Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-6q61-guu4-r7d3
Summarydpdk: Information exposure in unchecked guest physical to host virtual address translations
Aliases
0
alias CVE-2018-1059
Fixed_packages
0
url pkg:deb/debian/dpdk@17.11.2-1?distro=trixie
purl pkg:deb/debian/dpdk@17.11.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dpdk@17.11.2-1%3Fdistro=trixie
1
url pkg:deb/debian/dpdk@18.11.11-1~deb10u1
purl pkg:deb/debian/dpdk@18.11.11-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-35ue-vw4t-sqbg
1
vulnerability VCID-4swn-75b9-wfa2
2
vulnerability VCID-5n3a-tp6w-g3an
3
vulnerability VCID-9pmw-ntz3-53aa
4
vulnerability VCID-9xpq-nv7z-wyhb
5
vulnerability VCID-a6u2-jbgk-sqas
6
vulnerability VCID-n7c7-rw39-kucj
7
vulnerability VCID-r27k-72yv-tfbu
8
vulnerability VCID-s97p-pagr-5fch
9
vulnerability VCID-ugjw-vc2f-1qeb
10
vulnerability VCID-vqxb-ey46-qyem
11
vulnerability VCID-xdnp-mb3d-qqej
12
vulnerability VCID-xxh9-badb-ubdb
13
vulnerability VCID-y12m-14rq-nuf1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dpdk@18.11.11-1~deb10u1
2
url pkg:deb/debian/dpdk@20.11.10-1~deb11u1?distro=trixie
purl pkg:deb/debian/dpdk@20.11.10-1~deb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hf2x-6f8d-c7er
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dpdk@20.11.10-1~deb11u1%3Fdistro=trixie
3
url pkg:deb/debian/dpdk@22.11.11-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/dpdk@22.11.11-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hf2x-6f8d-c7er
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dpdk@22.11.11-0%252Bdeb12u1%3Fdistro=trixie
4
url pkg:deb/debian/dpdk@24.11.4-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/dpdk@24.11.4-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dpdk@24.11.4-0%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/dpdk@25.11-2?distro=trixie
purl pkg:deb/debian/dpdk@25.11-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dpdk@25.11-2%3Fdistro=trixie
Affected_packages
0
url pkg:deb/debian/dpdk@16.11-1~bpo8%2B1
purl pkg:deb/debian/dpdk@16.11-1~bpo8%2B1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-35ue-vw4t-sqbg
1
vulnerability VCID-4swn-75b9-wfa2
2
vulnerability VCID-5n3a-tp6w-g3an
3
vulnerability VCID-6q61-guu4-r7d3
4
vulnerability VCID-9pmw-ntz3-53aa
5
vulnerability VCID-9xpq-nv7z-wyhb
6
vulnerability VCID-a6u2-jbgk-sqas
7
vulnerability VCID-n7c7-rw39-kucj
8
vulnerability VCID-r27k-72yv-tfbu
9
vulnerability VCID-s97p-pagr-5fch
10
vulnerability VCID-ugjw-vc2f-1qeb
11
vulnerability VCID-vqxb-ey46-qyem
12
vulnerability VCID-xdnp-mb3d-qqej
13
vulnerability VCID-xhkb-yfwh-vfaw
14
vulnerability VCID-xxh9-badb-ubdb
15
vulnerability VCID-y12m-14rq-nuf1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dpdk@16.11-1~bpo8%252B1
1
url pkg:deb/debian/dpdk@16.11.11-1%2Bdeb9u2
purl pkg:deb/debian/dpdk@16.11.11-1%2Bdeb9u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-35ue-vw4t-sqbg
1
vulnerability VCID-4swn-75b9-wfa2
2
vulnerability VCID-5n3a-tp6w-g3an
3
vulnerability VCID-6q61-guu4-r7d3
4
vulnerability VCID-9pmw-ntz3-53aa
5
vulnerability VCID-9xpq-nv7z-wyhb
6
vulnerability VCID-a6u2-jbgk-sqas
7
vulnerability VCID-n7c7-rw39-kucj
8
vulnerability VCID-r27k-72yv-tfbu
9
vulnerability VCID-s97p-pagr-5fch
10
vulnerability VCID-ugjw-vc2f-1qeb
11
vulnerability VCID-vqxb-ey46-qyem
12
vulnerability VCID-xdnp-mb3d-qqej
13
vulnerability VCID-xhkb-yfwh-vfaw
14
vulnerability VCID-xxh9-badb-ubdb
15
vulnerability VCID-y12m-14rq-nuf1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dpdk@16.11.11-1%252Bdeb9u2
2
url pkg:rpm/redhat/dpdk@17.11-11?arch=el7
purl pkg:rpm/redhat/dpdk@17.11-11?arch=el7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6q61-guu4-r7d3
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/dpdk@17.11-11%3Farch=el7
3
url pkg:rpm/redhat/openstack-selinux@0.8.14-5?arch=el7ost
purl pkg:rpm/redhat/openstack-selinux@0.8.14-5?arch=el7ost
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6q61-guu4-r7d3
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openstack-selinux@0.8.14-5%3Farch=el7ost
4
url pkg:rpm/redhat/openvswitch@2.9.0-19?arch=el7fdp
purl pkg:rpm/redhat/openvswitch@2.9.0-19?arch=el7fdp
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6q61-guu4-r7d3
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openvswitch@2.9.0-19%3Farch=el7fdp
5
url pkg:rpm/redhat/openvswitch@2.9.0-19.el7fdp?arch=1
purl pkg:rpm/redhat/openvswitch@2.9.0-19.el7fdp?arch=1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6q61-guu4-r7d3
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openvswitch@2.9.0-19.el7fdp%3Farch=1
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1059.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1059.json
1
reference_url https://access.redhat.com/security/cve/cve-2018-1059
