-2019-3021
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-3021
4
reference_url https://security.gentoo.org/glsa/202004-02
reference_id GLSA-202004-02
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:12Z/
url https://security.gentoo.org/glsa/202004-02
5
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:12Z/
url https://security.gentoo.org/glsa/202101-09
fixed_packages
0
url pkg:deb/debian/virtualbox@6.0.14-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.0.14-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.0.14-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2019-3021
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ynca-p4m9-8yc3
389
url VCID-ytbt-sss7-kydk
vulnerability_id VCID-ytbt-sss7-kydk
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-3026
reference_id
reference_type
scores
0
value 0.00116
scoring_system epss
scoring_elements 0.30189
published_at 2026-04-21T12:55:00Z
1
value 0.00119
scoring_system epss
scoring_elements 0.30868
published_at 2026-04-07T12:55:00Z
2
value 0.00119
scoring_system epss
scoring_elements 0.30956
published_at 2026-04-09T12:55:00Z
3
value 0.00119
scoring_system epss
scoring_elements 0.30959
published_at 2026-04-11T12:55:00Z
4
value 0.00119
scoring_system epss
scoring_elements 0.30917
published_at 2026-04-12T12:55:00Z
5
value 0.00119
scoring_system epss
scoring_elements 0.30872
published_at 2026-04-13T12:55:00Z
6
value 0.00119
scoring_system epss
scoring_elements 0.30903
published_at 2026-04-16T12:55:00Z
7
value 0.00119
scoring_system epss
scoring_elements 0.30883
published_at 2026-04-18T12:55:00Z
8
value 0.00119
scoring_system epss
scoring_elements 0.31002
published_at 2026-04-02T12:55:00Z
9
value 0.00119
scoring_system epss
scoring_elements 0.3105
published_at 2026-04-04T12:55:00Z
10
value 0.00119
scoring_system epss
scoring_elements 0.30873
published_at 2026-04-01T12:55:00Z
11
value 0.00119
scoring_system epss
scoring_elements 0.30926
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-3026
1
reference_url https://www.zerodayinitiative.com/advisories/ZDI-19-917/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:08Z/
url https://www.zerodayinitiative.com/advisories/ZDI-19-917/
2
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:08Z/
url http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
3
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-3026
reference_id CVE-2019-3026
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:N
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2019-3026
5
reference_url https://security.gentoo.org/glsa/202004-02
reference_id GLSA-202004-02
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:08Z/
url https://security.gentoo.org/glsa/202004-02
6
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:13:08Z/
url https://security.gentoo.org/glsa/202101-09
fixed_packages
0
url pkg:deb/debian/virtualbox@6.0.14-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.0.14-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.0.14-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2019-3026
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ytbt-sss7-kydk
390
url VCID-z24b-v1v2-wbab
vulnerability_id VCID-z24b-v1v2-wbab
summary A Incorrect Default Permissions vulnerability in the packaging of virtualbox of openSUSE Factory allows local attackers in the vboxusers groupu to escalate to root. This issue affects: openSUSE Factory virtualbox version 6.1.20-1.1 and prior versions.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-25319
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06505
published_at 2026-04-01T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.0657
published_at 2026-04-02T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.06605
published_at 2026-04-04T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.06588
published_at 2026-04-07T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.06639
published_at 2026-04-08T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.06681
published_at 2026-04-11T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.06674
published_at 2026-04-12T12:55:00Z
7
value 0.00024
scoring_system epss
scoring_elements 0.06665
published_at 2026-04-13T12:55:00Z
8
value 0.00024
scoring_system epss
scoring_elements 0.06594
published_at 2026-04-16T12:55:00Z
9
value 0.00024
scoring_system epss
scoring_elements 0.06586
published_at 2026-04-18T12:55:00Z
10
value 0.00024
scoring_system epss
scoring_elements 0.06742
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-25319
fixed_packages
0
url pkg:deb/debian/virtualbox@0?distro=sid
purl pkg:deb/debian/virtualbox@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@0%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2021-25319
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z24b-v1v2-wbab
391
url VCID-zh97-w3pz-53cc
vulnerability_id VCID-zh97-w3pz-53cc
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could result in privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-2124
reference_id
reference_type
scores
0
value 0.00187
scoring_system epss
scoring_elements 0.40509
published_at 2026-04-21T12:55:00Z
1
value 0.00187
scoring_system epss
scoring_elements 0.40589
published_at 2026-04-12T12:55:00Z
2
value 0.00187
scoring_system epss
scoring_elements 0.4057
published_at 2026-04-13T12:55:00Z
