Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/1036596?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/1036596?format=api", "purl": "pkg:deb/debian/libvirt@1.2.9-9", "type": "deb", "namespace": "debian", "name": "libvirt", "version": "1.2.9-9", "qualifiers": {}, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": "11.3.0-2~bpo12+1", "latest_non_vulnerable_version": "11.3.0-2~bpo12+1", "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36440?format=api", "vulnerability_id": "VCID-2ska-hmbg-kqdw", "summary": "Multiple vulnerabilities have been discovered in libvirt, the worst of which could lead to a denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2494.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2494.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-2494", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07403", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07157", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07123", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07139", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07293", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07375", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07354", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07368", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07082", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07136", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07168", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07165", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07155", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07146", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07058", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07188", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07851", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07899", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-2494" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2494", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2494" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1067461", "reference_id": "1067461", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1067461" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270115", "reference_id": "2270115", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T15:14:30Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270115" }, { "reference_url": "https://lists.libvirt.org/archives/list/devel@lists.libvirt.org/thread/BKRQXPLPC6B7FLHJXSBQYW7HNDEBW6RJ/", "reference_id": "BKRQXPLPC6B7FLHJXSBQYW7HNDEBW6RJ", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T15:14:30Z/" } ], "url": "https://lists.libvirt.org/archives/list/devel@lists.libvirt.org/thread/BKRQXPLPC6B7FLHJXSBQYW7HNDEBW6RJ/" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_virtualization:8::el8", "reference_id": "cpe:/a:redhat:advanced_virtualization:8::el8", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_virtualization:8::el8" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream", "reference_id": "cpe:/a:redhat:enterprise_linux:8::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb", "reference_id": "cpe:/a:redhat:enterprise_linux:8::crb", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream", "reference_id": "cpe:/a:redhat:enterprise_linux:9::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb", "reference_id": "cpe:/a:redhat:enterprise_linux:9::crb", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6", "reference_id": "cpe:/o:redhat:enterprise_linux:6", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7", "reference_id": "cpe:/o:redhat:enterprise_linux:7", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2024-2494", "reference_id": "CVE-2024-2494", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T15:14:30Z/" } ], "url": "https://access.redhat.com/security/cve/CVE-2024-2494" }, { "reference_url": "https://security.gentoo.org/glsa/202412-16", "reference_id": "GLSA-202412-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-16" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2560", "reference_id": "RHSA-2024:2560", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T15:14:30Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2024:2560" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3253", "reference_id": "RHSA-2024:3253", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T15:14:30Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2024:3253" }, { "reference_url": "https://usn.ubuntu.com/6734-1/", "reference_id": "USN-6734-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6734-1/" }, { "reference_url": "https://usn.ubuntu.com/6734-2/", "reference_id": "USN-6734-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6734-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051146?format=api", "purl": "pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ubdh-hdtv-akgt" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3" } ], "aliases": [ "CVE-2024-2494" ], "risk_score": 2.8, "exploitability": "0.5", "weighted_severity": "5.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2ska-hmbg-kqdw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/73229?format=api", "vulnerability_id": "VCID-3xk5-72kc-5uhu", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1064.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1064.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1064", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80523", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80529", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80552", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80543", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80572", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80582", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80599", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80586", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80578", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80606", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80608", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80612", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80637", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.8064", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80656", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80674", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80695", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80715", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80709", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.80727", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.01419", "scoring_system": "epss", "scoring_elements": "0.8077", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1064" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1064", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1064" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550672", "reference_id": "1550672", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550672" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1396", "reference_id": "RHSA-2018:1396", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1396" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1929", "reference_id": "RHSA-2018:1929", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1929" }, { "reference_url": "https://usn.ubuntu.com/3680-1/", "reference_id": "USN-3680-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3680-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036598?format=api", "purl": "pkg:deb/debian/libvirt@1.2.9-9%2Bdeb8u5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ska-hmbg-kqdw" }, { "vulnerability": "VCID-3xk5-72kc-5uhu" }, { "vulnerability": "VCID-3zke-md7v-6be5" }, { "vulnerability": "VCID-425h-bz55-yfad" }, { "vulnerability": "VCID-4gha-yszs-x3hw" }, { "vulnerability": "VCID-5a7s-trej-63cj" }, { "vulnerability": "VCID-5pky-1svz-nqf6" }, { "vulnerability": "VCID-5ub6-8d2s-53hj" }, { "vulnerability": "VCID-8bqx-15w5-4kdm" }, { "vulnerability": "VCID-a5ed-jnjb-pybr" }, { "vulnerability": "VCID-b489-x5z3-pkfh" }, { "vulnerability": "VCID-bsjb-frkp-b3an" }, { "vulnerability": "VCID-c628-5r9h-37ad" }, { "vulnerability": "VCID-cue5-u48q-87ft" }, { "vulnerability": "VCID-e93r-zft5-33dk" }, { "vulnerability": "VCID-gc5z-hy4a-8uft" }, { "vulnerability": "VCID-gp93-s21f-8fh7" }, { "vulnerability": "VCID-hpgc-t8mr-qkan" }, { "vulnerability": "VCID-ju7x-j33y-8khv" }, { "vulnerability": "VCID-nfem-925f-bfdw" }, { "vulnerability": "VCID-nqd8-35a9-7bc5" }, { "vulnerability": "VCID-pqce-1qud-kbef" }, { "vulnerability": "VCID-r65y-py21-u3eu" }, { "vulnerability": "VCID-re7g-2nvj-j3dp" }, { "vulnerability": "VCID-smdn-m8vh-9bb8" }, { "vulnerability": "VCID-wf9y-4uwu-gkaz" }, { "vulnerability": "VCID-whhu-jy51-qkec" }, { "vulnerability": "VCID-wkrz-dcvc-5ugc" }, { "vulnerability": "VCID-ypmp-rsaw-s3hb" }, { "vulnerability": "VCID-yvkr-qhaj-bfcx" }, { "vulnerability": "VCID-zj24-rwt5-g3dg" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@1.2.9-9%252Bdeb8u5" }, { "url": "http://public2.vulnerablecode.io/api/packages/1037235?format=api", "purl": "pkg:deb/debian/libvirt@3.0.0-4%2Bdeb9u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ska-hmbg-kqdw" }, { "vulnerability": "VCID-3xk5-72kc-5uhu" }, { "vulnerability": "VCID-425h-bz55-yfad" }, { "vulnerability": "VCID-5a7s-trej-63cj" }, { "vulnerability": "VCID-5pky-1svz-nqf6" }, { "vulnerability": "VCID-5ub6-8d2s-53hj" }, { "vulnerability": "VCID-a5ed-jnjb-pybr" }, { "vulnerability": "VCID-b489-x5z3-pkfh" }, { "vulnerability": "VCID-bsjb-frkp-b3an" }, { "vulnerability": "VCID-c628-5r9h-37ad" }, { "vulnerability": "VCID-cue5-u48q-87ft" }, { "vulnerability": "VCID-e93r-zft5-33dk" }, { "vulnerability": "VCID-gc5z-hy4a-8uft" }, { "vulnerability": "VCID-gp93-s21f-8fh7" }, { "vulnerability": "VCID-ju7x-j33y-8khv" }, { "vulnerability": "VCID-nfem-925f-bfdw" }, { "vulnerability": "VCID-nqd8-35a9-7bc5" }, { "vulnerability": "VCID-r65y-py21-u3eu" }, { "vulnerability": "VCID-re7g-2nvj-j3dp" }, { "vulnerability": "VCID-wf9y-4uwu-gkaz" }, { "vulnerability": "VCID-whhu-jy51-qkec" }, { "vulnerability": "VCID-wkrz-dcvc-5ugc" }, { "vulnerability": "VCID-ypmp-rsaw-s3hb" }, { "vulnerability": "VCID-yvkr-qhaj-bfcx" }, { "vulnerability": "VCID-zj24-rwt5-g3dg" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@3.0.0-4%252Bdeb9u4" }, { "url": "http://public2.vulnerablecode.io/api/packages/1050918?format=api", "purl": "pkg:deb/debian/libvirt@5.0.0-4%2Bdeb10u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ska-hmbg-kqdw" }, { "vulnerability": "VCID-5a7s-trej-63cj" }, { "vulnerability": "VCID-5pky-1svz-nqf6" }, { "vulnerability": "VCID-5ub6-8d2s-53hj" }, { "vulnerability": "VCID-bsjb-frkp-b3an" }, { "vulnerability": "VCID-c628-5r9h-37ad" }, { "vulnerability": "VCID-cue5-u48q-87ft" }, { "vulnerability": "VCID-ju7x-j33y-8khv" }, { "vulnerability": "VCID-nqd8-35a9-7bc5" }, { "vulnerability": "VCID-r65y-py21-u3eu" }, { "vulnerability": "VCID-wf9y-4uwu-gkaz" }, { "vulnerability": "VCID-wkrz-dcvc-5ugc" }, { "vulnerability": "VCID-ypmp-rsaw-s3hb" }, { "vulnerability": "VCID-zj24-rwt5-g3dg" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@5.0.0-4%252Bdeb10u1" } ], "aliases": [ "CVE-2018-1064" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3xk5-72kc-5uhu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84598?format=api", "vulnerability_id": "VCID-3zke-md7v-6be5", "summary": "libvirt: Null pointer dereference when updating storage size on empty drives", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2635.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2635.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2635", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.55145", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.55246", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.5527", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.55249", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.55299", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.553", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.55311", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.55291", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.55272", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.55314", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.55293", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.5523", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.55251", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.55223", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.55172", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.55215", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.55273", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.55232", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.55257", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.55318", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2635" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2635", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2635" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "1.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1427090", "reference_id": "1427090", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1427090" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=856313", "reference_id": "856313", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=856313" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037234?format=api", "purl": "pkg:deb/debian/libvirt@3.0.0-4%2Bdeb9u2~bpo8%2B1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ska-hmbg-kqdw" }, { "vulnerability": "VCID-3xk5-72kc-5uhu" }, { "vulnerability": "VCID-425h-bz55-yfad" }, { "vulnerability": "VCID-5a7s-trej-63cj" }, { "vulnerability": "VCID-5pky-1svz-nqf6" }, { "vulnerability": "VCID-5ub6-8d2s-53hj" }, { "vulnerability": "VCID-a5ed-jnjb-pybr" }, { "vulnerability": "VCID-b489-x5z3-pkfh" }, { "vulnerability": "VCID-bsjb-frkp-b3an" }, { "vulnerability": "VCID-c628-5r9h-37ad" }, { "vulnerability": "VCID-cue5-u48q-87ft" }, { "vulnerability": "VCID-e93r-zft5-33dk" }, { "vulnerability": "VCID-gc5z-hy4a-8uft" }, { "vulnerability": "VCID-gp93-s21f-8fh7" }, { "vulnerability": "VCID-ju7x-j33y-8khv" }, { "vulnerability": "VCID-nfem-925f-bfdw" }, { "vulnerability": "VCID-nqd8-35a9-7bc5" }, { "vulnerability": "VCID-r65y-py21-u3eu" }, { "vulnerability": "VCID-re7g-2nvj-j3dp" }, { "vulnerability": "VCID-wf9y-4uwu-gkaz" }, { "vulnerability": "VCID-whhu-jy51-qkec" }, { "vulnerability": "VCID-wkrz-dcvc-5ugc" }, { "vulnerability": "VCID-ypmp-rsaw-s3hb" }, { "vulnerability": "VCID-yvkr-qhaj-bfcx" }, { "vulnerability": "VCID-zj24-rwt5-g3dg" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@3.0.0-4%252Bdeb9u2~bpo8%252B1" } ], "aliases": [ "CVE-2017-2635" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "6.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3zke-md7v-6be5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82883?format=api", "vulnerability_id": "VCID-425h-bz55-yfad", "summary": "libvirt: NULL pointer dereference after running qemuAgentCommand in qemuAgentGetInterfaces function", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00101.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00101.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00105.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00105.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3840.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3840.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-3840", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00709", "scoring_system": "epss", "scoring_elements": "0.72161", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00709", "scoring_system": "epss", "scoring_elements": "0.72388", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00709", "scoring_system": "epss", "scoring_elements": "0.72315", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00709", "scoring_system": "epss", "scoring_elements": "0.72342", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00709", "scoring_system": "epss", "scoring_elements": "0.72304", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00709", "scoring_system": "epss", "scoring_elements": "0.7233", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00709", "scoring_system": "epss", "scoring_elements": "0.72167", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00709", "scoring_system": "epss", "scoring_elements": "0.72187", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00709", "scoring_system": "epss", "scoring_elements": "0.72164", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00709", "scoring_system": "epss", "scoring_elements": "0.72201", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00709", "scoring_system": "epss", "scoring_elements": "0.72213", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00709", "scoring_system": "epss", "scoring_elements": "0.72236", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00709", "scoring_system": "epss", "scoring_elements": "0.7222", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00709", "scoring_system": "epss", "scoring_elements": "0.72206", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00709", "scoring_system": "epss", "scoring_elements": "0.72249", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00709", "scoring_system": "epss", "scoring_elements": "0.72259", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00709", "scoring_system": "epss", "scoring_elements": "0.72246", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00709", "scoring_system": "epss", "scoring_elements": "0.72292", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00709", "scoring_system": "epss", "scoring_elements": "0.723", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00709", "scoring_system": "epss", "scoring_elements": "0.72297", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00709", "scoring_system": "epss", "scoring_elements": "0.72286", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-3840" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1663051", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1663051" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3840", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3840" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3840", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3840" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TZRP2BRMI4RYFRPNFTTIAAUOGVN2ORP7/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TZRP2BRMI4RYFRPNFTTIAAUOGVN2ORP7/" }, { "reference_url": "https://www.redhat.com/archives/libvir-list/2019-January/msg00241.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.redhat.com/archives/libvir-list/2019-January/msg00241.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1665228", "reference_id": "1665228", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1665228" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3840", "reference_id": "CVE-2019-3840", "reference_type": "", "scores": [ { "value": "3.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:S/C:N/I:N/A:P" }, { "value": "5.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:N/A:H" }, { "value": "6.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3840" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2294", "reference_id": "RHSA-2019:2294", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2294" }, { "reference_url": "https://usn.ubuntu.com/3909-1/", "reference_id": "USN-3909-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3909-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050918?format=api", "purl": "pkg:deb/debian/libvirt@5.0.0-4%2Bdeb10u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ska-hmbg-kqdw" }, { "vulnerability": "VCID-5a7s-trej-63cj" }, { "vulnerability": "VCID-5pky-1svz-nqf6" }, { "vulnerability": "VCID-5ub6-8d2s-53hj" }, { "vulnerability": "VCID-bsjb-frkp-b3an" }, { "vulnerability": "VCID-c628-5r9h-37ad" }, { "vulnerability": "VCID-cue5-u48q-87ft" }, { "vulnerability": "VCID-ju7x-j33y-8khv" }, { "vulnerability": "VCID-nqd8-35a9-7bc5" }, { "vulnerability": "VCID-r65y-py21-u3eu" }, { "vulnerability": "VCID-wf9y-4uwu-gkaz" }, { "vulnerability": "VCID-wkrz-dcvc-5ugc" }, { "vulnerability": "VCID-ypmp-rsaw-s3hb" }, { "vulnerability": "VCID-zj24-rwt5-g3dg" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@5.0.0-4%252Bdeb10u1" } ], "aliases": [ "CVE-2019-3840" ], "risk_score": 2.9, "exploitability": "0.5", "weighted_severity": "5.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-425h-bz55-yfad" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59333?format=api", "vulnerability_id": "VCID-4gha-yszs-x3hw", "summary": "Libvirt is vulnerable to directory traversal when using Access\n Control Lists (ACL).", "references": [ { "reference_url": "http://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=034e47c338b13a95cf02106a3af912c1c5f818d7", "reference_id": "", "reference_type": "", "scores": [], "url": "http://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=034e47c338b13a95cf02106a3af912c1c5f818d7" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174404.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174404.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2577.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-2577.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5313.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5313.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-5313", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17705", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17589", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17753", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17914", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17968", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17669", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17757", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17819", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17835", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17792", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17744", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17689", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17698", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17736", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17645", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17621", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17575", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17433", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17525", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17625", "published_at": "2026-05-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-5313" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5313", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5313" }, { "reference_url": "http://security.libvirt.org/2015/0004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.libvirt.org/2015/0004.html" }, { "reference_url": "https://www.redhat.com/archives/libvir-list/2015-December/msg00473.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.redhat.com/archives/libvir-list/2015-December/msg00473.html" }, { "reference_url": "http://www.securityfocus.com/bid/90913", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/90913" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1277121", "reference_id": "1277121", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1277121" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=808273", "reference_id": "808273", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=808273" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5313", "reference_id": "CVE-2015-5313", "reference_type": "", "scores": [ { "value": "1.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:N/I:P/A:N" }, { "value": "2.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5313" }, { "reference_url": "https://security.gentoo.org/glsa/201612-10", "reference_id": "GLSA-201612-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201612-10" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2577", "reference_id": "RHSA-2016:2577", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2577" }, { "reference_url": "https://usn.ubuntu.com/2867-1/", "reference_id": "USN-2867-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2867-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037234?format=api", "purl": "pkg:deb/debian/libvirt@3.0.0-4%2Bdeb9u2~bpo8%2B1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ska-hmbg-kqdw" }, { "vulnerability": "VCID-3xk5-72kc-5uhu" }, { "vulnerability": "VCID-425h-bz55-yfad" }, { "vulnerability": "VCID-5a7s-trej-63cj" }, { "vulnerability": "VCID-5pky-1svz-nqf6" }, { "vulnerability": "VCID-5ub6-8d2s-53hj" }, { "vulnerability": "VCID-a5ed-jnjb-pybr" }, { "vulnerability": "VCID-b489-x5z3-pkfh" }, { "vulnerability": "VCID-bsjb-frkp-b3an" }, { "vulnerability": "VCID-c628-5r9h-37ad" }, { "vulnerability": "VCID-cue5-u48q-87ft" }, { "vulnerability": "VCID-e93r-zft5-33dk" }, { "vulnerability": "VCID-gc5z-hy4a-8uft" }, { "vulnerability": "VCID-gp93-s21f-8fh7" }, { "vulnerability": "VCID-ju7x-j33y-8khv" }, { "vulnerability": "VCID-nfem-925f-bfdw" }, { "vulnerability": "VCID-nqd8-35a9-7bc5" }, { "vulnerability": "VCID-r65y-py21-u3eu" }, { "vulnerability": "VCID-re7g-2nvj-j3dp" }, { "vulnerability": "VCID-wf9y-4uwu-gkaz" }, { "vulnerability": "VCID-whhu-jy51-qkec" }, { "vulnerability": "VCID-wkrz-dcvc-5ugc" }, { "vulnerability": "VCID-ypmp-rsaw-s3hb" }, { "vulnerability": "VCID-yvkr-qhaj-bfcx" }, { "vulnerability": "VCID-zj24-rwt5-g3dg" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@3.0.0-4%252Bdeb9u2~bpo8%252B1" } ], "aliases": [ "CVE-2015-5313" ], "risk_score": 1.1, "exploitability": "0.5", "weighted_severity": "2.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4gha-yszs-x3hw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81776?format=api", "vulnerability_id": "VCID-5a7s-trej-63cj", "summary": "libvirt: Potential DoS by holding a monitor job while querying QEMU guest-agent", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-20485.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-20485.