{"url":"http://public2.vulnerablecode.io/api/packages/127711?format=json","purl":"pkg:rpm/redhat/rhev-hypervisor@5.5-2.2.6.1?arch=el5_5rhev2_2","type":"rpm","namespace":"redhat","name":"rhev-hypervisor","version":"5.5-2.2.6.1","qualifiers":{"arch":"el5_5rhev2_2"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87693?format=json","vulnerability_id":"VCID-a47a-xzem-7yg1","summary":"libspice: Insufficient guest provided pointers validation","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0428.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0428.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-0428","reference_id":"","reference_type":"","scores":[{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15743","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15965","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.16035","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.16096","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15889","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15974","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.16037","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.16014","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15976","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15908","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15833","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15846","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.1589","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15906","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15901","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15867","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-0428"},{"reference_url":"https://rhn.redhat.com/errata/RHSA-2010-0622.html","reference_id":"","reference_type":"","scores":[],"url":"https://rhn.redhat.com/errata/RHSA-2010-0622.html"},{"reference_url":"https://rhn.redhat.com/errata/RHSA-2010-0633.html","reference_id":"","reference_type":"","scores":[],"url":"https://rhn.redhat.com/errata/RHSA-2010-0633.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=568699","reference_id":"568699","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=568699"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:enterprise_virtualization:2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:enterprise_virtualization:2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:enterprise_virtualization:2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:qspice:0.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:qspice:0.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:qspice:0.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-0428","reference_id":"CVE-2010-0428","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:S/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-0428"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0622","reference_id":"RHSA-2010:0622","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0622"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0633","reference_id":"RHSA-2010:0633","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0633"}],"fixed_packages":[],"aliases":["CVE-2010-0428"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a47a-xzem-7yg1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87696?format=json","vulnerability_id":"VCID-sdvn-1ttj-hfd5","summary":"kvm: vmx null pointer dereference","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0435.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0435.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-0435","reference_id":"","reference_type":"","scores":[{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16556","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16845","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17014","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17068","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.1685","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.1694","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16997","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16972","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16927","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16868","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16804","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16806","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16838","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16743","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16727","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.1669","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-0435"},{"reference_url":"http://secunia.com/advisories/42778","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42778"},{"reference_url":"https://rhn.redhat.com/errata/RHSA-2010-0622.html","reference_id":"","reference_type":"","scores":[],"url":"https://rhn.redhat.com/errata/RHSA-2010-0622.html"},{"reference_url":"https://rhn.redhat.com/errata/RHSA-2010-0627.html","reference_id":"","reference_type":"","scores":[],"url":"https://rhn.redhat.com/errata/RHSA-2010-0627.html"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0012","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0012"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=570528","reference_id":"570528","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=570528"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:enterprise_virtualization:2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:enterprise_virtualization:2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:enterprise_virtualization:2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:kvm:83:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:kvm:83:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:kvm:83:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-0435","reference_id":"CVE-2010-0435","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:N/I:N/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-0435"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0622","reference_id":"RHSA-2010:0622","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0622"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0627","reference_id":"RHSA-2010:0627","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0627"},{"reference_url":"https://usn.ubuntu.com/1054-1/","reference_id":"USN-1054-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1054-1/"},{"reference_url":"https://usn.ubuntu.com/1072-1/","reference_id":"USN-1072-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1072-1/"},{"reference_url":"https://usn.ubuntu.com/1073-1/","reference_id":"USN-1073-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1073-1/"},{"reference_url":"https://usn.ubuntu.com/1083-1/","reference_id":"USN-1083-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1083-1/"}],"fixed_packages":[],"aliases":["CVE-2010-0435"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sdvn-1ttj-hfd5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87695?format=json","vulnerability_id":"VCID-wpm7-4y7f-myhb","summary":"qemu: Insufficient guest provided pointers validation","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0431.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0431.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-0431","reference_id":"","reference_type":"","scores":[{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15743","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15965","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.16035","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.16096","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15889","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15974","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.16037","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.16014","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15976","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15908","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15833","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15846","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.1589","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15906","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15901","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15867","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-0431"},{"reference_url":"https://rhn.redhat.com/errata/RHSA-2010-0622.html","reference_id":"","reference_type":"","scores":[],"url":"https://rhn.redhat.com/errata/RHSA-2010-0622.html"},{"reference_url":"https://rhn.redhat.com/errata/RHSA-2010-0627.html","reference_id":"","reference_type":"","scores":[],"url":"https://rhn.redhat.com/errata/RHSA-2010-0627.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=568809","reference_id":"568809","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=568809"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:enterprise_virtualization:2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:enterprise_virtualization:2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:enterprise_virtualization:2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:kvm:83:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:kvm:83:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:kvm:83:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-0431","reference_id":"CVE-2010-0431","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:S/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-0431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0622","reference_id":"RHSA-2010:0622","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0622"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0627","reference_id":"RHSA-2010:0627","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0627"}],"fixed_packages":[],"aliases":["CVE-2010-0431"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wpm7-4y7f-myhb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87697?format=json","vulnerability_id":"VCID-xena-ukw7-x7ab","summary":"vdsm: SSL accept() blocks on a non-blocking Connection","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2811.