3
value 0.00187
scoring_system epss
scoring_elements 0.40617
published_at 2026-04-16T12:55:00Z
4
value 0.00187
scoring_system epss
scoring_elements 0.40587
published_at 2026-04-18T12:55:00Z
5
value 0.00187
scoring_system epss
scoring_elements 0.40518
published_at 2026-04-01T12:55:00Z
6
value 0.00187
scoring_system epss
scoring_elements 0.40599
published_at 2026-04-08T12:55:00Z
7
value 0.00187
scoring_system epss
scoring_elements 0.40626
published_at 2026-04-04T12:55:00Z
8
value 0.00187
scoring_system epss
scoring_elements 0.40548
published_at 2026-04-07T12:55:00Z
9
value 0.00187
scoring_system epss
scoring_elements 0.40609
published_at 2026-04-09T12:55:00Z
10
value 0.00187
scoring_system epss
scoring_elements 0.40627
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-2124
1
reference_url https://security.archlinux.org/ASA-202101-37
reference_id ASA-202101-37
reference_type
scores
url https://security.archlinux.org/ASA-202101-37
2
reference_url https://security.archlinux.org/AVG-1483
reference_id AVG-1483
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1483
3
reference_url https://security.gentoo.org/glsa/202101-15
reference_id GLSA-202101-15
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:53:19Z/
url https://security.gentoo.org/glsa/202101-15
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.18-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.18-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.18-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2021-2124
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zh97-w3pz-53cc
392
url VCID-zpzy-wu5d-4uad
vulnerability_id VCID-zpzy-wu5d-4uad
summary Multiple vulnerabilities have been discovered in Oracle Virtualbox, the worst of which could result in privilege escalation from a guest to the host.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-39423
reference_id
reference_type
scores
0
value 0.00067
scoring_system epss
scoring_elements 0.20559
published_at 2026-04-21T12:55:00Z
1
value 0.00067
scoring_system epss
scoring_elements 0.20579
published_at 2026-04-13T12:55:00Z
2
value 0.00067
scoring_system epss
scoring_elements 0.20566
published_at 2026-04-16T12:55:00Z
3
value 0.00067
scoring_system epss
scoring_elements 0.20564
published_at 2026-04-18T12:55:00Z
4
value 0.00067
scoring_system epss
scoring_elements 0.20741
published_at 2026-04-02T12:55:00Z
5
value 0.00067
scoring_system epss
scoring_elements 0.20799
published_at 2026-04-04T12:55:00Z
6
value 0.00067
scoring_system epss
scoring_elements 0.20518
published_at 2026-04-07T12:55:00Z
7
value 0.00067
scoring_system epss
scoring_elements 0.20595
published_at 2026-04-08T12:55:00Z
8
value 0.00067
scoring_system epss
scoring_elements 0.20654
published_at 2026-04-09T12:55:00Z
9
value 0.00067
scoring_system epss
scoring_elements 0.20674
published_at 2026-04-11T12:55:00Z
10
value 0.00067
scoring_system epss
scoring_elements 0.20632
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-39423
1
reference_url https://security.gentoo.org/glsa/202212-03
reference_id GLSA-202212-03
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:26Z/
url https://security.gentoo.org/glsa/202212-03
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.38-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.38-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.38-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2022-39423
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zpzy-wu5d-4uad
393
url VCID-zsdc-b3u1-37f9
vulnerability_id VCID-zsdc-b3u1-37f9
summary
Multiple vulnerabilities have been found in VirtualBox, the worst
    of which could allow an attacker to take control of VirtualBox.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:14Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00001.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2910
reference_id
reference_type
scores
0
value 0.00188
scoring_system epss
scoring_elements 0.40564
published_at 2026-04-01T12:55:00Z
1
value 0.00188
scoring_system epss
scoring_elements 0.40654
published_at 2026-04-09T12:55:00Z
2
value 0.00188
scoring_system epss
scoring_elements 0.40672
published_at 2026-04-11T12:55:00Z
3
value 0.00188
scoring_system epss
scoring_elements 0.40635
published_at 2026-04-12T12:55:00Z
4
value 0.00188
scoring_system epss
scoring_elements 0.40616
published_at 2026-04-13T12:55:00Z
5
value 0.00188
scoring_system epss
scoring_elements 0.40663
published_at 2026-04-16T12:55:00Z
6
value 0.00188
scoring_system epss
scoring_elements 0.40632
published_at 2026-04-18T12:55:00Z
7
value 0.00188
scoring_system epss
scoring_elements 0.40554
published_at 2026-04-21T12:55:00Z
8
value 0.00188
scoring_system epss
scoring_elements 0.40646
published_at 2026-04-02T12:55:00Z
9
value 0.00188
scoring_system epss
scoring_elements 0.40674
published_at 2026-04-04T12:55:00Z
10
value 0.00188
scoring_system epss
scoring_elements 0.40594
published_at 2026-04-07T12:55:00Z
11
value 0.00188
scoring_system epss
scoring_elements 0.40645
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2910
2
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:14Z/
url https://www.oracle.com/security-alerts/cpuapr2020.html
3
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-2910
reference_id CVE-2020-2910
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:P/A:N