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-20485", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00192", "scoring_system": "epss", "scoring_elements": "0.41033", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00192", "scoring_system": "epss", "scoring_elements": "0.40795", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00192", "scoring_system": "epss", "scoring_elements": "0.40791", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00192", "scoring_system": "epss", "scoring_elements": "0.40697", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00192", "scoring_system": "epss", "scoring_elements": "0.40722", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00192", "scoring_system": "epss", "scoring_elements": "0.41115", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00192", "scoring_system": "epss", "scoring_elements": "0.41146", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00192", "scoring_system": "epss", "scoring_elements": "0.41072", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00192", "scoring_system": "epss", "scoring_elements": "0.41121", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00192", "scoring_system": "epss", "scoring_elements": "0.41128", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00192", "scoring_system": "epss", "scoring_elements": "0.41148", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00192", "scoring_system": "epss", "scoring_elements": "0.41098", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00192", "scoring_system": "epss", "scoring_elements": "0.41142", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00192", "scoring_system": "epss", "scoring_elements": "0.41113", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00192", "scoring_system": "epss", "scoring_elements": "0.41039", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00192", "scoring_system": "epss", "scoring_elements": "0.40943", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00192", "scoring_system": "epss", "scoring_elements": "0.4093", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00192", "scoring_system": "epss", "scoring_elements": "0.40846", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00192", "scoring_system": "epss", "scoring_elements": "0.40703", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00192", "scoring_system": "epss", "scoring_elements": "0.40776", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-20485" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=953078", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=953078" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20485", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20485" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=a663a860819287e041c3de672aad1d8543098ecc", "reference_id": "", "reference_type": "", "scores": [], "url": "https://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=a663a860819287e041c3de672aad1d8543098ecc" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D5GE6ISYUL3CIWO3FQRUGMKTKP2NYED2/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D5GE6ISYUL3CIWO3FQRUGMKTKP2NYED2/" }, { "reference_url": "https://security-tracker.debian.org/tracker/CVE-2019-20485", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security-tracker.debian.org/tracker/CVE-2019-20485" }, { "reference_url": "https://www.mail-archive.com/debian-bugs-dist%40lists.debian.org/msg1730509.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mail-archive.com/debian-bugs-dist%40lists.debian.org/msg1730509.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1809740", "reference_id": "1809740", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1809740" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20485", "reference_id": "CVE-2019-20485", "reference_type": "", "scores": [ { "value": "2.7", "scoring_system": "cvssv2", "scoring_elements": "AV:A/AC:L/Au:S/C:N/I:N/A:P" }, { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20485" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4000", "reference_id": "RHSA-2020:4000", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4000" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4676", "reference_id": "RHSA-2020:4676", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4676" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051146?format=api", "purl": "pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ubdh-hdtv-akgt" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3" } ], "aliases": [ "CVE-2019-20485" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5a7s-trej-63cj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81495?format=api", "vulnerability_id": "VCID-5pky-1svz-nqf6", "summary": "libvirt: guest agent timeout can be set under read-only mode leading to DoS", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10701.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10701.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-10701", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00242", "scoring_system": "epss", "scoring_elements": "0.47419", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00242", "scoring_system": "epss", "scoring_elements": "0.47453", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00242", "scoring_system": "epss", "scoring_elements": "0.47474", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00242", "scoring_system": "epss", "scoring_elements": "0.47423", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00242", "scoring_system": "epss", "scoring_elements": "0.47478", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00242", "scoring_system": "epss", "scoring_elements": "0.47475", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00242", "scoring_system": "epss", "scoring_elements": "0.47497", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00242", "scoring_system": "epss", "scoring_elements": "0.47473", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00242", "scoring_system": "epss", "scoring_elements": "0.47479", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00242", "scoring_system": "epss", "scoring_elements": "0.47539", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00242", "scoring_system": "epss", "scoring_elements": "0.47531", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00242", "scoring_system": "epss", "scoring_elements": "0.47483", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00242", "scoring_system": "epss", "scoring_elements": "0.47472", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00242", "scoring_system": "epss", "scoring_elements": "0.47427", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00242", "scoring_system": "epss", "scoring_elements": "0.47343", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00242", "scoring_system": "epss", "scoring_elements": "0.47407", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00242", "scoring_system": "epss", "scoring_elements": "0.47368", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00242", "scoring_system": "epss", "scoring_elements": "0.47398", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00242", "scoring_system": "epss", "scoring_elements": "0.47471", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-10701" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10701", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10701" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819163", "reference_id": "1819163", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819163" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=955841", "reference_id": "955841", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=955841" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051146?format=api", "purl": "pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ubdh-hdtv-akgt" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3" } ], "aliases": [ "CVE-2020-10701" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5pky-1svz-nqf6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81675?format=api", "vulnerability_id": "VCID-5ub6-8d2s-53hj", "summary": "libvirt: Potential denial of service via active pool without target path", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10703.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10703.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-10703", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00689", "scoring_system": "epss", "scoring_elements": "0.71717", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00689", "scoring_system": "epss", "scoring_elements": "0.71948", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00689", "scoring_system": "epss", "scoring_elements": "0.7186", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00689", "scoring_system": "epss", "scoring_elements": "0.71889", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00689", "scoring_system": "epss", "scoring_elements": "0.71725", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00689", "scoring_system": "epss", "scoring_elements": "0.71743", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00689", "scoring_system": "epss", "scoring_elements": "0.71718", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00689", "scoring_system": "epss", "scoring_elements": "0.71756", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00689", "scoring_system": "epss", "scoring_elements": "0.71768", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00689", "scoring_system": "epss", "scoring_elements": "0.71792", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00689", "scoring_system": "epss", "scoring_elements": "0.71775", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00689", "scoring_system": "epss", "scoring_elements": "0.71757", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00689", "scoring_system": "epss", "scoring_elements": "0.718", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00689", "scoring_system": "epss", "scoring_elements": "0.71806", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00689", "scoring_system": "epss", "scoring_elements": "0.71788", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00689", "scoring_system": "epss", "scoring_elements": "0.71835", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00689", "scoring_system": "epss", "scoring_elements": "0.7184", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00689", "scoring_system": "epss", "scoring_elements": "0.71843", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00689", "scoring_system": "epss", "scoring_elements": "0.71829", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00689", "scoring_system": "epss", "scoring_elements": "0.71863", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00689", "scoring_system": "epss", "scoring_elements": "0.71896", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-10703" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10703", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10703" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816650", "reference_id": "1816650", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816650" }, { "reference_url": "https://security.archlinux.org/AVG-1174", "reference_id": "AVG-1174", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1174" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4000", "reference_id": "RHSA-2020:4000", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4000" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4676", "reference_id": "RHSA-2020:4676", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4676" }, { "reference_url": "https://usn.ubuntu.com/4371-1/", "reference_id": "USN-4371-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4371-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051146?format=api", "purl": "pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ubdh-hdtv-akgt" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3" } ], "aliases": [ "CVE-2020-10703" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5ub6-8d2s-53hj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81582?format=api", "vulnerability_id": "VCID-8bqx-15w5-4kdm", "summary": "security update", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-07/msg00054.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-07/msg00054.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-07/msg00055.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-07/msg00055.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00024.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00024.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2577.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-2577.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5008.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5008.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5008", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02119", "scoring_system": "epss", "scoring_elements": "0.84066", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02119", "scoring_system": "epss", "scoring_elements": "0.84309", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.02119", "scoring_system": "epss", "scoring_elements": "0.84261", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.02119", "scoring_system": "epss", "scoring_elements": "0.8426", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.02119", "scoring_system": "epss", "scoring_elements": "0.84277", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.02119", "scoring_system": "epss", "scoring_elements": "0.84079", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02119", "scoring_system": "epss", "scoring_elements": "0.84096", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02119", "scoring_system": "epss", "scoring_elements": "0.84098", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02119", "scoring_system": "epss", "scoring_elements": "0.84121", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02119", "scoring_system": "epss", "scoring_elements": "0.84127", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02119", "scoring_system": "epss", "scoring_elements": "0.84145", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02119", "scoring_system": "epss", "scoring_elements": "0.84139", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02119", "scoring_system": "epss", "scoring_elements": "0.84135", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02119", "scoring_system": "epss", "scoring_elements": "0.84157", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02119", "scoring_system": "epss", "scoring_elements": "0.84159", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02119", "scoring_system": "epss", "scoring_elements": "0.84163", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02119", "scoring_system": "epss", "scoring_elements": "0.84188", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02119", "scoring_system": "epss", "scoring_elements": "0.84195", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02119", "scoring_system": "epss", "scoring_elements": "0.842", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.02119", "scoring_system": "epss", "scoring_elements": "0.8422", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.02119", "scoring_system": "epss", "scoring_elements": "0.84245", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5008" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1180092", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1180092" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5008", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5008" }, { "reference_url": "http://security.libvirt.org/2016/0001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.libvirt.org/2016/0001.html" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DZZMOMRXNPALA34XDF5NK363KDLAYSTL/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DZZMOMRXNPALA34XDF5NK363KDLAYSTL/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QTQF6LXKEEMJG4VOOCIAPJAD6ACBYP4W/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QTQF6LXKEEMJG4VOOCIAPJAD6ACBYP4W/" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3613", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3613" }, { "reference_url": "http://www.securityfocus.com/bid/91562", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/91562" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1351514", "reference_id": "1351514", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1351514" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5008", "reference_id": "CVE-2016-5008", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N" }, { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5008" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2577", "reference_id": "RHSA-2016:2577", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2577" }, { "reference_url": "https://usn.ubuntu.com/3576-1/", "reference_id": "USN-3576-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3576-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036598?format=api", "purl": "pkg:deb/debian/libvirt@1.2.9-9%2Bdeb8u5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ska-hmbg-kqdw" }, { "vulnerability": "VCID-3xk5-72kc-5uhu" }, { "vulnerability": "VCID-3zke-md7v-6be5" }, { "vulnerability": "VCID-425h-bz55-yfad" }, { "vulnerability": "VCID-4gha-yszs-x3hw" }, { "vulnerability": "VCID-5a7s-trej-63cj" }, { "vulnerability": "VCID-5pky-1svz-nqf6" }, { "vulnerability": "VCID-5ub6-8d2s-53hj" }, { "vulnerability": "VCID-8bqx-15w5-4kdm" }, { "vulnerability": "VCID-a5ed-jnjb-pybr" }, { "vulnerability": "VCID-b489-x5z3-pkfh" }, { "vulnerability": "VCID-bsjb-frkp-b3an" }, { "vulnerability": "VCID-c628-5r9h-37ad" }, { "vulnerability": "VCID-cue5-u48q-87ft" }, { "vulnerability": "VCID-e93r-zft5-33dk" }, { "vulnerability": "VCID-gc5z-hy4a-8uft" }, { "vulnerability": "VCID-gp93-s21f-8fh7" }, { "vulnerability": "VCID-hpgc-t8mr-qkan" }, { "vulnerability": "VCID-ju7x-j33y-8khv" }, { "vulnerability": "VCID-nfem-925f-bfdw" }, { "vulnerability": "VCID-nqd8-35a9-7bc5" }, { "vulnerability": "VCID-pqce-1qud-kbef" }, { "vulnerability": "VCID-r65y-py21-u3eu" }, { "vulnerability": "VCID-re7g-2nvj-j3dp" }, { "vulnerability": "VCID-smdn-m8vh-9bb8" }, { "vulnerability": "VCID-wf9y-4uwu-gkaz" }, { "vulnerability": "VCID-whhu-jy51-qkec" }, { "vulnerability": "VCID-wkrz-dcvc-5ugc" }, { "vulnerability": "VCID-ypmp-rsaw-s3hb" }, { "vulnerability": "VCID-yvkr-qhaj-bfcx" }, { "vulnerability": "VCID-zj24-rwt5-g3dg" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@1.2.9-9%252Bdeb8u5" }, { "url": "http://public2.vulnerablecode.io/api/packages/1037234?format=api", "purl": "pkg:deb/debian/libvirt@3.0.0-4%2Bdeb9u2~bpo8%2B1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ska-hmbg-kqdw" }, { "vulnerability": "VCID-3xk5-72kc-5uhu" }, { "vulnerability": "VCID-425h-bz55-yfad" }, { "vulnerability": "VCID-5a7s-trej-63cj" }, { "vulnerability": "VCID-5pky-1svz-nqf6" }, { "vulnerability": "VCID-5ub6-8d2s-53hj" }, { "vulnerability": "VCID-a5ed-jnjb-pybr" }, { "vulnerability": "VCID-b489-x5z3-pkfh" }, { "vulnerability": "VCID-bsjb-frkp-b3an" }, { "vulnerability": "VCID-c628-5r9h-37ad" }, { "vulnerability": "VCID-cue5-u48q-87ft" }, { "vulnerability": "VCID-e93r-zft5-33dk" }, { "vulnerability": "VCID-gc5z-hy4a-8uft" }, { "vulnerability": "VCID-gp93-s21f-8fh7" }, { "vulnerability": "VCID-ju7x-j33y-8khv" }, { "vulnerability": "VCID-nfem-925f-bfdw" }, { "vulnerability": "VCID-nqd8-35a9-7bc5" }, { "vulnerability": "VCID-r65y-py21-u3eu" }, { "vulnerability": "VCID-re7g-2nvj-j3dp" }, { "vulnerability": "VCID-wf9y-4uwu-gkaz" }, { "vulnerability": "VCID-whhu-jy51-qkec" }, { "vulnerability": "VCID-wkrz-dcvc-5ugc" }, { "vulnerability": "VCID-ypmp-rsaw-s3hb" }, { "vulnerability": "VCID-yvkr-qhaj-bfcx" }, { "vulnerability": "VCID-zj24-rwt5-g3dg" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@3.0.0-4%252Bdeb9u2~bpo8%252B1" } ], "aliases": [ "CVE-2016-5008" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8bqx-15w5-4kdm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60682?format=api", "vulnerability_id": "VCID-a5ed-jnjb-pybr", "summary": "Multiple vulnerabilities have been discovered in libvirt, the worst\n of which may result in the execution of arbitrary commands.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10168.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10168.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10168", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0023", "scoring_system": "epss", "scoring_elements": "0.45677", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0023", "scoring_system": "epss", "scoring_elements": "0.45742", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0023", "scoring_system": "epss", "scoring_elements": "0.45765", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0023", "scoring_system": "epss", "scoring_elements": "0.45714", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0023", "scoring_system": "epss", "scoring_elements": "0.45771", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0023", "scoring_system": "epss", "scoring_elements": "0.45768", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0023", "scoring_system": "epss", "scoring_elements": "0.45791", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0023", "scoring_system": "epss", "scoring_elements": "0.45761", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0023", "scoring_system": "epss", "scoring_elements": "0.45766", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0023", "scoring_system": "epss", "scoring_elements": "0.45816", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0023", "scoring_system": "epss", "scoring_elements": "0.45811", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0023", "scoring_system": "epss", "scoring_elements": "0.45757", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0023", "scoring_system": "epss", "scoring_elements": "0.45687", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0023", "scoring_system": "epss", "scoring_elements": "0.45698", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0023", "scoring_system": "epss", "scoring_elements": "0.45638", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0023", "scoring_system": "epss", "scoring_elements": "0.45533", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0023", "scoring_system": "epss", "scoring_elements": "0.45596", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0023", "scoring_system": "epss", "scoring_elements": "0.45614", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.0023", "scoring_system": "epss", "scoring_elements": "0.45556", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.0023", "scoring_system": "epss", "scoring_elements": "0.45582", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.0023", "scoring_system": "epss", "scoring_elements": "0.45653", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10168" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10168", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10168" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1720118", "reference_id": "1720118", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1720118" }, { "reference_url": "https://security.gentoo.org/glsa/202003-18", "reference_id": "GLSA-202003-18", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-18" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1579", "reference_id": "RHSA-2019:1579", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1579" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1580", "reference_id": "RHSA-2019:1580", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1580" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1699", "reference_id": "RHSA-2019:1699", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1699" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1762", "reference_id": "RHSA-2019:1762", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1762" }, { "reference_url": "https://usn.ubuntu.com/4047-1/", "reference_id": "USN-4047-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4047-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050918?format=api", "purl": "pkg:deb/debian/libvirt@5.0.0-4%2Bdeb10u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ska-hmbg-kqdw" }, { "vulnerability": "VCID-5a7s-trej-63cj" }, { "vulnerability": "VCID-5pky-1svz-nqf6" }, { "vulnerability": "VCID-5ub6-8d2s-53hj" }, { "vulnerability": "VCID-bsjb-frkp-b3an" }, { "vulnerability": "VCID-c628-5r9h-37ad" }, { "vulnerability": "VCID-cue5-u48q-87ft" }, { "vulnerability": "VCID-ju7x-j33y-8khv" }, { "vulnerability": "VCID-nqd8-35a9-7bc5" }, { "vulnerability": "VCID-r65y-py21-u3eu" }, { "vulnerability": "VCID-wf9y-4uwu-gkaz" }, { "vulnerability": "VCID-wkrz-dcvc-5ugc" }, { "vulnerability": "VCID-ypmp-rsaw-s3hb" }, { "vulnerability": "VCID-zj24-rwt5-g3dg" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@5.0.0-4%252Bdeb10u1" } ], "aliases": [ "CVE-2019-10168" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a5ed-jnjb-pybr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60680?format=api", "vulnerability_id": "VCID-b489-x5z3-pkfh", "summary": "Multiple vulnerabilities have been discovered in libvirt, the worst\n of which may result in the execution of arbitrary commands.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10166.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10166.