Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-qmas-wuze-akfs
Summaryspice-client: Insufficient encoding checks for LZ can cause different integer/buffer overflows
Aliases
0
alias CVE-2018-10893
Fixed_packages
0
url pkg:deb/debian/spice-gtk@0.37-1?distro=trixie
purl pkg:deb/debian/spice-gtk@0.37-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice-gtk@0.37-1%3Fdistro=trixie
1
url pkg:deb/debian/spice-gtk@0.39-1
purl pkg:deb/debian/spice-gtk@0.39-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice-gtk@0.39-1
2
url pkg:deb/debian/spice-gtk@0.39-1?distro=trixie
purl pkg:deb/debian/spice-gtk@0.39-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice-gtk@0.39-1%3Fdistro=trixie
3
url pkg:deb/debian/spice-gtk@0.42-1?distro=trixie
purl pkg:deb/debian/spice-gtk@0.42-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice-gtk@0.42-1%3Fdistro=trixie
4
url pkg:deb/debian/spice-gtk@0.42-3?distro=trixie
purl pkg:deb/debian/spice-gtk@0.42-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice-gtk@0.42-3%3Fdistro=trixie
5
url pkg:deb/debian/spice-gtk@0.42-4?distro=trixie
purl pkg:deb/debian/spice-gtk@0.42-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice-gtk@0.42-4%3Fdistro=trixie
Affected_packages
0
url pkg:deb/debian/spice-gtk@0.12-5
purl pkg:deb/debian/spice-gtk@0.12-5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-15db-nrnx-wbcw
1
vulnerability VCID-84zq-fpr5-mbcz
2
vulnerability VCID-btxr-2zwf-hfdc
3
vulnerability VCID-qmas-wuze-akfs
4
vulnerability VCID-zd81-hvyk-3fbu
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice-gtk@0.12-5
1
url pkg:deb/debian/spice-gtk@0.25-1
purl pkg:deb/debian/spice-gtk@0.25-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-15db-nrnx-wbcw
1
vulnerability VCID-btxr-2zwf-hfdc
2
vulnerability VCID-qmas-wuze-akfs
3
vulnerability VCID-zd81-hvyk-3fbu
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice-gtk@0.25-1
2
url pkg:deb/debian/spice-gtk@0.33-3.3%2Bdeb9u1
purl pkg:deb/debian/spice-gtk@0.33-3.3%2Bdeb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-15db-nrnx-wbcw
1
vulnerability VCID-btxr-2zwf-hfdc
2
vulnerability VCID-qmas-wuze-akfs
3
vulnerability VCID-zd81-hvyk-3fbu
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice-gtk@0.33-3.3%252Bdeb9u1
3
url pkg:deb/debian/spice-gtk@0.35-2
purl pkg:deb/debian/spice-gtk@0.35-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-15db-nrnx-wbcw
1
vulnerability VCID-qmas-wuze-akfs
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice-gtk@0.35-2
4
url pkg:rpm/redhat/libgovirt@0.3.4-3?arch=el7
purl pkg:rpm/redhat/libgovirt@0.3.4-3?arch=el7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qmas-wuze-akfs
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/libgovirt@0.3.4-3%3Farch=el7
5
url pkg:rpm/redhat/spice-gtk@0.26-8.el6_10?arch=2
purl pkg:rpm/redhat/spice-gtk@0.26-8.el6_10?arch=2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qmas-wuze-akfs
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/spice-gtk@0.26-8.el6_10%3Farch=2
6
url pkg:rpm/redhat/spice-gtk@0.35-4?arch=el7
purl pkg:rpm/redhat/spice-gtk@0.35-4?arch=el7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qmas-wuze-akfs
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/spice-gtk@0.35-4%3Farch=el7
7
url pkg:rpm/redhat/spice-vdagent@0.14.0-18?arch=el7
purl pkg:rpm/redhat/spice-vdagent@0.14.0-18?arch=el7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qmas-wuze-akfs
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/spice-vdagent@0.14.0-18%3Farch=el7
8
url pkg:rpm/redhat/virt-viewer@5.0-15?arch=el7
purl pkg:rpm/redhat/virt-viewer@5.0-15?arch=el7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qmas-wuze-akfs
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/virt-viewer@5.0-15%3Farch=el7
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10893.json
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10893.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-10893
reference_id
reference_type
scores
0
value 0.00347
scoring_system epss
scoring_elements 0.57222
published_at 2026-04-01T12:55:00Z
1
value 0.00347
scoring_system epss
scoring_elements 0.57304
published_at 2026-04-02T12:55:00Z
2
value 0.00347
scoring_system epss
scoring_elements 0.57327
published_at 2026-04-04T12:55:00Z
3
value 0.00347
scoring_system epss
scoring_elements 0.57303
published_at 2026-04-07T12:55:00Z
4
value 0.00347
scoring_system epss
scoring_elements 0.57355
published_at 2026-04-08T12:55:00Z
5
value 0.00347
scoring_system epss
scoring_elements 0.57358
published_at 2026-04-09T12:55:00Z
6
value 0.00347
scoring_system epss
scoring_elements 0.57372
published_at 2026-04-11T12:55:00Z
7
value 0.00384
scoring_system epss
scoring_elements 0.59693
published_at 2026-04-18T12:55:00Z
8
value 0.00384
scoring_system epss
scoring_elements 0.59672
published_at 2026-04-12T12:55:00Z
9
value 0.00384
scoring_system epss
scoring_elements 0.59653
published_at 2026-04-13T12:55:00Z
10
value 0.00384
scoring_system epss
scoring_elements 0.59685
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-10893
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10893
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10893
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1598234
reference_id 1598234
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1598234
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=904161
reference_id 904161
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=904161
6
reference_url https://access.redhat.com/errata/RHSA-2019:2229
reference_id RHSA-2019:2229
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2229
7
reference_url https://access.redhat.com/errata/RHSA-2020:0471
reference_id RHSA-2020:0471
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0471
Weaknesses
0
cwe_id 190
name Integer Overflow or Wraparound
description The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Exploits
Severity_range_score7.6 - 7.6
Exploitability0.5
Weighted_severity6.8
Risk_score3.4
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-qmas-wuze-akfs