reference_id
reference_type
scores
url https://access.redhat.com/security/cve/cve-2018-1059
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1059
reference_id
reference_type
scores
0
value 0.00184
scoring_system epss
scoring_elements 0.40008
published_at 2026-04-01T12:55:00Z
1
value 0.00184
scoring_system epss
scoring_elements 0.40064
published_at 2026-04-21T12:55:00Z
2
value 0.00184
scoring_system epss
scoring_elements 0.40123
published_at 2026-04-13T12:55:00Z
3
value 0.00184
scoring_system epss
scoring_elements 0.40173
published_at 2026-04-16T12:55:00Z
4
value 0.00184
scoring_system epss
scoring_elements 0.40155
published_at 2026-04-02T12:55:00Z
5
value 0.00184
scoring_system epss
scoring_elements 0.40181
published_at 2026-04-04T12:55:00Z
6
value 0.00184
scoring_system epss
scoring_elements 0.40104
published_at 2026-04-07T12:55:00Z
7
value 0.00184
scoring_system epss
scoring_elements 0.40157
published_at 2026-04-08T12:55:00Z
8
value 0.00184
scoring_system epss
scoring_elements 0.4017
published_at 2026-04-09T12:55:00Z
9
value 0.00184
scoring_system epss
scoring_elements 0.4018
published_at 2026-04-11T12:55:00Z
10
value 0.00184
scoring_system epss
scoring_elements 0.40143
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1059
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1059
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1059
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1544298
reference_id 1544298
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1544298
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=896688
reference_id 896688
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=896688
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:dpdk:data_plane_development_kit:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:dpdk:data_plane_development_kit:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:dpdk:data_plane_development_kit:*:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:ceph_storage:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage:3.0:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:enterprise_linux_fast_datapath:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:enterprise_linux_fast_datapath:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:enterprise_linux_fast_datapath:7.0:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:3.0:*:*:*:enterprise:*:*:*
reference_id cpe:2.3:a:redhat:openshift:3.0:*:*:*:enterprise:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:3.0:*:*:*:enterprise:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openstack:11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:11:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openstack:8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:8:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openstack:9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:9:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization:4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:virtualization:4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization:4.1:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization_manager:4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:virtualization_manager:4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization_manager:4.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-1059
reference_id CVE-2018-1059
reference_type
scores
0
value 2.9
scoring_system cvssv2
scoring_elements AV:A/AC:M/Au:N/C:P/I:N/A:N
1
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2018-1059
22
reference_url https://access.redhat.com/errata/RHSA-2018:1267
reference_id RHSA-2018:1267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1267
23
reference_url https://access.redhat.com/errata/RHSA-2018:2038
reference_id RHSA-2018:2038
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2038
24
reference_url https://access.redhat.com/errata/RHSA-2018:2102
reference_id RHSA-2018:2102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2102
25
reference_url https://access.redhat.com/errata/RHSA-2018:2524
reference_id RHSA-2018:2524
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2524
26
reference_url https://usn.ubuntu.com/3642-1/
reference_id USN-3642-1
reference_type
scores
url https://usn.ubuntu.com/3642-1/
27
reference_url https://usn.ubuntu.com/3642-2/
reference_id USN-3642-2
reference_type
scores
url https://usn.ubuntu.com/3642-2/
Weaknesses
0
cwe_id 200
name Exposure of Sensitive Information to an Unauthorized Actor
description The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Exploits
Severity_range_score2.9 - 6.1
Exploitability0.5
Weighted_severity5.5
Risk_score2.8
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-6q61-guu4-r7d3