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10166", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00142", "scoring_system": "epss", "scoring_elements": "0.34157", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00142", "scoring_system": "epss", "scoring_elements": "0.34496", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00142", "scoring_system": "epss", "scoring_elements": "0.34524", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00142", "scoring_system": "epss", "scoring_elements": "0.34391", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00142", "scoring_system": "epss", "scoring_elements": "0.34433", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00142", "scoring_system": "epss", "scoring_elements": "0.34463", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00142", "scoring_system": "epss", "scoring_elements": "0.34464", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00142", "scoring_system": "epss", "scoring_elements": "0.34426", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00142", "scoring_system": "epss", "scoring_elements": "0.34402", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00142", "scoring_system": "epss", "scoring_elements": "0.34436", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00142", "scoring_system": "epss", "scoring_elements": "0.34423", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00142", "scoring_system": "epss", "scoring_elements": "0.34382", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00142", "scoring_system": "epss", "scoring_elements": "0.34011", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00142", "scoring_system": "epss", "scoring_elements": "0.33993", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00142", "scoring_system": "epss", "scoring_elements": "0.33907", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00142", "scoring_system": "epss", "scoring_elements": "0.33785", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00142", "scoring_system": "epss", "scoring_elements": "0.33854", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00142", "scoring_system": "epss", "scoring_elements": "0.33896", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00142", "scoring_system": "epss", "scoring_elements": "0.33808", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00142", "scoring_system": "epss", "scoring_elements": "0.33832", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00142", "scoring_system": "epss", "scoring_elements": "0.33906", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10166" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10166", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10166" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1720114", "reference_id": "1720114", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1720114" }, { "reference_url": "https://security.gentoo.org/glsa/202003-18", "reference_id": "GLSA-202003-18", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-18" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1579", "reference_id": "RHSA-2019:1579", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1579" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1580", "reference_id": "RHSA-2019:1580", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1580" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1699", "reference_id": "RHSA-2019:1699", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1699" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1762", "reference_id": "RHSA-2019:1762", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1762" }, { "reference_url": "https://usn.ubuntu.com/4047-1/", "reference_id": "USN-4047-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4047-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050918?format=api", "purl": "pkg:deb/debian/libvirt@5.0.0-4%2Bdeb10u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ska-hmbg-kqdw" }, { "vulnerability": "VCID-5a7s-trej-63cj" }, { "vulnerability": "VCID-5pky-1svz-nqf6" }, { "vulnerability": "VCID-5ub6-8d2s-53hj" }, { "vulnerability": "VCID-bsjb-frkp-b3an" }, { "vulnerability": "VCID-c628-5r9h-37ad" }, { "vulnerability": "VCID-cue5-u48q-87ft" }, { "vulnerability": "VCID-ju7x-j33y-8khv" }, { "vulnerability": "VCID-nqd8-35a9-7bc5" }, { "vulnerability": "VCID-r65y-py21-u3eu" }, { "vulnerability": "VCID-wf9y-4uwu-gkaz" }, { "vulnerability": "VCID-wkrz-dcvc-5ugc" }, { "vulnerability": "VCID-ypmp-rsaw-s3hb" }, { "vulnerability": "VCID-zj24-rwt5-g3dg" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@5.0.0-4%252Bdeb10u1" } ], "aliases": [ "CVE-2019-10166" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b489-x5z3-pkfh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79897?format=api", "vulnerability_id": "VCID-bsjb-frkp-b3an", "summary": "libvirt: deadlock and crash in libxl driver", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4147.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4147.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-4147", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23184", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23361", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23401", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23189", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23262", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23312", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23333", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23295", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23238", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23254", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23248", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23228", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23036", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23029", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23026", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.22919", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23004", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.2308", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23007", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23024", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23103", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-4147" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4147", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4147" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1002535", "reference_id": "1002535", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1002535" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034195", "reference_id": "2034195", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034195" }, { "reference_url": "https://usn.ubuntu.com/5399-1/", "reference_id": "USN-5399-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5399-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051146?format=api", "purl": "pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ubdh-hdtv-akgt" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3" } ], "aliases": [ "CVE-2021-4147" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bsjb-frkp-b3an" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81578?format=api", "vulnerability_id": "VCID-c628-5r9h-37ad", "summary": "libvirt: memory leak in domstats may allow read-only user to perform DoS attack", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12430.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12430.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-12430", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00717", "scoring_system": "epss", "scoring_elements": "0.72559", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00717", "scoring_system": "epss", "scoring_elements": "0.7246", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00717", "scoring_system": "epss", "scoring_elements": "0.72489", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00717", "scoring_system": "epss", "scoring_elements": "0.72515", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00717", "scoring_system": "epss", "scoring_elements": "0.72477", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00717", "scoring_system": "epss", "scoring_elements": "0.72504", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00859", "scoring_system": "epss", "scoring_elements": "0.75007", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00859", "scoring_system": "epss", "scoring_elements": "0.7504", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00859", "scoring_system": "epss", "scoring_elements": "0.75008", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00859", "scoring_system": "epss", "scoring_elements": "0.75044", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00859", "scoring_system": "epss", "scoring_elements": "0.75052", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00859", "scoring_system": "epss", "scoring_elements": "0.75041", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00859", "scoring_system": "epss", "scoring_elements": "0.75079", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00859", "scoring_system": "epss", "scoring_elements": "0.75085", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00859", "scoring_system": "epss", "scoring_elements": "0.75088", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00859", "scoring_system": "epss", "scoring_elements": "0.74964", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00859", "scoring_system": "epss", "scoring_elements": "0.75018", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00859", "scoring_system": "epss", "scoring_elements": "0.74968", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00859", "scoring_system": "epss", "scoring_elements": "0.74997", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00859", "scoring_system": "epss", "scoring_elements": "0.74973", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-12430" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12430", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12430" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1828190", "reference_id": "1828190", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1828190" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=959447", "reference_id": "959447", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=959447" }, { "reference_url": "https://usn.ubuntu.com/4371-1/", "reference_id": "USN-4371-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4371-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051146?format=api", "purl": "pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ubdh-hdtv-akgt" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3" } ], "aliases": [ "CVE-2020-12430" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c628-5r9h-37ad" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57256?format=api", "vulnerability_id": "VCID-cue5-u48q-87ft", "summary": "Multiple vulnerabilities have been discovered in libvirt, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3667.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3667.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3667", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00435", "scoring_system": "epss", "scoring_elements": "0.63074", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00435", "scoring_system": "epss", "scoring_elements": "0.62963", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00435", "scoring_system": "epss", "scoring_elements": "0.62942", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00435", "scoring_system": "epss", "scoring_elements": "0.62962", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00435", "scoring_system": "epss", "scoring_elements": "0.62977", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00435", "scoring_system": "epss", "scoring_elements": "0.62932", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00435", "scoring_system": "epss", "scoring_elements": "0.62978", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00435", "scoring_system": "epss", "scoring_elements": "0.63031", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00435", "scoring_system": "epss", "scoring_elements": "0.62989", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00435", "scoring_system": "epss", "scoring_elements": "0.63017", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00436", "scoring_system": "epss", "scoring_elements": "0.63027", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00436", "scoring_system": "epss", "scoring_elements": "0.62905", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00436", "scoring_system": "epss", "scoring_elements": "0.63042", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00436", "scoring_system": "epss", "scoring_elements": "0.63005", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00436", "scoring_system": "epss", "scoring_elements": "0.62964", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00436", "scoring_system": "epss", "scoring_elements": "0.62993", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00436", "scoring_system": "epss", "scoring_elements": "0.62957", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00436", "scoring_system": "epss", "scoring_elements": "0.63008", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00436", "scoring_system": "epss", "scoring_elements": "0.63024", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3667" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3667", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3667" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986094", "reference_id": "1986094", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986094" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991594", "reference_id": "991594", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991594" }, { "reference_url": "https://security.archlinux.org/AVG-2230", "reference_id": "AVG-2230", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2230" }, { "reference_url": "https://security.gentoo.org/glsa/202210-06", "reference_id": "GLSA-202210-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202210-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3703", "reference_id": "RHSA-2021:3703", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3703" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3704", "reference_id": "RHSA-2021:3704", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3704" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4191", "reference_id": "RHSA-2021:4191", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4191" }, { "reference_url": "https://usn.ubuntu.com/5399-1/", "reference_id": "USN-5399-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5399-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051146?format=api", "purl": "pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ubdh-hdtv-akgt" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3" } ], "aliases": [ "CVE-2021-3667" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cue5-u48q-87ft" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82675?format=api", "vulnerability_id": "VCID-e93r-zft5-33dk", "summary": "libvirt: virsh domhostname command discloses guest hostname in readonly mode", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00105.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00105.html" }, { "reference_url": "https://access.redhat.com/errata/RHBA-2019:3723", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHBA-2019:3723" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3886.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3886.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-3886", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00463", "scoring_system": "epss", "scoring_elements": "0.64184", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00463", "scoring_system": "epss", "scoring_elements": "0.64446", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00463", "scoring_system": "epss", "scoring_elements": "0.64354", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00463", "scoring_system": "epss", "scoring_elements": "0.64398", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00463", "scoring_system": "epss", "scoring_elements": "0.64368", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00463", "scoring_system": "epss", "scoring_elements": "0.64393", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00463", "scoring_system": "epss", "scoring_elements": "0.64242", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00463", "scoring_system": "epss", "scoring_elements": "0.64269", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00463", "scoring_system": "epss", "scoring_elements": "0.6423", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00463", "scoring_system": "epss", "scoring_elements": "0.6428", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00463", "scoring_system": "epss", "scoring_elements": "0.64295", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00463", "scoring_system": "epss", "scoring_elements": "0.64308", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00463", "scoring_system": "epss", "scoring_elements": "0.64297", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00463", "scoring_system": "epss", "scoring_elements": "0.6427", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00463", "scoring_system": "epss", "scoring_elements": "0.64304", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00463", "scoring_system": "epss", "scoring_elements": "0.64315", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00463", "scoring_system": "epss", "scoring_elements": "0.64324", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00463", "scoring_system": "epss", "scoring_elements": "0.64337", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00463", "scoring_system": "epss", "scoring_elements": "0.64338", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00463", "scoring_system": "epss", "scoring_elements": "0.64309", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-3886" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3886", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3886" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3886", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3886" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CYMNKXAUBZCFBBPFH64FJPH5EJH4GSU2/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CYMNKXAUBZCFBBPFH64FJPH5EJH4GSU2/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R5DHYIFECZ7BMVXK4EP4FDFZXK7I5MZH/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R5DHYIFECZ7BMVXK4EP4FDFZXK7I5MZH/" }, { "reference_url": "http://www.securityfocus.com/bid/107777", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/107777" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1694880", "reference_id": "1694880", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1694880" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926418", "reference_id": "926418", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926418" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3886", "reference_id": "CVE-2019-3886", "reference_type": "", "scores": [ { "value": "4.8", "scoring_system": "cvssv2", "scoring_elements": "AV:A/AC:L/Au:N/C:P/I:N/A:P" }, { "value": "5.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" }, { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3886" }, { "reference_url": "https://usn.ubuntu.com/4021-1/", "reference_id": "USN-4021-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4021-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050918?format=api", "purl": "pkg:deb/debian/libvirt@5.0.0-4%2Bdeb10u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ska-hmbg-kqdw" }, { "vulnerability": "VCID-5a7s-trej-63cj" }, { "vulnerability": "VCID-5pky-1svz-nqf6" }, { "vulnerability": "VCID-5ub6-8d2s-53hj" }, { "vulnerability": "VCID-bsjb-frkp-b3an" }, { "vulnerability": "VCID-c628-5r9h-37ad" }, { "vulnerability": "VCID-cue5-u48q-87ft" }, { "vulnerability": "VCID-ju7x-j33y-8khv" }, { "vulnerability": "VCID-nqd8-35a9-7bc5" }, { "vulnerability": "VCID-r65y-py21-u3eu" }, { "vulnerability": "VCID-wf9y-4uwu-gkaz" }, { "vulnerability": "VCID-wkrz-dcvc-5ugc" }, { "vulnerability": "VCID-ypmp-rsaw-s3hb" }, { "vulnerability": "VCID-zj24-rwt5-g3dg" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@5.0.0-4%252Bdeb10u1" } ], "aliases": [ "CVE-2019-3886" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "4.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e93r-zft5-33dk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82522?format=api", "vulnerability_id": "VCID-gc5z-hy4a-8uft", "summary": "libvirt: wrong permissions in systemd admin-sock due to missing SocketMode parameter", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10132.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10132.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10132", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01283", "scoring_system": "epss", "scoring_elements": "0.79789", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.01283", "scoring_system": "epss", "scoring_elements": "0.79663", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01283", "scoring_system": "epss", "scoring_elements": "0.7967", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01283", "scoring_system": "epss", "scoring_elements": "0.79685", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01283", "scoring_system": "epss", "scoring_elements": "0.79702", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01283", "scoring_system": "epss", "scoring_elements": "0.79724", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01283", "scoring_system": "epss", "scoring_elements": "0.79741", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01283", "scoring_system": "epss", "scoring_elements": "0.79737", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.01283", "scoring_system": "epss", "scoring_elements": "0.7975", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.01333", "scoring_system": "epss", "scoring_elements": "0.79973", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01333", "scoring_system": "epss", "scoring_elements": "0.79993", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01333", "scoring_system": "epss", "scoring_elements": "0.79994", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01333", "scoring_system": "epss", "scoring_elements": "0.79996", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01333", "scoring_system": "epss", "scoring_elements": "0.79916", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01333", "scoring_system": "epss", "scoring_elements": "0.79965", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01333", "scoring_system": "epss", "scoring_elements": "0.79923", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01333", "scoring_system": "epss", "scoring_elements": "0.79944", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01333", "scoring_system": "epss", "scoring_elements": "0.79932", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01333", "scoring_system": "epss", "scoring_elements": "0.79961", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01333", "scoring_system": "epss", "scoring_elements": "0.7997", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01333", "scoring_system": "epss", "scoring_elements": "0.7999", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10132" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10132", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10132" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1706067", "reference_id": "1706067", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1706067" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929334", "reference_id": "929334", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929334" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1264", "reference_id": "RHSA-2019:1264", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1264" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1268", "reference_id": "RHSA-2019:1268", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1268" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1455", "reference_id": "RHSA-2019:1455", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1455" }, { "reference_url": "https://usn.ubuntu.com/4021-1/", "reference_id": "USN-4021-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4021-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050918?format=api", "purl": "pkg:deb/debian/libvirt@5.0.0-4%2Bdeb10u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ska-hmbg-kqdw" }, { "vulnerability": "VCID-5a7s-trej-63cj" }, { "vulnerability": "VCID-5pky-1svz-nqf6" }, { "vulnerability": "VCID-5ub6-8d2s-53hj" }, { "vulnerability": "VCID-bsjb-frkp-b3an" }, { "vulnerability": "VCID-c628-5r9h-37ad" }, { "vulnerability": "VCID-cue5-u48q-87ft" }, { "vulnerability": "VCID-ju7x-j33y-8khv" }, { "vulnerability": "VCID-nqd8-35a9-7bc5" }, { "vulnerability": "VCID-r65y-py21-u3eu" }, { "vulnerability": "VCID-wf9y-4uwu-gkaz" }, { "vulnerability": "VCID-wkrz-dcvc-5ugc" }, { "vulnerability": "VCID-ypmp-rsaw-s3hb" }, { "vulnerability": "VCID-zj24-rwt5-g3dg" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@5.0.0-4%252Bdeb10u1" } ], "aliases": [ "CVE-2019-10132" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gc5z-hy4a-8uft" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60679?format=api", "vulnerability_id": "VCID-gp93-s21f-8fh7", "summary": "Multiple vulnerabilities have been discovered in libvirt, the worst\n of which may result in the execution of arbitrary commands.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10161.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10161.