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N
2
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2020-2910
6
reference_url https://security.gentoo.org/glsa/202101-09
reference_id GLSA-202101-09
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:01:14Z/
url https://security.gentoo.org/glsa/202101-09
fixed_packages
0
url pkg:deb/debian/virtualbox@6.1.6-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@6.1.6-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@6.1.6-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2020-2910
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zsdc-b3u1-37f9
394
url VCID-ztjt-g23a-6uee
vulnerability_id VCID-ztjt-g23a-6uee
summary Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization VirtualBox before 4.0.30, 4.1.38, 4.2.30, 4.3.26, and 5.0.0 allows local users to affect availability via unknown vectors related to Core.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4856
reference_id
reference_type
scores
0
value 0.00175
scoring_system epss
scoring_elements 0.3883
published_at 2026-04-21T12:55:00Z
1
value 0.00175
scoring_system epss
scoring_elements 0.38789
published_at 2026-04-01T12:55:00Z
2
value 0.00175
scoring_system epss
scoring_elements 0.38922
published_at 2026-04-02T12:55:00Z
3
value 0.00175
scoring_system epss
scoring_elements 0.38943
published_at 2026-04-04T12:55:00Z
4
value 0.00175
scoring_system epss
scoring_elements 0.38873
published_at 2026-04-07T12:55:00Z
5
value 0.00175
scoring_system epss
scoring_elements 0.38926
published_at 2026-04-08T12:55:00Z
6
value 0.00175
scoring_system epss
scoring_elements 0.38939
published_at 2026-04-09T12:55:00Z
7
value 0.00175
scoring_system epss
scoring_elements 0.38951
published_at 2026-04-11T12:55:00Z
8
value 0.00175
scoring_system epss
scoring_elements 0.38913
published_at 2026-04-18T12:55:00Z
9
value 0.00175
scoring_system epss
scoring_elements 0.38886
published_at 2026-04-13T12:55:00Z
10
value 0.00175
scoring_system epss
scoring_elements 0.38933
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4856
1
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
2
reference_url http://www.securitytracker.com/id/1033880
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1033880
3
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.29:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.0.29:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.0.29:*:*:*:*:*:*:*
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.37:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.1.37:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.1.37:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.29:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.2.29:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.2.29:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.3.25:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:vm_virtualbox:4.3.25:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:vm_virtualbox:4.3.25:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-4856
reference_id CVE-2015-4856
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2015-4856
fixed_packages
0
url pkg:deb/debian/virtualbox@5.0.0-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@5.0.0-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.0.0-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2015-4856
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ztjt-g23a-6uee
395
url VCID-zxkd-ypyr-77dr
vulnerability_id VCID-zxkd-ypyr-77dr
summary Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 6.1.44 and Prior to 7.0.8. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data as well as unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 4.6 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22000
reference_id
reference_type
scores
0
value 0.00043
scoring_system epss
scoring_elements 0.13302
published_at 2026-04-02T12:55:00Z
1
value 0.00043
scoring_system epss
scoring_elements 0.13222
published_at 2026-04-12T12:55:00Z
2
value 0.00043
scoring_system epss
scoring_elements 0.13171
published_at 2026-04-13T12:55:00Z
3
value 0.00043
scoring_system epss
scoring_elements 0.13072
published_at 2026-04-18T12:55:00Z
4
value 0.00043
scoring_system epss
scoring_elements 0.13366
published_at 2026-04-04T12:55:00Z
5
value 0.00043
scoring_system epss
scoring_elements 0.13162
published_at 2026-04-07T12:55:00Z
6
value 0.00043
scoring_system epss
scoring_elements 0.13243
published_at 2026-04-08T12:55:00Z
7
value 0.00043
scoring_system epss
scoring_elements 0.13293
published_at 2026-04-09T12:55:00Z
8
value 0.00043
scoring_system epss
scoring_elements 0.13261
published_at 2026-04-11T12:55:00Z
9
value 0.00045
scoring_system epss
scoring_elements 0.13821
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22000
fixed_packages
0
url pkg:deb/debian/virtualbox@7.0.8-dfsg-1?distro=sid
purl pkg:deb/debian/virtualbox@7.0.8-dfsg-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.0.8-dfsg-1%3Fdistro=sid
1
url pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid
2
url pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
purl pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid
aliases CVE-2023-22000
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zxkd-ypyr-77dr
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid