Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-7frw-3rxw-gubf
SummaryQEMU: local privilege escalation via the QEMU Guest Agent on Windows
Aliases
0
alias CVE-2023-0664
Fixed_packages
0
url pkg:deb/debian/qemu@0?distro=trixie
purl pkg:deb/debian/qemu@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@0%3Fdistro=trixie
1
url pkg:deb/debian/qemu@1:5.2%2Bdfsg-11%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/qemu@1:5.2%2Bdfsg-11%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3kyg-9mf3-kfft
1
vulnerability VCID-6qnt-yaa3-p3bb
2
vulnerability VCID-cenj-mz55-jbg6
3
vulnerability VCID-d2ve-dnmj-4bbz
4
vulnerability VCID-ej5p-r4az-6ud2
5
vulnerability VCID-ewb7-nrtu-g7ex
6
vulnerability VCID-gc6n-kgsc-f3b6
7
vulnerability VCID-m47q-17n6-t7gg
8
vulnerability VCID-mtj9-1cns-yybw
9
vulnerability VCID-n71j-fz74-kyhf
10
vulnerability VCID-p2dz-mtns-5bb4
11
vulnerability VCID-ptty-88p4-ybe9
12
vulnerability VCID-pxjg-chmx-nkdc
13
vulnerability VCID-qh2s-apkz-sbaz
14
vulnerability VCID-t58m-9jqp-43c9
15
vulnerability VCID-t5gq-4bhn-gkej
16
vulnerability VCID-uzxc-npak-yyc4
17
vulnerability VCID-w7gc-1eh2-3ufu
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:5.2%252Bdfsg-11%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/qemu@1:7.2%2Bdfsg-7%2Bdeb12u18?distro=trixie
purl pkg:deb/debian/qemu@1:7.2%2Bdfsg-7%2Bdeb12u18?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hkf8-96k7-kuc9
1
vulnerability VCID-m47q-17n6-t7gg
2
vulnerability VCID-n71j-fz74-kyhf
3
vulnerability VCID-t58m-9jqp-43c9
4
vulnerability VCID-uzxc-npak-yyc4
5
vulnerability VCID-vcun-y6d5-6uby
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:7.2%252Bdfsg-7%252Bdeb12u18%3Fdistro=trixie
3
url pkg:deb/debian/qemu@1:10.0.8%2Bds-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/qemu@1:10.0.8%2Bds-0%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-9szt-c829-zfdh
1
vulnerability VCID-detn-3zsq-3qh7
2
vulnerability VCID-m47q-17n6-t7gg
3
vulnerability VCID-n71j-fz74-kyhf
4
vulnerability VCID-vcun-y6d5-6uby
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:10.0.8%252Bds-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/qemu@1:10.2.1%2Bds-1?distro=trixie
purl pkg:deb/debian/qemu@1:10.2.1%2Bds-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-9szt-c829-zfdh
1
vulnerability VCID-detn-3zsq-3qh7
2
vulnerability VCID-m47q-17n6-t7gg
3
vulnerability VCID-vcun-y6d5-6uby
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:10.2.1%252Bds-1%3Fdistro=trixie
5
url pkg:deb/debian/qemu@1:10.2.2%2Bds-1?distro=trixie
purl pkg:deb/debian/qemu@1:10.2.2%2Bds-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:10.2.2%252Bds-1%3Fdistro=trixie
6
url pkg:deb/debian/qemu@1:11.0.0%2Bds-1?distro=trixie
purl pkg:deb/debian/qemu@1:11.0.0%2Bds-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:11.0.0%252Bds-1%3Fdistro=trixie
Affected_packages
0
url pkg:rpm/redhat/virtio-win@1.9.33-0?arch=el9_2
purl pkg:rpm/redhat/virtio-win@1.9.33-0?arch=el9_2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7frw-3rxw-gubf
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/virtio-win@1.9.33-0%3Farch=el9_2
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0664.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0664.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-0664
reference_id
reference_type
scores
0
value 0.00019
scoring_system epss
scoring_elements 0.05114
published_at 2026-04-02T12:55:00Z
1
value 0.00019
scoring_system epss
scoring_elements 0.05155
published_at 2026-04-13T12:55:00Z
2
value 0.00019
scoring_system epss
scoring_elements 0.05168
published_at 2026-04-12T12:55:00Z
3
value 0.00019
scoring_system epss
scoring_elements 0.05185
published_at 2026-04-11T12:55:00Z
4
value 0.00019
scoring_system epss
scoring_elements 0.05215
published_at 2026-04-09T12:55:00Z
5
value 0.00019
scoring_system epss
scoring_elements 0.05198
published_at 2026-04-08T12:55:00Z
6
value 0.00019
scoring_system epss
scoring_elements 0.05143
published_at 2026-04-04T12:55:00Z
7
value 0.00019
scoring_system epss
scoring_elements 0.05164
published_at 2026-04-07T12:55:00Z
8
value 0.00022
scoring_system epss
scoring_elements 0.06179
published_at 2026-04-21T12:55:00Z
9
value 0.00022
scoring_system epss
scoring_elements 0.06021
published_at 2026-04-16T12:55:00Z
10
value 0.00022
scoring_system epss
scoring_elements 0.06029
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-0664
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://gitlab.com/qemu-project/qemu/-/commit/07ce178a2b0768eb9e712bb5ad0cf6dc7fcf0158
reference_id 07ce178a2b0768eb9e712bb5ad0cf6dc7fcf0158
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-18T19:15:20Z/
url https://gitlab.com/qemu-project/qemu/-/commit/07ce178a2b0768eb9e712bb5ad0cf6dc7fcf0158
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2167423
reference_id 2167423
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-18T19:15:20Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2167423
5
reference_url https://gitlab.com/qemu-project/qemu/-/commit/88288c2a51faa7c795f053fc8b31b1c16ff804c5
reference_id 88288c2a51faa7c795f053fc8b31b1c16ff804c5
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-18T19:15:20Z/
url https://gitlab.com/qemu-project/qemu/-/commit/88288c2a51faa7c795f053fc8b31b1c16ff804c5
6
reference_url https://lists.nongnu.org/archive/html/qemu-devel/2023-03/msg01445.html
reference_id msg01445.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-18T19:15:20Z/
url https://lists.nongnu.org/archive/html/qemu-devel/2023-03/msg01445.html
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MURWGXDIF2WTDXV36T6HFJDBL632AO7R/
reference_id MURWGXDIF2WTDXV36T6HFJDBL632AO7R
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-18T19:15:20Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MURWGXDIF2WTDXV36T6HFJDBL632AO7R/
8
reference_url https://security.netapp.com/advisory/ntap-20230517-0005/
reference_id ntap-20230517-0005
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-18T19:15:20Z/
url https://security.netapp.com/advisory/ntap-20230517-0005/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SEOC7SRJWLZSXCND2ADFW6C76ZMTZLE4/
reference_id SEOC7SRJWLZSXCND2ADFW6C76ZMTZLE4
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-18T19:15:20Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SEOC7SRJWLZSXCND2ADFW6C76ZMTZLE4/
Weaknesses
0
cwe_id 250
name Execution with Unnecessary Privileges
description The product performs an operation at a privilege level that is higher than the minimum level required, which creates new weaknesses or amplifies the consequences of other weaknesses.
1
cwe_id 269
name Improper Privilege Management
description The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Exploits
Severity_range_score7.8 - 7.8
Exploitability0.5
Weighted_severity7.0
Risk_score3.5
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-7frw-3rxw-gubf