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10161", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49809", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49847", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49874", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49826", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49881", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49875", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49893", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49865", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49866", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49912", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49913", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49885", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49871", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49878", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49833", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49751", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.4981", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49838", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49786", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49814", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49888", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10161" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10161", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10161" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10167", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10167" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1720115", "reference_id": "1720115", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1720115" }, { "reference_url": "https://security.gentoo.org/glsa/202003-18", "reference_id": "GLSA-202003-18", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-18" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1578", "reference_id": "RHSA-2019:1578", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1578" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1579", "reference_id": "RHSA-2019:1579", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1579" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1580", "reference_id": "RHSA-2019:1580", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1580" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1699", "reference_id": "RHSA-2019:1699", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1699" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1762", "reference_id": "RHSA-2019:1762", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1762" }, { "reference_url": "https://usn.ubuntu.com/4047-1/", "reference_id": "USN-4047-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4047-1/" }, { "reference_url": "https://usn.ubuntu.com/4047-2/", "reference_id": "USN-4047-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4047-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037235?format=api", "purl": "pkg:deb/debian/libvirt@3.0.0-4%2Bdeb9u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ska-hmbg-kqdw" }, { "vulnerability": "VCID-3xk5-72kc-5uhu" }, { "vulnerability": "VCID-425h-bz55-yfad" }, { "vulnerability": "VCID-5a7s-trej-63cj" }, { "vulnerability": "VCID-5pky-1svz-nqf6" }, { "vulnerability": "VCID-5ub6-8d2s-53hj" }, { "vulnerability": "VCID-a5ed-jnjb-pybr" }, { "vulnerability": "VCID-b489-x5z3-pkfh" }, { "vulnerability": "VCID-bsjb-frkp-b3an" }, { "vulnerability": "VCID-c628-5r9h-37ad" }, { "vulnerability": "VCID-cue5-u48q-87ft" }, { "vulnerability": "VCID-e93r-zft5-33dk" }, { "vulnerability": "VCID-gc5z-hy4a-8uft" }, { "vulnerability": "VCID-gp93-s21f-8fh7" }, { "vulnerability": "VCID-ju7x-j33y-8khv" }, { "vulnerability": "VCID-nfem-925f-bfdw" }, { "vulnerability": "VCID-nqd8-35a9-7bc5" }, { "vulnerability": "VCID-r65y-py21-u3eu" }, { "vulnerability": "VCID-re7g-2nvj-j3dp" }, { "vulnerability": "VCID-wf9y-4uwu-gkaz" }, { "vulnerability": "VCID-whhu-jy51-qkec" }, { "vulnerability": "VCID-wkrz-dcvc-5ugc" }, { "vulnerability": "VCID-ypmp-rsaw-s3hb" }, { "vulnerability": "VCID-yvkr-qhaj-bfcx" }, { "vulnerability": "VCID-zj24-rwt5-g3dg" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@3.0.0-4%252Bdeb9u4" }, { "url": "http://public2.vulnerablecode.io/api/packages/1050918?format=api", "purl": "pkg:deb/debian/libvirt@5.0.0-4%2Bdeb10u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ska-hmbg-kqdw" }, { "vulnerability": "VCID-5a7s-trej-63cj" }, { "vulnerability": "VCID-5pky-1svz-nqf6" }, { "vulnerability": "VCID-5ub6-8d2s-53hj" }, { "vulnerability": "VCID-bsjb-frkp-b3an" }, { "vulnerability": "VCID-c628-5r9h-37ad" }, { "vulnerability": "VCID-cue5-u48q-87ft" }, { "vulnerability": "VCID-ju7x-j33y-8khv" }, { "vulnerability": "VCID-nqd8-35a9-7bc5" }, { "vulnerability": "VCID-r65y-py21-u3eu" }, { "vulnerability": "VCID-wf9y-4uwu-gkaz" }, { "vulnerability": "VCID-wkrz-dcvc-5ugc" }, { "vulnerability": "VCID-ypmp-rsaw-s3hb" }, { "vulnerability": "VCID-zj24-rwt5-g3dg" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@5.0.0-4%252Bdeb10u1" } ], "aliases": [ "CVE-2019-10161" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gp93-s21f-8fh7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85561?format=api", "vulnerability_id": "VCID-hpgc-t8mr-qkan", "summary": "libvirt: Ceph id/key leaked in the process list", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5160.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5160.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-5160", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34716", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34924", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.3495", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.3483", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34875", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34902", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34906", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34869", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34846", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34885", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34868", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34823", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34587", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34567", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.3448", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34355", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34425", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34463", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34358", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34384", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34453", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-5160" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5160", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5160" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1245647", "reference_id": "1245647", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1245647" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=796111", "reference_id": "796111", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=796111" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2577", "reference_id": "RHSA-2016:2577", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2577" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037234?format=api", "purl": "pkg:deb/debian/libvirt@3.0.0-4%2Bdeb9u2~bpo8%2B1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ska-hmbg-kqdw" }, { "vulnerability": "VCID-3xk5-72kc-5uhu" }, { "vulnerability": "VCID-425h-bz55-yfad" }, { "vulnerability": "VCID-5a7s-trej-63cj" }, { "vulnerability": "VCID-5pky-1svz-nqf6" }, { "vulnerability": "VCID-5ub6-8d2s-53hj" }, { "vulnerability": "VCID-a5ed-jnjb-pybr" }, { "vulnerability": "VCID-b489-x5z3-pkfh" }, { "vulnerability": "VCID-bsjb-frkp-b3an" }, { "vulnerability": "VCID-c628-5r9h-37ad" }, { "vulnerability": "VCID-cue5-u48q-87ft" }, { "vulnerability": "VCID-e93r-zft5-33dk" }, { "vulnerability": "VCID-gc5z-hy4a-8uft" }, { "vulnerability": "VCID-gp93-s21f-8fh7" }, { "vulnerability": "VCID-ju7x-j33y-8khv" }, { "vulnerability": "VCID-nfem-925f-bfdw" }, { "vulnerability": "VCID-nqd8-35a9-7bc5" }, { "vulnerability": "VCID-r65y-py21-u3eu" }, { "vulnerability": "VCID-re7g-2nvj-j3dp" }, { "vulnerability": "VCID-wf9y-4uwu-gkaz" }, { "vulnerability": "VCID-whhu-jy51-qkec" }, { "vulnerability": "VCID-wkrz-dcvc-5ugc" }, { "vulnerability": "VCID-ypmp-rsaw-s3hb" }, { "vulnerability": "VCID-yvkr-qhaj-bfcx" }, { "vulnerability": "VCID-zj24-rwt5-g3dg" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@3.0.0-4%252Bdeb9u2~bpo8%252B1" } ], "aliases": [ "CVE-2015-5160" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hpgc-t8mr-qkan" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57253?format=api", "vulnerability_id": "VCID-ju7x-j33y-8khv", "summary": "Multiple vulnerabilities have been discovered in libvirt, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25637.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25637.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25637", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.29407", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.29355", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.29473", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.29521", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.29343", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.29452", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.29448", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.30939", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.30845", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.30869", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31431", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.3141", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31382", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31212", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31088", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31009", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.30857", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.30926", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.3093", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25637" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25637", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25637" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881037", "reference_id": "1881037", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881037" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=971555", "reference_id": "971555", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=971555" }, { "reference_url": "https://security.archlinux.org/ASA-202101-42", "reference_id": "ASA-202101-42", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202101-42" }, { "reference_url": "https://security.archlinux.org/AVG-1240", "reference_id": "AVG-1240", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1240" }, { "reference_url": "https://security.gentoo.org/glsa/202210-06", "reference_id": "GLSA-202210-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202210-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5040", "reference_id": "RHSA-2020:5040", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5040" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5111", "reference_id": "RHSA-2020:5111", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5111" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1762", "reference_id": "RHSA-2021:1762", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1762" }, { "reference_url": "https://usn.ubuntu.com/5399-1/", "reference_id": "USN-5399-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5399-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051146?format=api", "purl": "pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ubdh-hdtv-akgt" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3" } ], "aliases": [ "CVE-2020-25637" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ju7x-j33y-8khv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60681?format=api", "vulnerability_id": "VCID-nfem-925f-bfdw", "summary": "Multiple vulnerabilities have been discovered in libvirt, the worst\n of which may result in the execution of arbitrary commands.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10167.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10167.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10167", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00169", "scoring_system": "epss", "scoring_elements": "0.37993", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00169", "scoring_system": "epss", "scoring_elements": "0.38174", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00169", "scoring_system": "epss", "scoring_elements": "0.38197", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00169", "scoring_system": "epss", "scoring_elements": "0.38067", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00169", "scoring_system": "epss", "scoring_elements": "0.38117", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00169", "scoring_system": "epss", "scoring_elements": "0.38126", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00169", "scoring_system": "epss", "scoring_elements": "0.38144", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00169", "scoring_system": "epss", "scoring_elements": "0.38107", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00169", "scoring_system": "epss", "scoring_elements": "0.38083", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00169", "scoring_system": "epss", "scoring_elements": "0.38129", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00169", "scoring_system": "epss", "scoring_elements": "0.3811", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00169", "scoring_system": "epss", "scoring_elements": "0.38046", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00169", "scoring_system": "epss", "scoring_elements": "0.3783", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00169", "scoring_system": "epss", "scoring_elements": "0.37807", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00169", "scoring_system": "epss", "scoring_elements": "0.37712", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00169", "scoring_system": "epss", "scoring_elements": "0.37603", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00169", "scoring_system": "epss", "scoring_elements": "0.37673", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00169", "scoring_system": "epss", "scoring_elements": "0.3769", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00169", "scoring_system": "epss", "scoring_elements": "0.37576", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00169", "scoring_system": "epss", "scoring_elements": "0.37654", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10167" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10161", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10161" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10167", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10167" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1720117", "reference_id": "1720117", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1720117" }, { "reference_url": "https://security.gentoo.org/glsa/202003-18", "reference_id": "GLSA-202003-18", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-18" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1579", "reference_id": "RHSA-2019:1579", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1579" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1580", "reference_id": "RHSA-2019:1580", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1580" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1699", "reference_id": "RHSA-2019:1699", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1699" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1762", "reference_id": "RHSA-2019:1762", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1762" }, { "reference_url": "https://usn.ubuntu.com/4047-1/", "reference_id": "USN-4047-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4047-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037235?format=api", "purl": "pkg:deb/debian/libvirt@3.0.0-4%2Bdeb9u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ska-hmbg-kqdw" }, { "vulnerability": "VCID-3xk5-72kc-5uhu" }, { "vulnerability": "VCID-425h-bz55-yfad" }, { "vulnerability": "VCID-5a7s-trej-63cj" }, { "vulnerability": "VCID-5pky-1svz-nqf6" }, { "vulnerability": "VCID-5ub6-8d2s-53hj" }, { "vulnerability": "VCID-a5ed-jnjb-pybr" }, { "vulnerability": "VCID-b489-x5z3-pkfh" }, { "vulnerability": "VCID-bsjb-frkp-b3an" }, { "vulnerability": "VCID-c628-5r9h-37ad" }, { "vulnerability": "VCID-cue5-u48q-87ft" }, { "vulnerability": "VCID-e93r-zft5-33dk" }, { "vulnerability": "VCID-gc5z-hy4a-8uft" }, { "vulnerability": "VCID-gp93-s21f-8fh7" }, { "vulnerability": "VCID-ju7x-j33y-8khv" }, { "vulnerability": "VCID-nfem-925f-bfdw" }, { "vulnerability": "VCID-nqd8-35a9-7bc5" }, { "vulnerability": "VCID-r65y-py21-u3eu" }, { "vulnerability": "VCID-re7g-2nvj-j3dp" }, { "vulnerability": "VCID-wf9y-4uwu-gkaz" }, { "vulnerability": "VCID-whhu-jy51-qkec" }, { "vulnerability": "VCID-wkrz-dcvc-5ugc" }, { "vulnerability": "VCID-ypmp-rsaw-s3hb" }, { "vulnerability": "VCID-yvkr-qhaj-bfcx" }, { "vulnerability": "VCID-zj24-rwt5-g3dg" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@3.0.0-4%252Bdeb9u4" }, { "url": "http://public2.vulnerablecode.io/api/packages/1050918?format=api", "purl": "pkg:deb/debian/libvirt@5.0.0-4%2Bdeb10u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ska-hmbg-kqdw" }, { "vulnerability": "VCID-5a7s-trej-63cj" }, { "vulnerability": "VCID-5pky-1svz-nqf6" }, { "vulnerability": "VCID-5ub6-8d2s-53hj" }, { "vulnerability": "VCID-bsjb-frkp-b3an" }, { "vulnerability": "VCID-c628-5r9h-37ad" }, { "vulnerability": "VCID-cue5-u48q-87ft" }, { "vulnerability": "VCID-ju7x-j33y-8khv" }, { "vulnerability": "VCID-nqd8-35a9-7bc5" }, { "vulnerability": "VCID-r65y-py21-u3eu" }, { "vulnerability": "VCID-wf9y-4uwu-gkaz" }, { "vulnerability": "VCID-wkrz-dcvc-5ugc" }, { "vulnerability": "VCID-ypmp-rsaw-s3hb" }, { "vulnerability": "VCID-zj24-rwt5-g3dg" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@5.0.0-4%252Bdeb10u1" } ], "aliases": [ "CVE-2019-10167" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nfem-925f-bfdw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77417?format=api", "vulnerability_id": "VCID-nqd8-35a9-7bc5", "summary": "libvirt: off-by-one error in udevListInterfacesByStatus()", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-1441.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-1441.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-1441", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17518", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17247", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17338", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17436", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17403", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17439", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17508", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17597", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17658", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17676", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.1763", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17577", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17523", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17531", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17565", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17475", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17452", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17385", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19217", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19269", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-1441" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1441", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1441" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1066058", "reference_id": "1066058", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1066058" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263841", "reference_id": "2263841", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T17:29:32Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263841" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_virtualization:8::el8", "reference_id": "cpe:/a:redhat:advanced_virtualization:8::el8", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_virtualization:8::el8" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream", "reference_id": "cpe:/a:redhat:enterprise_linux:9::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb", "reference_id": "cpe:/a:redhat:enterprise_linux:9::crb", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6", "reference_id": "cpe:/o:redhat:enterprise_linux:6", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7", "reference_id": "cpe:/o:redhat:enterprise_linux:7", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8", "reference_id": "cpe:/o:redhat:enterprise_linux:8", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2024-1441", "reference_id": "CVE-2024-1441", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T17:29:32Z/" } ], "url": "https://access.redhat.com/security/cve/CVE-2024-1441" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2560", "reference_id": "RHSA-2024:2560", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T17:29:32Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2024:2560" }, { "reference_url": "https://usn.ubuntu.com/6734-1/", "reference_id": "USN-6734-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6734-1/" }, { "reference_url": "https://usn.ubuntu.com/6734-2/", "reference_id": "USN-6734-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6734-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051146?format=api", "purl": "pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ubdh-hdtv-akgt" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3" } ], "aliases": [ "CVE-2024-1441" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nqd8-35a9-7bc5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82599?format=api", "vulnerability_id": "VCID-pqce-1qud-kbef", "summary": "libvirt: libvirt-domain.c supports virDomainGetTime API calls with an RO connection instead of RW connection", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10746.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10746.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10746", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67051", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67293", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67234", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67207", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67231", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67089", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67112", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67087", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67136", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67148", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67167", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67153", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67123", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67156", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.6717", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67151", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67173", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67185", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67154", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67195", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10746" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10746", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10746" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/libvirt/libvirt/commit/506e9d6c2d4baaf580d489fff0690c0ff2ff588f", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/libvirt/libvirt/commit/506e9d6c2d4baaf580d489fff0690c0ff2ff588f" }, { "reference_url": "https://github.com/libvirt/libvirt/compare/11288f5...8fd6867", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/libvirt/libvirt/compare/11288f5...8fd6867" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00032.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00032.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705507", "reference_id": "1705507", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705507" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-10746", "reference_id": "CVE-2016-10746", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:P/A:N" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-10746" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037234?format=api", "purl": "pkg:deb/debian/libvirt@3.0.0-4%2Bdeb9u2~bpo8%2B1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ska-hmbg-kqdw" }, { "vulnerability": "VCID-3xk5-72kc-5uhu" }, { "vulnerability": "VCID-425h-bz55-yfad" }, { "vulnerability": "VCID-5a7s-trej-63cj" }, { "vulnerability": "VCID-5pky-1svz-nqf6" }, { "vulnerability": "VCID-5ub6-8d2s-53hj" }, { "vulnerability": "VCID-a5ed-jnjb-pybr" }, { "vulnerability": "VCID-b489-x5z3-pkfh" }, { "vulnerability": "VCID-bsjb-frkp-b3an" }, { "vulnerability": "VCID-c628-5r9h-37ad" }, { "vulnerability": "VCID-cue5-u48q-87ft" }, { "vulnerability": "VCID-e93r-zft5-33dk" }, { "vulnerability": "VCID-gc5z-hy4a-8uft" }, { "vulnerability": "VCID-gp93-s21f-8fh7" }, { "vulnerability": "VCID-ju7x-j33y-8khv" }, { "vulnerability": "VCID-nfem-925f-bfdw" }, { "vulnerability": "VCID-nqd8-35a9-7bc5" }, { "vulnerability": "VCID-r65y-py21-u3eu" }, { "vulnerability": "VCID-re7g-2nvj-j3dp" }, { "vulnerability": "VCID-wf9y-4uwu-gkaz" }, { "vulnerability": "VCID-whhu-jy51-qkec" }, { "vulnerability": "VCID-wkrz-dcvc-5ugc" }, { "vulnerability": "VCID-ypmp-rsaw-s3hb" }, { "vulnerability": "VCID-yvkr-qhaj-bfcx" }, { "vulnerability": "VCID-zj24-rwt5-g3dg" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@3.0.0-4%252Bdeb9u2~bpo8%252B1" } ], "aliases": [ "CVE-2016-10746" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pqce-1qud-kbef" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79912?format=api", "vulnerability_id": "VCID-r65y-py21-u3eu", "summary": "libvirt: segmentation fault during VM shutdown can lead to vdsm hang", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3975.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3975.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3975", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66795", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66834", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.6686", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66832", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66881", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66894", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66914", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.669", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66868", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66901", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66915", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66898", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66922", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66936", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66933", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66904", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66946", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66984", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66956", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.6698", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.67044", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3975" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3975", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3975" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2024326", "reference_id": "2024326", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2024326" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1759", "reference_id": "RHSA-2022:1759", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1759" }, { "reference_url": "https://usn.ubuntu.com/5399-1/", "reference_id": "USN-5399-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5399-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051146?format=api", "purl": "pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ubdh-hdtv-akgt" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3" } ], "aliases": [ "CVE-2021-3975" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r65y-py21-u3eu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34654?format=api", "vulnerability_id": "VCID-re7g-2nvj-j3dp", "summary": "Multiple vulnerabilities have been discovered in libvirt, the worst\n of which may result in the execution of arbitrary commands.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5748.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5748.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-5748", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01494", "scoring_system": "epss", "scoring_elements": "0.81013", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01494", "scoring_system": "epss", "scoring_elements": "0.81022", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01494", "scoring_system": "epss", "scoring_elements": "0.81045", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01494", "scoring_system": "epss", "scoring_elements": "0.81073", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01494", "scoring_system": "epss", "scoring_elements": "0.81079", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01494", "scoring_system": "epss", "scoring_elements": "0.81097", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01494", "scoring_system": "epss", "scoring_elements": "0.81083", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01494", "scoring_system": "epss", "scoring_elements": "0.81076", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01494", "scoring_system": "epss", "scoring_elements": "0.81113", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01494", "scoring_system": "epss", "scoring_elements": "0.81115", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01494", "scoring_system": "epss", "scoring_elements": "0.81112", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01494", "scoring_system": "epss", "scoring_elements": "0.81135", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01494", "scoring_system": "epss", "scoring_elements": "0.81143", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01494", "scoring_system": "epss", "scoring_elements": "0.8115", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01494", "scoring_system": "epss", "scoring_elements": "0.81163", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01494", "scoring_system": "epss", "scoring_elements": "0.81184", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01494", "scoring_system": "epss", "scoring_elements": "0.81206", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01494", "scoring_system": "epss", "scoring_elements": "0.81202", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.01494", "scoring_system": "epss", "scoring_elements": "0.8122", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.01494", "scoring_system": "epss", "scoring_elements": "0.81262", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-5748" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5748", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5748" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1528396", "reference_id": "1528396", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1528396" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=887700", "reference_id": "887700", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=887700" }, { "reference_url": "https://security.gentoo.org/glsa/201804-07", "reference_id": "GLSA-201804-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201804-07" }, { "reference_url": "https://security.gentoo.org/glsa/201804-08", "reference_id": "GLSA-201804-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201804-08" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1396", "reference_id": "RHSA-2018:1396", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1396" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1929", "reference_id": "RHSA-2018:1929", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1929" }, { "reference_url": "https://usn.ubuntu.com/3576-1/", "reference_id": "USN-3576-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3576-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050918?format=api", "purl": "pkg:deb/debian/libvirt@5.0.0-4%2Bdeb10u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ska-hmbg-kqdw" }, { "vulnerability": "VCID-5a7s-trej-63cj" }, { "vulnerability": "VCID-5pky-1svz-nqf6" }, { "vulnerability": "VCID-5ub6-8d2s-53hj" }, { "vulnerability": "VCID-bsjb-frkp-b3an" }, { "vulnerability": "VCID-c628-5r9h-37ad" }, { "vulnerability": "VCID-cue5-u48q-87ft" }, { "vulnerability": "VCID-ju7x-j33y-8khv" }, { "vulnerability": "VCID-nqd8-35a9-7bc5" }, { "vulnerability": "VCID-r65y-py21-u3eu" }, { "vulnerability": "VCID-wf9y-4uwu-gkaz" }, { "vulnerability": "VCID-wkrz-dcvc-5ugc" }, { "vulnerability": "VCID-ypmp-rsaw-s3hb" }, { "vulnerability": "VCID-zj24-rwt5-g3dg" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@5.0.0-4%252Bdeb10u1" } ], "aliases": [ "CVE-2018-5748" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-re7g-2nvj-j3dp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85531?format=api", "vulnerability_id": "VCID-smdn-m8vh-9bb8", "summary": "libvirt: denial of service when volume creation fails on NFS pool", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5247.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5247.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-5247", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0039", "scoring_system": "epss", "scoring_elements": "0.60156", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00485", "scoring_system": "epss", "scoring_elements": "0.65372", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00485", "scoring_system": "epss", "scoring_elements": "0.65433", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00485", "scoring_system": "epss", "scoring_elements": "0.65454", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00485", "scoring_system": "epss", "scoring_elements": "0.65305", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00485", "scoring_system": "epss", "scoring_elements": "0.6533", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00485", "scoring_system": "epss", "scoring_elements": "0.65295", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00485", "scoring_system": "epss", "scoring_elements": "0.65347", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00485", "scoring_system": "epss", "scoring_elements": "0.65358", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00485", "scoring_system": "epss", "scoring_elements": "0.65377", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00485", "scoring_system": "epss", "scoring_elements": "0.65365", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00485", "scoring_system": "epss", "scoring_elements": "0.65337", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00485", "scoring_system": "epss", "scoring_elements": "0.65255", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00485", "scoring_system": "epss", "scoring_elements": "0.65384", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00485", "scoring_system": "epss", "scoring_elements": "0.65368", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00485", "scoring_system": "epss", "scoring_elements": "0.65386", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00485", "scoring_system": "epss", "scoring_elements": "0.65398", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00485", "scoring_system": "epss", "scoring_elements": "0.65393", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00485", "scoring_system": "epss", "scoring_elements": "0.65419", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00485", "scoring_system": "epss", "scoring_elements": "0.65464", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-5247" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5247", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5247" }, { "reference_url": "http://security.libvirt.org/2015/0003.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.libvirt.org/2015/0003.html" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2867-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2867-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1259350", "reference_id": "1259350", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1259350" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=799132", "reference_id": "799132", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=799132" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:1.2.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:1.2.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:1.2.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:1.2.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.18:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:1.2.18:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.18:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.19:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:1.2.19:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.19:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5247", "reference_id": "CVE-2015-5247", "reference_type": "", "scores": [ { "value": "4.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P" }, { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5247" }, { "reference_url": "https://usn.ubuntu.com/2867-1/", "reference_id": "USN-2867-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2867-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037234?format=api", "purl": "pkg:deb/debian/libvirt@3.0.0-4%2Bdeb9u2~bpo8%2B1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ska-hmbg-kqdw" }, { "vulnerability": "VCID-3xk5-72kc-5uhu" }, { "vulnerability": "VCID-425h-bz55-yfad" }, { "vulnerability": "VCID-5a7s-trej-63cj" }, { "vulnerability": "VCID-5pky-1svz-nqf6" }, { "vulnerability": "VCID-5ub6-8d2s-53hj" }, { "vulnerability": "VCID-a5ed-jnjb-pybr" }, { "vulnerability": "VCID-b489-x5z3-pkfh" }, { "vulnerability": "VCID-bsjb-frkp-b3an" }, { "vulnerability": "VCID-c628-5r9h-37ad" }, { "vulnerability": "VCID-cue5-u48q-87ft" }, { "vulnerability": "VCID-e93r-zft5-33dk" }, { "vulnerability": "VCID-gc5z-hy4a-8uft" }, { "vulnerability": "VCID-gp93-s21f-8fh7" }, { "vulnerability": "VCID-ju7x-j33y-8khv" }, { "vulnerability": "VCID-nfem-925f-bfdw" }, { "vulnerability": "VCID-nqd8-35a9-7bc5" }, { "vulnerability": "VCID-r65y-py21-u3eu" }, { "vulnerability": "VCID-re7g-2nvj-j3dp" }, { "vulnerability": "VCID-wf9y-4uwu-gkaz" }, { "vulnerability": "VCID-whhu-jy51-qkec" }, { "vulnerability": "VCID-wkrz-dcvc-5ugc" }, { "vulnerability": "VCID-ypmp-rsaw-s3hb" }, { "vulnerability": "VCID-yvkr-qhaj-bfcx" }, { "vulnerability": "VCID-zj24-rwt5-g3dg" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@3.0.0-4%252Bdeb9u2~bpo8%252B1" } ], "aliases": [ "CVE-2015-5247" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-smdn-m8vh-9bb8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35573?format=api", "vulnerability_id": "VCID-wf9y-4uwu-gkaz", "summary": "A vulnerability in libvirt may allow root privilege escalation.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14339.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14339.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14339", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22741", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22718", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22626", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22642", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22914", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22957", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.2275", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22826", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22879", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22899", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22861", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22805", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22819", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22813", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22773", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22611", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22603", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22598", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22496", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22578", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22657", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14339" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14339", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14339" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860069", "reference_id": "1860069", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860069" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=966563", "reference_id": "966563", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=966563" }, { "reference_url": "https://security.archlinux.org/ASA-202009-8", "reference_id": "ASA-202009-8", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202009-8" }, { "reference_url": "https://security.archlinux.org/AVG-1232", "reference_id": "AVG-1232", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1232" }, { "reference_url": "https://security.gentoo.org/glsa/202101-22", "reference_id": "GLSA-202101-22", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202101-22" }, { "reference_url": "https://security.gentoo.org/glsa/202210-06", "reference_id": "GLSA-202210-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202210-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3586", "reference_id": "RHSA-2020:3586", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3586" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4676", "reference_id": "RHSA-2020:4676", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4676" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051146?format=api", "purl": "pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ubdh-hdtv-akgt" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3" } ], "aliases": [ "CVE-2020-14339" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wf9y-4uwu-gkaz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63538?format=api", "vulnerability_id": "VCID-whhu-jy51-qkec", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000256.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000256.json" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2017-1000256", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/security/cve/CVE-2017-1000256" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-1000256", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00778", "scoring_system": "epss", "scoring_elements": "0.73592", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75914", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75758", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75744", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75782", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75788", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.758", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75809", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75838", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75862", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75846", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75861", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00904", "scoring_system": "epss", "scoring_elements": "0.75755", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01015", "scoring_system": "epss", "scoring_elements": "0.77152", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01015", "scoring_system": "epss", "scoring_elements": "0.77097", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01015", "scoring_system": "epss", "scoring_elements": "0.77126", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01015", "scoring_system": "epss", "scoring_elements": "0.77108", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01015", "scoring_system": "epss", "scoring_elements": "0.77141", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01015", "scoring_system": "epss", "scoring_elements": "0.7715", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01015", "scoring_system": "epss", "scoring_elements": "0.77178", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01015", "scoring_system": "epss", "scoring_elements": "0.77156", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-1000256" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000256", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000256" }, { "reference_url": "https://www.mail-archive.com/debian-bugs-dist%40lists.debian.org/msg1556251.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.mail-archive.com/debian-bugs-dist%40lists.debian.org/msg1556251.html" }, { "reference_url": "https://www.redhat.com/archives/libvirt-announce/2017-October/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.redhat.com/archives/libvirt-announce/2017-October/msg00001.html" }, { "reference_url": "http://www.debian.org/security/2017/dsa-4003", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2017/dsa-4003" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1503658", "reference_id": "1503658", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1503658" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878799", "reference_id": "878799", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878799" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000256", "reference_id": "CVE-2017-1000256", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000256" }, { "reference_url": "https://usn.ubuntu.com/3576-1/", "reference_id": "USN-3576-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3576-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037234?format=api", "purl": "pkg:deb/debian/libvirt@3.0.0-4%2Bdeb9u2~bpo8%2B1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ska-hmbg-kqdw" }, { "vulnerability": "VCID-3xk5-72kc-5uhu" }, { "vulnerability": "VCID-425h-bz55-yfad" }, { "vulnerability": "VCID-5a7s-trej-63cj" }, { "vulnerability": "VCID-5pky-1svz-nqf6" }, { "vulnerability": "VCID-5ub6-8d2s-53hj" }, { "vulnerability": "VCID-a5ed-jnjb-pybr" }, { "vulnerability": "VCID-b489-x5z3-pkfh" }, { "vulnerability": "VCID-bsjb-frkp-b3an" }, { "vulnerability": "VCID-c628-5r9h-37ad" }, { "vulnerability": "VCID-cue5-u48q-87ft" }, { "vulnerability": "VCID-e93r-zft5-33dk" }, { "vulnerability": "VCID-gc5z-hy4a-8uft" }, { "vulnerability": "VCID-gp93-s21f-8fh7" }, { "vulnerability": "VCID-ju7x-j33y-8khv" }, { "vulnerability": "VCID-nfem-925f-bfdw" }, { "vulnerability": "VCID-nqd8-35a9-7bc5" }, { "vulnerability": "VCID-r65y-py21-u3eu" }, { "vulnerability": "VCID-re7g-2nvj-j3dp" }, { "vulnerability": "VCID-wf9y-4uwu-gkaz" }, { "vulnerability": "VCID-whhu-jy51-qkec" }, { "vulnerability": "VCID-wkrz-dcvc-5ugc" }, { "vulnerability": "VCID-ypmp-rsaw-s3hb" }, { "vulnerability": "VCID-yvkr-qhaj-bfcx" }, { "vulnerability": "VCID-zj24-rwt5-g3dg" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@3.0.0-4%252Bdeb9u2~bpo8%252B1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1050918?format=api", "purl": "pkg:deb/debian/libvirt@5.0.0-4%2Bdeb10u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ska-hmbg-kqdw" }, { "vulnerability": "VCID-5a7s-trej-63cj" }, { "vulnerability": "VCID-5pky-1svz-nqf6" }, { "vulnerability": "VCID-5ub6-8d2s-53hj" }, { "vulnerability": "VCID-bsjb-frkp-b3an" }, { "vulnerability": "VCID-c628-5r9h-37ad" }, { "vulnerability": "VCID-cue5-u48q-87ft" }, { "vulnerability": "VCID-ju7x-j33y-8khv" }, { "vulnerability": "VCID-nqd8-35a9-7bc5" }, { "vulnerability": "VCID-r65y-py21-u3eu" }, { "vulnerability": "VCID-wf9y-4uwu-gkaz" }, { "vulnerability": "VCID-wkrz-dcvc-5ugc" }, { "vulnerability": "VCID-ypmp-rsaw-s3hb" }, { "vulnerability": "VCID-zj24-rwt5-g3dg" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@5.0.0-4%252Bdeb10u1" } ], "aliases": [ "CVE-2017-1000256" ], "risk_score": 3.6, "exploitability": "0.5", "weighted_severity": "7.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-whhu-jy51-qkec" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77667?format=api", "vulnerability_id": "VCID-wkrz-dcvc-5ugc", "summary": "libvirt: NULL pointer dereference in udevConnectListAllInterfaces()", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2496.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2496.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-2496", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11028", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10738", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10872", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10946", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10931", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10976", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10865", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.1094", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10994", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10996", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10963", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10805", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10818", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10938", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10893", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10852", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10794", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18628", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18683", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-2496" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2496", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2496" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2269672", "reference_id": "2269672", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T19:25:01Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2269672" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_virtualization:8::el8", "reference_id": "cpe:/a:redhat:advanced_virtualization:8::el8", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_virtualization:8::el8" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream", "reference_id": "cpe:/a:redhat:enterprise_linux:9::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb", "reference_id": "cpe:/a:redhat:enterprise_linux:9::crb", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6", "reference_id": "cpe:/o:redhat:enterprise_linux:6", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7", "reference_id": "cpe:/o:redhat:enterprise_linux:7", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8", "reference_id": "cpe:/o:redhat:enterprise_linux:8", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2024-2496", "reference_id": "CVE-2024-2496", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T19:25:01Z/" } ], "url": "https://access.redhat.com/security/cve/CVE-2024-2496" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2236", "reference_id": "RHSA-2024:2236", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T19:25:01Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2024:2236" }, { "reference_url": "https://usn.ubuntu.com/6734-1/", "reference_id": "USN-6734-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6734-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051146?format=api", "purl": "pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ubdh-hdtv-akgt" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3" } ], "aliases": [ "CVE-2024-2496" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wkrz-dcvc-5ugc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57257?format=api", "vulnerability_id": "VCID-ypmp-rsaw-s3hb", "summary": "Multiple vulnerabilities have been discovered in libvirt, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0897.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0897.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-0897", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16768", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16935", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16789", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16991", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16773", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16862", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16919", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16893", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16848", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.2302", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.22959", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23037", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.22965", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.22859", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.22943", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.22942", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23195", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23188", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23148", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.22976", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.22969", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-0897" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0897", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0897" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1009075", "reference_id": "1009075", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1009075" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2063883", "reference_id": "2063883", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-08T15:53:19Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2063883" }, { "reference_url": "https://security.gentoo.org/glsa/202210-06", "reference_id": "GLSA-202210-06", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-08T15:53:19Z/" } ], "url": "https://security.gentoo.org/glsa/202210-06" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00000.html", "reference_id": "msg00000.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-08T15:53:19Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00000.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7472", "reference_id": "RHSA-2022:7472", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7472" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8003", "reference_id": "RHSA-2022:8003", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8003" }, { "reference_url": "https://usn.ubuntu.com/5399-1/", "reference_id": "USN-5399-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5399-1/" }, { "reference_url": "https://usn.ubuntu.com/6126-1/", "reference_id": "USN-6126-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6126-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051146?format=api", "purl": "pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ubdh-hdtv-akgt" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3" } ], "aliases": [ "CVE-2022-0897" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ypmp-rsaw-s3hb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34655?format=api", "vulnerability_id": "VCID-yvkr-qhaj-bfcx", "summary": "Multiple vulnerabilities have been discovered in libvirt, the worst\n of which may result in the execution of arbitrary commands.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6764.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6764.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-6764", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10649", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10789", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10851", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10678", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10754", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10811", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10824", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10794", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10769", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.1063", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10646", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10771", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10725", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10705", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.1065", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10608", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10745", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10815", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10797", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10842", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10891", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-6764" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6764", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6764" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1541444", "reference_id": "1541444", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1541444" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=889839", "reference_id": "889839", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=889839" }, { "reference_url": "https://security.gentoo.org/glsa/201804-07", "reference_id": "GLSA-201804-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201804-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3113", "reference_id": "RHSA-2018:3113", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3113" }, { "reference_url": "https://usn.ubuntu.com/3576-1/", "reference_id": "USN-3576-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3576-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050918?format=api", "purl": "pkg:deb/debian/libvirt@5.0.0-4%2Bdeb10u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ska-hmbg-kqdw" }, { "vulnerability": "VCID-5a7s-trej-63cj" }, { "vulnerability": "VCID-5pky-1svz-nqf6" }, { "vulnerability": "VCID-5ub6-8d2s-53hj" }, { "vulnerability": "VCID-bsjb-frkp-b3an" }, { "vulnerability": "VCID-c628-5r9h-37ad" }, { "vulnerability": "VCID-cue5-u48q-87ft" }, { "vulnerability": "VCID-ju7x-j33y-8khv" }, { "vulnerability": "VCID-nqd8-35a9-7bc5" }, { "vulnerability": "VCID-r65y-py21-u3eu" }, { "vulnerability": "VCID-wf9y-4uwu-gkaz" }, { "vulnerability": "VCID-wkrz-dcvc-5ugc" }, { "vulnerability": "VCID-ypmp-rsaw-s3hb" }, { "vulnerability": "VCID-zj24-rwt5-g3dg" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@5.0.0-4%252Bdeb10u1" } ], "aliases": [ "CVE-2018-6764" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yvkr-qhaj-bfcx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57254?format=api", "vulnerability_id": "VCID-zj24-rwt5-g3dg", "summary": "Multiple vulnerabilities have been discovered in libvirt, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3631.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3631.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3631", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20867", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.2061", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20724", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20522", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20518", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20487", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.2038", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20451", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20538", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20515", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20528", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20926", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20639", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20716", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20776", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20794", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20751", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20699", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20689", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20643", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20634", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3631" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3631", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3631" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.com/libvirt/libvirt/-/commit/15073504dbb624d3f6c911e85557019d3620fdb2", "reference_id": "15073504dbb624d3f6c911e85557019d3620fdb2", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-19T19:33:05Z/" } ], "url": "https://gitlab.com/libvirt/libvirt/-/commit/15073504dbb624d3f6c911e85557019d3620fdb2" }, { "reference_url": "https://gitlab.com/libvirt/libvirt/-/issues/153", "reference_id": "153", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-19T19:33:05Z/" } ], "url": "https://gitlab.com/libvirt/libvirt/-/issues/153" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977726", "reference_id": "1977726", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-19T19:33:05Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977726" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990709", "reference_id": "990709", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990709" }, { "reference_url": "https://security.archlinux.org/AVG-2124", "reference_id": "AVG-2124", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2124" }, { "reference_url": "https://security.gentoo.org/glsa/202210-06", "reference_id": "GLSA-202210-06", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-19T19:33:05Z/" } ], "url": "https://security.gentoo.org/glsa/202210-06" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00000.html", "reference_id": "msg00000.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-19T19:33:05Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00000.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220331-0010/", "reference_id": "ntap-20220331-0010", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-19T19:33:05Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220331-0010/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3631", "reference_id": "RHSA-2021:3631", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-19T19:33:05Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2021:3631" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3703", "reference_id": "RHSA-2021:3703", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3703" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3704", "reference_id": "RHSA-2021:3704", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3704" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4191", "reference_id": "RHSA-2021:4191", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4191" }, { "reference_url": "https://usn.ubuntu.com/5399-1/", "reference_id": "USN-5399-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5399-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051146?format=api", "purl": "pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ubdh-hdtv-akgt" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3" } ], "aliases": [ "CVE-2021-3631" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zj24-rwt5-g3dg" } ], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34486?format=api", "vulnerability_id": "VCID-5wmb-1zue-tfh8", "summary": "Multiple vulnerabilities have been found in libvirt, worst of which\n allows context-dependent attackers to cause Denial of Service.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-01/msg00005.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-01/msg00005.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8131.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8131.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8131", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00374", "scoring_system": "epss", "scoring_elements": "0.59206", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00374", "scoring_system": "epss", "scoring_elements": "0.58982", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00374", "scoring_system": "epss", "scoring_elements": "0.59057", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00374", "scoring_system": "epss", "scoring_elements": "0.5908", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00374", "scoring_system": "epss", "scoring_elements": "0.59045", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00374", "scoring_system": "epss", "scoring_elements": "0.59095", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00374", "scoring_system": "epss", "scoring_elements": "0.591", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00374", "scoring_system": "epss", "scoring_elements": "0.59119", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00374", "scoring_system": "epss", "scoring_elements": "0.59081", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00374", "scoring_system": "epss", "scoring_elements": "0.59118", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00374", "scoring_system": "epss", "scoring_elements": "0.59122", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00374", "scoring_system": "epss", "scoring_elements": "0.59102", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00374", "scoring_system": "epss", "scoring_elements": "0.59082", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00374", "scoring_system": "epss", "scoring_elements": "0.59087", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00374", "scoring_system": "epss", "scoring_elements": "0.59046", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00374", "scoring_system": "epss", "scoring_elements": "0.59152", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00374", "scoring_system": "epss", "scoring_elements": "0.59108", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00374", "scoring_system": "epss", "scoring_elements": "0.59135", "published_at": "2026-05-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8131" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8131", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8131" }, { "reference_url": "http://security.libvirt.org/2014/0008.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.libvirt.org/2014/0008.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1172569", "reference_id": "1172569", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1172569" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773858", "reference_id": "773858", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773858" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-8131", "reference_id": "CVE-2014-8131", "reference_type": "", "scores": [ { "value": "4.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-8131" }, { "reference_url": "https://security.gentoo.org/glsa/201412-36", "reference_id": "GLSA-201412-36", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201412-36" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036596?format=api", "purl": "pkg:deb/debian/libvirt@1.2.9-9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ska-hmbg-kqdw" }, { "vulnerability": "VCID-3xk5-72kc-5uhu" }, { "vulnerability": "VCID-3zke-md7v-6be5" }, { "vulnerability": "VCID-425h-bz55-yfad" }, { "vulnerability": "VCID-4gha-yszs-x3hw" }, { "vulnerability": "VCID-5a7s-trej-63cj" }, { "vulnerability": "VCID-5pky-1svz-nqf6" }, { "vulnerability": "VCID-5ub6-8d2s-53hj" }, { "vulnerability": "VCID-8bqx-15w5-4kdm" }, { "vulnerability": "VCID-a5ed-jnjb-pybr" }, { "vulnerability": "VCID-b489-x5z3-pkfh" }, { "vulnerability": "VCID-bsjb-frkp-b3an" }, { "vulnerability": "VCID-c628-5r9h-37ad" }, { "vulnerability": "VCID-cue5-u48q-87ft" }, { "vulnerability": "VCID-e93r-zft5-33dk" }, { "vulnerability": "VCID-gc5z-hy4a-8uft" }, { "vulnerability": "VCID-gp93-s21f-8fh7" }, { "vulnerability": "VCID-hpgc-t8mr-qkan" }, { "vulnerability": "VCID-ju7x-j33y-8khv" }, { "vulnerability": "VCID-nfem-925f-bfdw" }, { "vulnerability": "VCID-nqd8-35a9-7bc5" }, { "vulnerability": "VCID-pqce-1qud-kbef" }, { "vulnerability": "VCID-r65y-py21-u3eu" }, { "vulnerability": "VCID-re7g-2nvj-j3dp" }, { "vulnerability": "VCID-smdn-m8vh-9bb8" }, { "vulnerability": "VCID-wf9y-4uwu-gkaz" }, { "vulnerability": "VCID-whhu-jy51-qkec" }, { "vulnerability": "VCID-wkrz-dcvc-5ugc" }, { "vulnerability": "VCID-ypmp-rsaw-s3hb" }, { "vulnerability": "VCID-yvkr-qhaj-bfcx" }, { "vulnerability": "VCID-zj24-rwt5-g3dg" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@1.2.9-9" } ], "aliases": [ "CVE-2014-8131" ], "risk_score": 1.8, "exploitability": "0.5", "weighted_severity": "3.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5wmb-1zue-tfh8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56024?format=api", "vulnerability_id": "VCID-bz31-74av-9kgf", "summary": "security update", "references": [ { "reference_url": "http://libvirt.org/news.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://libvirt.org/news.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-05/msg00048.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-05/msg00048.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-05/msg00052.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-05/msg00052.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-0560.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-0560.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0179.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0179.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-0179", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28311", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28775", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28855", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28904", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28711", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28777", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28817", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.2882", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28776", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28727", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28746", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28723", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28675", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28561", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28449", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28374", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28217", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28274", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28297", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28218", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28238", "published_at": "2026-05-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-0179" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0179", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0179" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3633", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3633" }, { "reference_url": "http://secunia.com/advisories/60895", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60895" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-201412-04.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-201412-04.xml" }, { "reference_url": "http://security.libvirt.org/2014/0003.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.libvirt.org/2014/0003.html" }, { "reference_url": "http://www.debian.org/security/2014/dsa-3038", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-3038" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2366-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2366-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1088290", "reference_id": "1088290", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1088290" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:enterprise_virtualization:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:enterprise_virtualization:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:enterprise_virtualization:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:0.10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:0.10.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:0.10.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:0.10.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:0.10.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:0.10.2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:0.10.2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.2.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:0.10.2.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.2.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.2.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:0.10.2.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.2.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.2.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:0.10.2.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.2.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.2.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:0.10.2.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.2.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:0.7.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:0.7.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:0.7.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:0.8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:0.8.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:0.8.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:0.8.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:0.8.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:0.8.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:0.8.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:0.8.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:0.8.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:0.9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:0.9.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:0.9.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:0.9.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:0.9.11.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:0.9.11.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:0.9.11.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:0.9.11.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:0.9.11.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:0.9.11.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:0.9.11.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:0.9.11.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:0.9.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:0.9.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:0.9.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:0.9.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:0.9.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:0.9.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:0.9.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:0.9.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.6.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:0.9.6.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.6.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.6.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:0.9.6.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.6.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:0.9.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:0.9.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:0.9.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:1.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:1.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:1.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:1.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:1.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:1.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:1.0.5.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:1.0.5.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:1.0.5.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:1.0.5.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:1.0.5.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:1.0.5.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:1.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:1.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:1.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:1.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:1.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:1.1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:1.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:1.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:1.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:1.2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:1.2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0179", "reference_id": "CVE-2014-0179", "reference_type": "", "scores": [ { "value": "1.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0179" }, { "reference_url": "https://security.gentoo.org/glsa/201412-04", "reference_id": "GLSA-201412-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201412-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0560", "reference_id": "RHSA-2014:0560", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0560" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0914", "reference_id": "RHSA-2014:0914", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0914" }, { "reference_url": "https://usn.ubuntu.com/2366-1/", "reference_id": "USN-2366-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2366-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571501?format=api", "purl": "pkg:deb/debian/libvirt@0.9.12.3-1%2Bdeb7u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ska-hmbg-kqdw" }, { "vulnerability": "VCID-3xk5-72kc-5uhu" }, { "vulnerability": "VCID-3zke-md7v-6be5" }, { "vulnerability": "VCID-425h-bz55-yfad" }, { "vulnerability": "VCID-46dt-sp3g-qyf1" }, { "vulnerability": "VCID-4gha-yszs-x3hw" }, { "vulnerability": "VCID-4kk3-gbve-ykgt" }, { "vulnerability": "VCID-4myf-kv7v-4bfw" }, { "vulnerability": "VCID-4wgx-cyja-4bbx" }, { "vulnerability": "VCID-5a7s-trej-63cj" }, { "vulnerability": "VCID-5pky-1svz-nqf6" }, { "vulnerability": "VCID-5ub6-8d2s-53hj" }, { "vulnerability": "VCID-5wmb-1zue-tfh8" }, { "vulnerability": "VCID-6a1z-xemq-43cq" }, { "vulnerability": "VCID-6j14-6esu-sqcp" }, { "vulnerability": "VCID-8bmv-jut6-mfdc" }, { "vulnerability": "VCID-8bqx-15w5-4kdm" }, { "vulnerability": "VCID-a5ed-jnjb-pybr" }, { "vulnerability": "VCID-b489-x5z3-pkfh" }, { "vulnerability": "VCID-bsjb-frkp-b3an" }, { "vulnerability": "VCID-bz31-74av-9kgf" }, { "vulnerability": "VCID-c628-5r9h-37ad" }, { "vulnerability": "VCID-cfgr-2prz-mkh3" }, { "vulnerability": "VCID-cue5-u48q-87ft" }, { "vulnerability": "VCID-e4vr-p8vg-y3bn" }, { "vulnerability": "VCID-e93r-zft5-33dk" }, { "vulnerability": "VCID-efnj-ea3r-uyb2" }, { "vulnerability": "VCID-fk4t-hh7x-77he" }, { "vulnerability": "VCID-gc5z-hy4a-8uft" }, { "vulnerability": "VCID-gp93-s21f-8fh7" }, { "vulnerability": "VCID-grvk-64s2-mbdc" }, { "vulnerability": "VCID-hpgc-t8mr-qkan" }, { "vulnerability": "VCID-jcqj-y7ve-dkf3" }, { "vulnerability": "VCID-ju7x-j33y-8khv" }, { "vulnerability": "VCID-kwfx-bbqy-1kdv" }, { "vulnerability": "VCID-nfem-925f-bfdw" }, { "vulnerability": "VCID-nqd8-35a9-7bc5" }, { "vulnerability": "VCID-p5zb-sdha-b7bu" }, { "vulnerability": "VCID-pqce-1qud-kbef" }, { "vulnerability": "VCID-pw95-vhme-ufdr" }, { "vulnerability": "VCID-pyrh-w789-8fbb" }, { "vulnerability": "VCID-q2ed-rmxa-m3hq" }, { "vulnerability": "VCID-r65y-py21-u3eu" }, { "vulnerability": "VCID-r6kr-1kw6-abet" }, { "vulnerability": "VCID-re7g-2nvj-j3dp" }, { "vulnerability": "VCID-smdn-m8vh-9bb8" }, { "vulnerability": "VCID-ttae-7135-n7ff" }, { "vulnerability": "VCID-ty73-ba9j-cyea" }, { "vulnerability": "VCID-unyh-d92r-8udp" }, { "vulnerability": "VCID-ure4-cjpz-r3b5" }, { "vulnerability": "VCID-vmnc-v6zq-dkhv" }, { "vulnerability": "VCID-wf9y-4uwu-gkaz" }, { "vulnerability": "VCID-whhu-jy51-qkec" }, { "vulnerability": "VCID-wkrz-dcvc-5ugc" }, { "vulnerability": "VCID-x76t-fcgm-3yf3" }, { "vulnerability": "VCID-xkwg-y7f7-pfac" }, { "vulnerability": "VCID-xp7b-461n-a3d2" }, { "vulnerability": "VCID-ypmp-rsaw-s3hb" }, { "vulnerability": "VCID-yvkr-qhaj-bfcx" }, { "vulnerability": "VCID-zd79-93nb-pye7" }, { "vulnerability": "VCID-zj24-rwt5-g3dg" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@0.9.12.3-1%252Bdeb7u1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036596?format=api", "purl": "pkg:deb/debian/libvirt@1.2.9-9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ska-hmbg-kqdw" }, { "vulnerability": "VCID-3xk5-72kc-5uhu" }, { "vulnerability": "VCID-3zke-md7v-6be5" }, { "vulnerability": "VCID-425h-bz55-yfad" }, { "vulnerability": "VCID-4gha-yszs-x3hw" }, { "vulnerability": "VCID-5a7s-trej-63cj" }, { "vulnerability": "VCID-5pky-1svz-nqf6" }, { "vulnerability": "VCID-5ub6-8d2s-53hj" }, { "vulnerability": "VCID-8bqx-15w5-4kdm" }, { "vulnerability": "VCID-a5ed-jnjb-pybr" }, { "vulnerability": "VCID-b489-x5z3-pkfh" }, { "vulnerability": "VCID-bsjb-frkp-b3an" }, { "vulnerability": "VCID-c628-5r9h-37ad" }, { "vulnerability": "VCID-cue5-u48q-87ft" }, { "vulnerability": "VCID-e93r-zft5-33dk" }, { "vulnerability": "VCID-gc5z-hy4a-8uft" }, { "vulnerability": "VCID-gp93-s21f-8fh7" }, { "vulnerability": "VCID-hpgc-t8mr-qkan" }, { "vulnerability": "VCID-ju7x-j33y-8khv" }, { "vulnerability": "VCID-nfem-925f-bfdw" }, { "vulnerability": "VCID-nqd8-35a9-7bc5" }, { "vulnerability": "VCID-pqce-1qud-kbef" }, { "vulnerability": "VCID-r65y-py21-u3eu" }, { "vulnerability": "VCID-re7g-2nvj-j3dp" }, { "vulnerability": "VCID-smdn-m8vh-9bb8" }, { "vulnerability": "VCID-wf9y-4uwu-gkaz" }, { "vulnerability": "VCID-whhu-jy51-qkec" }, { "vulnerability": "VCID-wkrz-dcvc-5ugc" }, { "vulnerability": "VCID-ypmp-rsaw-s3hb" }, { "vulnerability": "VCID-yvkr-qhaj-bfcx" }, { "vulnerability": "VCID-zj24-rwt5-g3dg" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@1.2.9-9" } ], "aliases": [ "CVE-2014-0179" ], "risk_score": 0.8, "exploitability": "0.5", "weighted_severity": "1.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bz31-74av-9kgf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56069?format=api", "vulnerability_id": "VCID-jcqj-y7ve-dkf3", "summary": "Multiple vulnerabilities have been found in libvirt, worst of which\n allows context-dependent attackers to escalate privileges.", "references": [ { "reference_url": "http://libvirt.org/news.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://libvirt.org/news.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-05/msg00048.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-05/msg00048.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-05/msg00052.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-05/msg00052.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-0560.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-0560.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5177.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5177.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-5177", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.29636", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.30075", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.30112", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.30161", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.29974", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.30034", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.3007", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.30074", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.3003", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.2998", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.29995", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.29975", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.29929", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.29855", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.29742", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.29678", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.29534", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.29597", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.29611", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.29535", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00114", "scoring_system": "epss", "scoring_elements": "0.29557", "published_at": "2026-05-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-5177" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5177", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5177" }, { "reference_url": "http://secunia.com/advisories/60895", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60895" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-201412-04.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-201412-04.xml" }, { "reference_url": "http://security.libvirt.org/2014/0003.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.libvirt.org/2014/0003.html" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2366-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2366-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1088290", "reference_id": "1088290", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1088290" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:enterprise_virtualization:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:enterprise_virtualization:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:enterprise_virtualization:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:1.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:1.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:1.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:1.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:1.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:1.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:1.0.5.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:1.0.5.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:1.0.5.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:1.0.5.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:1.0.5.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:1.0.5.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:1.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:1.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:1.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:1.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:1.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:1.1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:1.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:1.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:1.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:1.2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:1.2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-5177", "reference_id": "CVE-2014-5177", "reference_type": "", "scores": [ { "value": "1.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:H/Au:N/C:P/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-5177" }, { "reference_url": "https://security.gentoo.org/glsa/201412-04", "reference_id": "GLSA-201412-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201412-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0914", "reference_id": "RHSA-2014:0914", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0914" }, { "reference_url": "https://usn.ubuntu.com/2366-1/", "reference_id": "USN-2366-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2366-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036596?format=api", "purl": "pkg:deb/debian/libvirt@1.2.9-9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ska-hmbg-kqdw" }, { "vulnerability": "VCID-3xk5-72kc-5uhu" }, { "vulnerability": "VCID-3zke-md7v-6be5" }, { "vulnerability": "VCID-425h-bz55-yfad" }, { "vulnerability": "VCID-4gha-yszs-x3hw" }, { "vulnerability": "VCID-5a7s-trej-63cj" }, { "vulnerability": "VCID-5pky-1svz-nqf6" }, { "vulnerability": "VCID-5ub6-8d2s-53hj" }, { "vulnerability": "VCID-8bqx-15w5-4kdm" }, { "vulnerability": "VCID-a5ed-jnjb-pybr" }, { "vulnerability": "VCID-b489-x5z3-pkfh" }, { "vulnerability": "VCID-bsjb-frkp-b3an" }, { "vulnerability": "VCID-c628-5r9h-37ad" }, { "vulnerability": "VCID-cue5-u48q-87ft" }, { "vulnerability": "VCID-e93r-zft5-33dk" }, { "vulnerability": "VCID-gc5z-hy4a-8uft" }, { "vulnerability": "VCID-gp93-s21f-8fh7" }, { "vulnerability": "VCID-hpgc-t8mr-qkan" }, { "vulnerability": "VCID-ju7x-j33y-8khv" }, { "vulnerability": "VCID-nfem-925f-bfdw" }, { "vulnerability": "VCID-nqd8-35a9-7bc5" }, { "vulnerability": "VCID-pqce-1qud-kbef" }, { "vulnerability": "VCID-r65y-py21-u3eu" }, { "vulnerability": "VCID-re7g-2nvj-j3dp" }, { "vulnerability": "VCID-smdn-m8vh-9bb8" }, { "vulnerability": "VCID-wf9y-4uwu-gkaz" }, { "vulnerability": "VCID-whhu-jy51-qkec" }, { "vulnerability": "VCID-wkrz-dcvc-5ugc" }, { "vulnerability": "VCID-ypmp-rsaw-s3hb" }, { "vulnerability": "VCID-yvkr-qhaj-bfcx" }, { "vulnerability": "VCID-zj24-rwt5-g3dg" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@1.2.9-9" } ], "aliases": [ "CVE-2014-5177" ], "risk_score": 0.6, "exploitability": "0.5", "weighted_severity": "1.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jcqj-y7ve-dkf3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85913?format=api", "vulnerability_id": "VCID-kwfx-bbqy-1kdv", "summary": "libvirt: missing ACL check for the VIR_DOMAIN_XML_SECURE flag in save images and snapshots objects", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0236.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0236.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0236", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00492", "scoring_system": "epss", "scoring_elements": "0.65828", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.0065", "scoring_system": "epss", "scoring_elements": "0.70769", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0065", "scoring_system": "epss", "scoring_elements": "0.70787", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0065", "scoring_system": "epss", "scoring_elements": "0.70763", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0065", "scoring_system": "epss", "scoring_elements": "0.70807", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0065", "scoring_system": "epss", "scoring_elements": "0.70823", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0065", "scoring_system": "epss", "scoring_elements": "0.70846", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0065", "scoring_system": "epss", "scoring_elements": "0.7083", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0065", "scoring_system": "epss", "scoring_elements": "0.70815", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0065", "scoring_system": "epss", "scoring_elements": "0.7086", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0065", "scoring_system": "epss", "scoring_elements": "0.70753", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0065", "scoring_system": "epss", "scoring_elements": "0.70845", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0065", "scoring_system": "epss", "scoring_elements": "0.70898", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0065", "scoring_system": "epss", "scoring_elements": "0.70908", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0065", "scoring_system": "epss", "scoring_elements": "0.70906", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0065", "scoring_system": "epss", "scoring_elements": "0.70888", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0065", "scoring_system": "epss", "scoring_elements": "0.70928", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0065", "scoring_system": "epss", "scoring_elements": "0.70965", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.0065", "scoring_system": "epss", "scoring_elements": "0.70931", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.0065", "scoring_system": "epss", "scoring_elements": "0.70959", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.0065", "scoring_system": "epss", "scoring_elements": "0.70866", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0236" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0236", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0236" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:M/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184431", "reference_id": "1184431", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184431" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776065", "reference_id": "776065", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776065" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0323", "reference_id": "RHSA-2015:0323", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0323" }, { "reference_url": "https://usn.ubuntu.com/2867-1/", "reference_id": "USN-2867-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2867-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036596?format=api", "purl": "pkg:deb/debian/libvirt@1.2.9-9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ska-hmbg-kqdw" }, { "vulnerability": "VCID-3xk5-72kc-5uhu" }, { "vulnerability": "VCID-3zke-md7v-6be5" }, { "vulnerability": "VCID-425h-bz55-yfad" }, { "vulnerability": "VCID-4gha-yszs-x3hw" }, { "vulnerability": "VCID-5a7s-trej-63cj" }, { "vulnerability": "VCID-5pky-1svz-nqf6" }, { "vulnerability": "VCID-5ub6-8d2s-53hj" }, { "vulnerability": "VCID-8bqx-15w5-4kdm" }, { "vulnerability": "VCID-a5ed-jnjb-pybr" }, { "vulnerability": "VCID-b489-x5z3-pkfh" }, { "vulnerability": "VCID-bsjb-frkp-b3an" }, { "vulnerability": "VCID-c628-5r9h-37ad" }, { "vulnerability": "VCID-cue5-u48q-87ft" }, { "vulnerability": "VCID-e93r-zft5-33dk" }, { "vulnerability": "VCID-gc5z-hy4a-8uft" }, { "vulnerability": "VCID-gp93-s21f-8fh7" }, { "vulnerability": "VCID-hpgc-t8mr-qkan" }, { "vulnerability": "VCID-ju7x-j33y-8khv" }, { "vulnerability": "VCID-nfem-925f-bfdw" }, { "vulnerability": "VCID-nqd8-35a9-7bc5" }, { "vulnerability": "VCID-pqce-1qud-kbef" }, { "vulnerability": "VCID-r65y-py21-u3eu" }, { "vulnerability": "VCID-re7g-2nvj-j3dp" }, { "vulnerability": "VCID-smdn-m8vh-9bb8" }, { "vulnerability": "VCID-wf9y-4uwu-gkaz" }, { "vulnerability": "VCID-whhu-jy51-qkec" }, { "vulnerability": "VCID-wkrz-dcvc-5ugc" }, { "vulnerability": "VCID-ypmp-rsaw-s3hb" }, { "vulnerability": "VCID-yvkr-qhaj-bfcx" }, { "vulnerability": "VCID-zj24-rwt5-g3dg" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@1.2.9-9" } ], "aliases": [ "CVE-2015-0236" ], "risk_score": 1.0, "exploitability": "0.5", "weighted_severity": "2.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kwfx-bbqy-1kdv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86117?format=api", "vulnerability_id": "VCID-p5zb-sdha-b7bu", "summary": "libvirt: domain_conf: domain deadlock DoS", "references": [ { "reference_url": "http://libvirt.org/git/?p=libvirt.git%3Ba=commitdiff%3Bh=fc22b2e74890873848b43fffae43025d22053669", "reference_id": "", "reference_type": "", "scores": [], "url": "http://libvirt.org/git/?p=libvirt.git%3Ba=commitdiff%3Bh=fc22b2e74890873848b43fffae43025d22053669" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00014.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00014.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00017.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00017.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1352.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-1352.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3657.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3657.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3657", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01284", "scoring_system": "epss", "scoring_elements": "0.79794", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.01284", "scoring_system": "epss", "scoring_elements": "0.79556", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01284", "scoring_system": "epss", "scoring_elements": "0.79562", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01284", "scoring_system": "epss", "scoring_elements": "0.79585", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01284", "scoring_system": "epss", "scoring_elements": "0.79572", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01284", "scoring_system": "epss", "scoring_elements": "0.796", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01284", "scoring_system": "epss", "scoring_elements": "0.79607", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01284", "scoring_system": "epss", "scoring_elements": "0.79628", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01284", "scoring_system": "epss", "scoring_elements": "0.79612", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01284", "scoring_system": "epss", "scoring_elements": "0.79605", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01284", "scoring_system": "epss", "scoring_elements": "0.79635", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01284", "scoring_system": "epss", "scoring_elements": "0.79634", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01284", "scoring_system": "epss", "scoring_elements": "0.79637", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01284", "scoring_system": "epss", "scoring_elements": "0.79668", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01284", "scoring_system": "epss", "scoring_elements": "0.79675", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01284", "scoring_system": "epss", "scoring_elements": "0.79691", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01284", "scoring_system": "epss", "scoring_elements": "0.79707", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01284", "scoring_system": "epss", "scoring_elements": "0.79729", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01284", "scoring_system": "epss", "scoring_elements": "0.79747", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01284", "scoring_system": "epss", "scoring_elements": "0.79742", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.01284", "scoring_system": "epss", "scoring_elements": "0.79756", "published_at": "2026-05-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3657" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3657", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3657" }, { "reference_url": "http://secunia.com/advisories/60291", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60291" }, { "reference_url": "http://secunia.com/advisories/62303", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/62303" }, { "reference_url": "http://security.libvirt.org/2014/0005.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.libvirt.org/2014/0005.html" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2404-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2404-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1145667", "reference_id": "1145667", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1145667" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libvirt:libvirt:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libvirt:libvirt:1.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libvirt:libvirt:1.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libvirt:libvirt:1.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libvirt:libvirt:1.2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libvirt:libvirt:1.2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libvirt:libvirt:1.2.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libvirt:libvirt:1.2.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libvirt:libvirt:1.2.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3657", "reference_id": "CVE-2014-3657", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3657" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1352", "reference_id": "RHSA-2014:1352", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1352" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1873", "reference_id": "RHSA-2014:1873", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1873" }, { "reference_url": "https://usn.ubuntu.com/2404-1/", "reference_id": "USN-2404-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2404-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036596?format=api", "purl": "pkg:deb/debian/libvirt@1.2.9-9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ska-hmbg-kqdw" }, { "vulnerability": "VCID-3xk5-72kc-5uhu" }, { "vulnerability": "VCID-3zke-md7v-6be5" }, { "vulnerability": "VCID-425h-bz55-yfad" }, { "vulnerability": "VCID-4gha-yszs-x3hw" }, { "vulnerability": "VCID-5a7s-trej-63cj" }, { "vulnerability": "VCID-5pky-1svz-nqf6" }, { "vulnerability": "VCID-5ub6-8d2s-53hj" }, { "vulnerability": "VCID-8bqx-15w5-4kdm" }, { "vulnerability": "VCID-a5ed-jnjb-pybr" }, { "vulnerability": "VCID-b489-x5z3-pkfh" }, { "vulnerability": "VCID-bsjb-frkp-b3an" }, { "vulnerability": "VCID-c628-5r9h-37ad" }, { "vulnerability": "VCID-cue5-u48q-87ft" }, { "vulnerability": "VCID-e93r-zft5-33dk" }, { "vulnerability": "VCID-gc5z-hy4a-8uft" }, { "vulnerability": "VCID-gp93-s21f-8fh7" }, { "vulnerability": "VCID-hpgc-t8mr-qkan" }, { "vulnerability": "VCID-ju7x-j33y-8khv" }, { "vulnerability": "VCID-nfem-925f-bfdw" }, { "vulnerability": "VCID-nqd8-35a9-7bc5" }, { "vulnerability": "VCID-pqce-1qud-kbef" }, { "vulnerability": "VCID-r65y-py21-u3eu" }, { "vulnerability": "VCID-re7g-2nvj-j3dp" }, { "vulnerability": "VCID-smdn-m8vh-9bb8" }, { "vulnerability": "VCID-wf9y-4uwu-gkaz" }, { "vulnerability": "VCID-whhu-jy51-qkec" }, { "vulnerability": "VCID-wkrz-dcvc-5ugc" }, { "vulnerability": "VCID-ypmp-rsaw-s3hb" }, { "vulnerability": "VCID-yvkr-qhaj-bfcx" }, { "vulnerability": "VCID-zj24-rwt5-g3dg" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@1.2.9-9" } ], "aliases": [ "CVE-2014-3657" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p5zb-sdha-b7bu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34489?format=api", "vulnerability_id": "VCID-pw95-vhme-ufdr", "summary": "Multiple vulnerabilities have been found in libvirt, worst of which\n allows context-dependent attackers to cause Denial of Service.", "references": [ { "reference_url": "http://advisories.mageia.org/MGASA-2015-0002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://advisories.mageia.org/MGASA-2015-0002.html" }, { "reference_url": "http://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=2bdcd29c713dfedd813c89f56ae98f6f3898313d", "reference_id": "", "reference_type": "", "scores": [], "url": "http://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=2bdcd29c713dfedd813c89f56ae98f6f3898313d" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-01/msg00003.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-01/msg00003.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-01/msg00005.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-01/msg00005.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-0323.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-0323.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8136.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8136.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8136", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22561", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22448", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22464", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22734", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22778", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22568", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22644", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22695", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22713", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22674", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22616", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22632", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22628", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.2258", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22425", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22415", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22413", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22317", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22403", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.2248", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.24942", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8136" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8136", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8136" }, { "reference_url": "http://secunia.com/advisories/61111", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61111" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:023", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:023" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:070", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:070" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2867-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2867-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1176176", "reference_id": "1176176", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1176176" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773856", "reference_id": "773856", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773856" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia:mageia:4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:mageia:mageia:4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia:mageia:4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-8136", "reference_id": "CVE-2014-8136", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-8136" }, { "reference_url": "https://security.gentoo.org/glsa/201412-36", "reference_id": "GLSA-201412-36", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201412-36" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0323", "reference_id": "RHSA-2015:0323", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0323" }, { "reference_url": "https://usn.ubuntu.com/2867-1/", "reference_id": "USN-2867-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2867-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036596?format=api", "purl": "pkg:deb/debian/libvirt@1.2.9-9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ska-hmbg-kqdw" }, { "vulnerability": "VCID-3xk5-72kc-5uhu" }, { "vulnerability": "VCID-3zke-md7v-6be5" }, { "vulnerability": "VCID-425h-bz55-yfad" }, { "vulnerability": "VCID-4gha-yszs-x3hw" }, { "vulnerability": "VCID-5a7s-trej-63cj" }, { "vulnerability": "VCID-5pky-1svz-nqf6" }, { "vulnerability": "VCID-5ub6-8d2s-53hj" }, { "vulnerability": "VCID-8bqx-15w5-4kdm" }, { "vulnerability": "VCID-a5ed-jnjb-pybr" }, { "vulnerability": "VCID-b489-x5z3-pkfh" }, { "vulnerability": "VCID-bsjb-frkp-b3an" }, { "vulnerability": "VCID-c628-5r9h-37ad" }, { "vulnerability": "VCID-cue5-u48q-87ft" }, { "vulnerability": "VCID-e93r-zft5-33dk" }, { "vulnerability": "VCID-gc5z-hy4a-8uft" }, { "vulnerability": "VCID-gp93-s21f-8fh7" }, { "vulnerability": "VCID-hpgc-t8mr-qkan" }, { "vulnerability": "VCID-ju7x-j33y-8khv" }, { "vulnerability": "VCID-nfem-925f-bfdw" }, { "vulnerability": "VCID-nqd8-35a9-7bc5" }, { "vulnerability": "VCID-pqce-1qud-kbef" }, { "vulnerability": "VCID-r65y-py21-u3eu" }, { "vulnerability": "VCID-re7g-2nvj-j3dp" }, { "vulnerability": "VCID-smdn-m8vh-9bb8" }, { "vulnerability": "VCID-wf9y-4uwu-gkaz" }, { "vulnerability": "VCID-whhu-jy51-qkec" }, { "vulnerability": "VCID-wkrz-dcvc-5ugc" }, { "vulnerability": "VCID-ypmp-rsaw-s3hb" }, { "vulnerability": "VCID-yvkr-qhaj-bfcx" }, { "vulnerability": "VCID-zj24-rwt5-g3dg" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@1.2.9-9" } ], "aliases": [ "CVE-2014-8136" ], "risk_score": 0.9, "exploitability": "0.5", "weighted_severity": "1.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pw95-vhme-ufdr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56025?format=api", "vulnerability_id": "VCID-unyh-d92r-8udp", "summary": "security update", "references": [ { "reference_url": "http://libvirt.org/git/?p=libvirt.git%3Ba=commitdiff%3Bh=3e745e8f775dfe6f64f18b5c2fe4791b35d3546b", "reference_id": "", "reference_type": "", "scores": [], "url": "http://libvirt.org/git/?p=libvirt.git%3Ba=commitdiff%3Bh=3e745e8f775dfe6f64f18b5c2fe4791b35d3546b" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00014.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00014.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00017.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00017.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1352.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-1352.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3633.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3633.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3633", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02862", "scoring_system": "epss", "scoring_elements": "0.86401", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.0292", "scoring_system": "epss", "scoring_elements": "0.86337", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0292", "scoring_system": "epss", "scoring_elements": "0.86356", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0292", "scoring_system": "epss", "scoring_elements": "0.86357", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0292", "scoring_system": "epss", "scoring_elements": "0.86375", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0292", "scoring_system": "epss", "scoring_elements": "0.86385", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0292", "scoring_system": "epss", "scoring_elements": "0.86398", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0292", "scoring_system": "epss", "scoring_elements": "0.86397", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0292", "scoring_system": "epss", "scoring_elements": "0.86391", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0292", "scoring_system": "epss", "scoring_elements": "0.86408", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0292", "scoring_system": "epss", "scoring_elements": "0.86327", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0292", "scoring_system": "epss", "scoring_elements": "0.86406", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0292", "scoring_system": "epss", "scoring_elements": "0.86426", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0292", "scoring_system": "epss", "scoring_elements": "0.86435", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0292", "scoring_system": "epss", "scoring_elements": "0.86432", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0292", "scoring_system": "epss", "scoring_elements": "0.86452", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0292", "scoring_system": "epss", "scoring_elements": "0.86472", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0292", "scoring_system": "epss", "scoring_elements": "0.86491", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.0292", "scoring_system": "epss", "scoring_elements": "0.86488", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.0292", "scoring_system": "epss", "scoring_elements": "0.86501", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.0292", "scoring_system": "epss", "scoring_elements": "0.86413", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3633" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0179", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0179" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3633", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3633" }, { "reference_url": "http://secunia.com/advisories/60291", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60291" }, { "reference_url": "http://secunia.com/advisories/60895", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60895" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-201412-04.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-201412-04.xml" }, { "reference_url": "http://security.libvirt.org/2014/0004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.libvirt.org/2014/0004.html" }, { "reference_url": "http://www.debian.org/security/2014/dsa-3038", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-3038" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2366-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2366-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1141131", "reference_id": "1141131", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1141131" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=762203", "reference_id": "762203", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=762203" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libvirt:libvirt:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libvirt:libvirt:1.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libvirt:libvirt:1.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libvirt:libvirt:1.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libvirt:libvirt:1.2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libvirt:libvirt:1.2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libvirt:libvirt:1.2.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libvirt:libvirt:1.2.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libvirt:libvirt:1.2.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:lts:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:lts:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:lts:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:lts:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:lts:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:lts:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3633", "reference_id": "CVE-2014-3633", "reference_type": "", "scores": [ { "value": "5.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3633" }, { "reference_url": "https://security.gentoo.org/glsa/201412-04", "reference_id": "GLSA-201412-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201412-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1352", "reference_id": "RHSA-2014:1352", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1352" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1873", "reference_id": "RHSA-2014:1873", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1873" }, { "reference_url": "https://usn.ubuntu.com/2366-1/", "reference_id": "USN-2366-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2366-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571501?format=api", "purl": "pkg:deb/debian/libvirt@0.9.12.3-1%2Bdeb7u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ska-hmbg-kqdw" }, { "vulnerability": "VCID-3xk5-72kc-5uhu" }, { "vulnerability": "VCID-3zke-md7v-6be5" }, { "vulnerability": "VCID-425h-bz55-yfad" }, { "vulnerability": "VCID-46dt-sp3g-qyf1" }, { "vulnerability": "VCID-4gha-yszs-x3hw" }, { "vulnerability": "VCID-4kk3-gbve-ykgt" }, { "vulnerability": "VCID-4myf-kv7v-4bfw" }, { "vulnerability": "VCID-4wgx-cyja-4bbx" }, { "vulnerability": "VCID-5a7s-trej-63cj" }, { "vulnerability": "VCID-5pky-1svz-nqf6" }, { "vulnerability": "VCID-5ub6-8d2s-53hj" }, { "vulnerability": "VCID-5wmb-1zue-tfh8" }, { "vulnerability": "VCID-6a1z-xemq-43cq" }, { "vulnerability": "VCID-6j14-6esu-sqcp" }, { "vulnerability": "VCID-8bmv-jut6-mfdc" }, { "vulnerability": "VCID-8bqx-15w5-4kdm" }, { "vulnerability": "VCID-a5ed-jnjb-pybr" }, { "vulnerability": "VCID-b489-x5z3-pkfh" }, { "vulnerability": "VCID-bsjb-frkp-b3an" }, { "vulnerability": "VCID-bz31-74av-9kgf" }, { "vulnerability": "VCID-c628-5r9h-37ad" }, { "vulnerability": "VCID-cfgr-2prz-mkh3" }, { "vulnerability": "VCID-cue5-u48q-87ft" }, { "vulnerability": "VCID-e4vr-p8vg-y3bn" }, { "vulnerability": "VCID-e93r-zft5-33dk" }, { "vulnerability": "VCID-efnj-ea3r-uyb2" }, { "vulnerability": "VCID-fk4t-hh7x-77he" }, { "vulnerability": "VCID-gc5z-hy4a-8uft" }, { "vulnerability": "VCID-gp93-s21f-8fh7" }, { "vulnerability": "VCID-grvk-64s2-mbdc" }, { "vulnerability": "VCID-hpgc-t8mr-qkan" }, { "vulnerability": "VCID-jcqj-y7ve-dkf3" }, { "vulnerability": "VCID-ju7x-j33y-8khv" }, { "vulnerability": "VCID-kwfx-bbqy-1kdv" }, { "vulnerability": "VCID-nfem-925f-bfdw" }, { "vulnerability": "VCID-nqd8-35a9-7bc5" }, { "vulnerability": "VCID-p5zb-sdha-b7bu" }, { "vulnerability": "VCID-pqce-1qud-kbef" }, { "vulnerability": "VCID-pw95-vhme-ufdr" }, { "vulnerability": "VCID-pyrh-w789-8fbb" }, { "vulnerability": "VCID-q2ed-rmxa-m3hq" }, { "vulnerability": "VCID-r65y-py21-u3eu" }, { "vulnerability": "VCID-r6kr-1kw6-abet" }, { "vulnerability": "VCID-re7g-2nvj-j3dp" }, { "vulnerability": "VCID-smdn-m8vh-9bb8" }, { "vulnerability": "VCID-ttae-7135-n7ff" }, { "vulnerability": "VCID-ty73-ba9j-cyea" }, { "vulnerability": "VCID-unyh-d92r-8udp" }, { "vulnerability": "VCID-ure4-cjpz-r3b5" }, { "vulnerability": "VCID-vmnc-v6zq-dkhv" }, { "vulnerability": "VCID-wf9y-4uwu-gkaz" }, { "vulnerability": "VCID-whhu-jy51-qkec" }, { "vulnerability": "VCID-wkrz-dcvc-5ugc" }, { "vulnerability": "VCID-x76t-fcgm-3yf3" }, { "vulnerability": "VCID-xkwg-y7f7-pfac" }, { "vulnerability": "VCID-xp7b-461n-a3d2" }, { "vulnerability": "VCID-ypmp-rsaw-s3hb" }, { "vulnerability": "VCID-yvkr-qhaj-bfcx" }, { "vulnerability": "VCID-zd79-93nb-pye7" }, { "vulnerability": "VCID-zj24-rwt5-g3dg" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@0.9.12.3-1%252Bdeb7u1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1036596?format=api", "purl": "pkg:deb/debian/libvirt@1.2.9-9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ska-hmbg-kqdw" }, { "vulnerability": "VCID-3xk5-72kc-5uhu" }, { "vulnerability": "VCID-3zke-md7v-6be5" }, { "vulnerability": "VCID-425h-bz55-yfad" }, { "vulnerability": "VCID-4gha-yszs-x3hw" }, { "vulnerability": "VCID-5a7s-trej-63cj" }, { "vulnerability": "VCID-5pky-1svz-nqf6" }, { "vulnerability": "VCID-5ub6-8d2s-53hj" }, { "vulnerability": "VCID-8bqx-15w5-4kdm" }, { "vulnerability": "VCID-a5ed-jnjb-pybr" }, { "vulnerability": "VCID-b489-x5z3-pkfh" }, { "vulnerability": "VCID-bsjb-frkp-b3an" }, { "vulnerability": "VCID-c628-5r9h-37ad" }, { "vulnerability": "VCID-cue5-u48q-87ft" }, { "vulnerability": "VCID-e93r-zft5-33dk" }, { "vulnerability": "VCID-gc5z-hy4a-8uft" }, { "vulnerability": "VCID-gp93-s21f-8fh7" }, { "vulnerability": "VCID-hpgc-t8mr-qkan" }, { "vulnerability": "VCID-ju7x-j33y-8khv" }, { "vulnerability": "VCID-nfem-925f-bfdw" }, { "vulnerability": "VCID-nqd8-35a9-7bc5" }, { "vulnerability": "VCID-pqce-1qud-kbef" }, { "vulnerability": "VCID-r65y-py21-u3eu" }, { "vulnerability": "VCID-re7g-2nvj-j3dp" }, { "vulnerability": "VCID-smdn-m8vh-9bb8" }, { "vulnerability": "VCID-wf9y-4uwu-gkaz" }, { "vulnerability": "VCID-whhu-jy51-qkec" }, { "vulnerability": "VCID-wkrz-dcvc-5ugc" }, { "vulnerability": "VCID-ypmp-rsaw-s3hb" }, { "vulnerability": "VCID-yvkr-qhaj-bfcx" }, { "vulnerability": "VCID-zj24-rwt5-g3dg" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@1.2.9-9" } ], "aliases": [ "CVE-2014-3633" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-unyh-d92r-8udp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56070?format=api", "vulnerability_id": "VCID-ure4-cjpz-r3b5", "summary": "Multiple vulnerabilities have been found in libvirt, worst of which\n allows context-dependent attackers to escalate privileges.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00083.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00083.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-7823.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-7823.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-7823", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00531", "scoring_system": "epss", "scoring_elements": "0.67414", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00531", "scoring_system": "epss", "scoring_elements": "0.67174", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00531", "scoring_system": "epss", "scoring_elements": "0.67211", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00531", "scoring_system": "epss", "scoring_elements": "0.67235", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00531", "scoring_system": "epss", "scoring_elements": "0.67262", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00531", "scoring_system": "epss", "scoring_elements": "0.67276", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00531", "scoring_system": "epss", "scoring_elements": "0.67296", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00531", "scoring_system": "epss", "scoring_elements": "0.67282", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00531", "scoring_system": "epss", "scoring_elements": "0.67247", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00531", "scoring_system": "epss", "scoring_elements": "0.67281", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00531", "scoring_system": "epss", "scoring_elements": "0.67294", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00531", "scoring_system": "epss", "scoring_elements": "0.67273", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00531", "scoring_system": "epss", "scoring_elements": "0.67293", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00531", "scoring_system": "epss", "scoring_elements": "0.67303", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00531", "scoring_system": "epss", "scoring_elements": "0.67305", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00531", "scoring_system": "epss", "scoring_elements": "0.67277", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00531", "scoring_system": "epss", "scoring_elements": "0.67318", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00531", "scoring_system": "epss", "scoring_elements": "0.67356", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00531", "scoring_system": "epss", "scoring_elements": "0.67329", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00531", "scoring_system": "epss", "scoring_elements": "0.67353", "published_at": "2026-05-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-7823" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7823", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7823" }, { "reference_url": "http://secunia.com/advisories/60010", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60010" }, { "reference_url": "http://secunia.com/advisories/60895", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60895" }, { "reference_url": "http://secunia.com/advisories/62058", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/62058" }, { "reference_url": "http://secunia.com/advisories/62303", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/62303" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-201412-04.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-201412-04.xml" }, { "reference_url": "http://security.libvirt.org/2014/0007.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.libvirt.org/2014/0007.html" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2404-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2404-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1160817", "reference_id": "1160817", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1160817" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=769149", "reference_id": "769149", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=769149" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:1.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:1.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:1.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:1.2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:1.2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:1.2.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:1.2.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:1.2.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:1.2.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:1.2.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-7823", "reference_id": "CVE-2014-7823", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-7823" }, { "reference_url": "https://security.gentoo.org/glsa/201412-04", "reference_id": "GLSA-201412-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201412-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1873", "reference_id": "RHSA-2014:1873", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1873" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0008", "reference_id": "RHSA-2015:0008", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0008" }, { "reference_url": "https://usn.ubuntu.com/2404-1/", "reference_id": "USN-2404-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2404-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036596?format=api", "purl": "pkg:deb/debian/libvirt@1.2.9-9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ska-hmbg-kqdw" }, { "vulnerability": "VCID-3xk5-72kc-5uhu" }, { "vulnerability": "VCID-3zke-md7v-6be5" }, { "vulnerability": "VCID-425h-bz55-yfad" }, { "vulnerability": "VCID-4gha-yszs-x3hw" }, { "vulnerability": "VCID-5a7s-trej-63cj" }, { "vulnerability": "VCID-5pky-1svz-nqf6" }, { "vulnerability": "VCID-5ub6-8d2s-53hj" }, { "vulnerability": "VCID-8bqx-15w5-4kdm" }, { "vulnerability": "VCID-a5ed-jnjb-pybr" }, { "vulnerability": "VCID-b489-x5z3-pkfh" }, { "vulnerability": "VCID-bsjb-frkp-b3an" }, { "vulnerability": "VCID-c628-5r9h-37ad" }, { "vulnerability": "VCID-cue5-u48q-87ft" }, { "vulnerability": "VCID-e93r-zft5-33dk" }, { "vulnerability": "VCID-gc5z-hy4a-8uft" }, { "vulnerability": "VCID-gp93-s21f-8fh7" }, { "vulnerability": "VCID-hpgc-t8mr-qkan" }, { "vulnerability": "VCID-ju7x-j33y-8khv" }, { "vulnerability": "VCID-nfem-925f-bfdw" }, { "vulnerability": "VCID-nqd8-35a9-7bc5" }, { "vulnerability": "VCID-pqce-1qud-kbef" }, { "vulnerability": "VCID-r65y-py21-u3eu" }, { "vulnerability": "VCID-re7g-2nvj-j3dp" }, { "vulnerability": "VCID-smdn-m8vh-9bb8" }, { "vulnerability": "VCID-wf9y-4uwu-gkaz" }, { "vulnerability": "VCID-whhu-jy51-qkec" }, { "vulnerability": "VCID-wkrz-dcvc-5ugc" }, { "vulnerability": "VCID-ypmp-rsaw-s3hb" }, { "vulnerability": "VCID-yvkr-qhaj-bfcx" }, { "vulnerability": "VCID-zj24-rwt5-g3dg" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@1.2.9-9" } ], "aliases": [ "CVE-2014-7823" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ure4-cjpz-r3b5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34487?format=api", "vulnerability_id": "VCID-vmnc-v6zq-dkhv", "summary": "Multiple vulnerabilities have been found in libvirt, worst of which\n allows context-dependent attackers to cause Denial of Service.", "references": [ { "reference_url": "http://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=87b9437f8951f9d24f9a85c6bbfff0e54df8c984", "reference_id": "", "reference_type": "", "scores": [], "url": "http://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=87b9437f8951f9d24f9a85c6bbfff0e54df8c984" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-01/msg00005.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-01/msg00005.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8135.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8135.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8135", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20697", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20769", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20921", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.2098", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20694", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20771", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20832", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20848", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20805", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20753", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20744", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20736", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20723", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20606", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20603", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20572", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20466", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20537", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20625", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20601", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20615", "published_at": "2026-05-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8135" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1087104", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1087104" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8135", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8135" }, { "reference_url": "http://secunia.com/advisories/61111", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61111" }, { "reference_url": "http://security.libvirt.org/2014/0009.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.libvirt.org/2014/0009.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1176182", "reference_id": "1176182", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1176182" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773855", "reference_id": "773855", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773855" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:libvirt:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-8135", "reference_id": "CVE-2014-8135", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-8135" }, { "reference_url": "https://security.gentoo.org/glsa/201412-36", "reference_id": "GLSA-201412-36", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201412-36" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1036596?format=api", "purl": "pkg:deb/debian/libvirt@1.2.9-9", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2ska-hmbg-kqdw" }, { "vulnerability": "VCID-3xk5-72kc-5uhu" }, { "vulnerability": "VCID-3zke-md7v-6be5" }, { "vulnerability": "VCID-425h-bz55-yfad" }, { "vulnerability": "VCID-4gha-yszs-x3hw" }, { "vulnerability": "VCID-5a7s-trej-63cj" }, { "vulnerability": "VCID-5pky-1svz-nqf6" }, { "vulnerability": "VCID-5ub6-8d2s-53hj" }, { "vulnerability": "VCID-8bqx-15w5-4kdm" }, { "vulnerability": "VCID-a5ed-jnjb-pybr" }, { "vulnerability": "VCID-b489-x5z3-pkfh" }, { "vulnerability": "VCID-bsjb-frkp-b3an" }, { "vulnerability": "VCID-c628-5r9h-37ad" }, { "vulnerability": "VCID-cue5-u48q-87ft" }, { "vulnerability": "VCID-e93r-zft5-33dk" }, { "vulnerability": "VCID-gc5z-hy4a-8uft" }, { "vulnerability": "VCID-gp93-s21f-8fh7" }, { "vulnerability": "VCID-hpgc-t8mr-qkan" }, { "vulnerability": "VCID-ju7x-j33y-8khv" }, { "vulnerability": "VCID-nfem-925f-bfdw" }, { "vulnerability": "VCID-nqd8-35a9-7bc5" }, { "vulnerability": "VCID-pqce-1qud-kbef" }, { "vulnerability": "VCID-r65y-py21-u3eu" }, { "vulnerability": "VCID-re7g-2nvj-j3dp" }, { "vulnerability": "VCID-smdn-m8vh-9bb8" }, { "vulnerability": "VCID-wf9y-4uwu-gkaz" }, { "vulnerability": "VCID-whhu-jy51-qkec" }, { "vulnerability": "VCID-wkrz-dcvc-5ugc" }, { "vulnerability": "VCID-ypmp-rsaw-s3hb" }, { "vulnerability": "VCID-yvkr-qhaj-bfcx" }, { "vulnerability": "VCID-zj24-rwt5-g3dg" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@1.2.9-9" } ], "aliases": [ "CVE-2014-8135" ], "risk_score": 0.9, "exploitability": "0.5", "weighted_severity": "1.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vmnc-v6zq-dkhv" } ], "risk_score": "4.5", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@1.2.9-9" }