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2811.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2811","reference_id":"","reference_type":"","scores":[{"value":"0.00334","scoring_system":"epss","scoring_elements":"0.56249","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00334","scoring_system":"epss","scoring_elements":"0.56281","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00334","scoring_system":"epss","scoring_elements":"0.56286","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00334","scoring_system":"epss","scoring_elements":"0.56297","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00334","scoring_system":"epss","scoring_elements":"0.56119","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00334","scoring_system":"epss","scoring_elements":"0.56229","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00543","scoring_system":"epss","scoring_elements":"0.67768","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00543","scoring_system":"epss","scoring_elements":"0.67778","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00543","scoring_system":"epss","scoring_elements":"0.67781","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00543","scoring_system":"epss","scoring_elements":"0.67758","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00543","scoring_system":"epss","scoring_elements":"0.67752","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00543","scoring_system":"epss","scoring_elements":"0.67719","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00543","scoring_system":"epss","scoring_elements":"0.67755","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00543","scoring_system":"epss","scoring_elements":"0.67767","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00543","scoring_system":"epss","scoring_elements":"0.67748","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2811"},{"reference_url":"http://securitytracker.com/id?1024347","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1024347"},{"reference_url":"https://rhn.redhat.com/errata/RHSA-2010-0622.html","reference_id":"","reference_type":"","scores":[],"url":"https://rhn.redhat.com/errata/RHSA-2010-0622.html"},{"reference_url":"https://rhn.redhat.com/errata/RHSA-2010-0628.html","reference_id":"","reference_type":"","scores":[],"url":"https://rhn.redhat.com/errata/RHSA-2010-0628.html"},{"reference_url":"http://www.securityfocus.com/bid/42580","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/42580"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=622928","reference_id":"622928","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=622928"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:enterprise_virtualization:2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:enterprise_virtualization:2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:enterprise_virtualization:2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2811","reference_id":"CVE-2010-2811","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv2","scoring_elements":"AV:A/AC:M/Au:N/C:N/I:N/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2811"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0622","reference_id":"RHSA-2010:0622","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0622"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0628","reference_id":"RHSA-2010:0628","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0628"}],"fixed_packages":[],"aliases":["CVE-2010-2811"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xena-ukw7-x7ab"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87717?format=json","vulnerability_id":"VCID-z6xx-p5ww-ebgk","summary":"qemu: insufficient constraints checking in exec.c:subpage_register()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2784.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2784.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2784","reference_id":"","reference_type":"","scores":[{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14707","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14944","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14991","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.15068","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14872","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.1496","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.15011","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14976","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14938","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14881","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14779","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14786","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14844","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14883","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14827","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2784"},{"reference_url":"https://rhn.redhat.com/errata/RHSA-2010-0622.html","reference_id":"","reference_type":"","scores":[],"url":"https://rhn.redhat.com/errata/RHSA-2010-0622.html"},{"reference_url":"https://rhn.redhat.com/errata/RHSA-2010-0627.html","reference_id":"","reference_type":"","scores":[],"url":"https://rhn.redhat.com/errata/RHSA-2010-0627.html"},{"reference_url":"http://www.spinics.net/lists/kvm/msg39173.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.spinics.net/lists/kvm/msg39173.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=619411","reference_id":"619411","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=619411"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:enterprise_virtualization:2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:enterprise_virtualization:2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:enterprise_virtualization:2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:kvm:83:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:kvm:83:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:kvm:83:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2784","reference_id":"CVE-2010-2784","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:S/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2784"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0622","reference_id":"RHSA-2010:0622","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0622"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0627","reference_id":"RHSA-2010:0627","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0627"}],"fixed_packages":[],"aliases":["CVE-2010-2784"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-z6xx-p5ww-ebgk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87694?format=json","vulnerability_id":"VCID-z8bc-51qw-tues","summary":"libspice: Relying on guest provided data structures to indicate memory allocation","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0429.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0429.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-0429","reference_id":"","reference_type":"","scores":[{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15743","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15965","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.16035","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.16096","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15889","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15974","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.16037","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.16014","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15976","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15908","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15833","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15846","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.1589","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15906","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15901","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15867","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-0429"},{"reference_url":"https://rhn.redhat.com/errata/RHSA-2010-0622.html","reference_id":"","reference_type":"","scores":[],"url":"https://rhn.redhat.com/errata/RHSA-2010-0622.html"},{"reference_url":"https://rhn.redhat.com/errata/RHSA-2010-0633.html","reference_id":"","reference_type":"","scores":[],"url":"https://rhn.redhat.com/errata/RHSA-2010-0633.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=568701","reference_id":"568701","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=568701"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:enterprise_virtualization:2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:enterprise_virtualization:2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:enterprise_virtualization:2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:qspice:0.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:qspice:0.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:qspice:0.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-0429","reference_id":"CVE-2010-0429","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:S/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-0429"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0622","reference_id":"RHSA-2010:0622","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0622"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0633","reference_id":"RHSA-2010:0633","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0633"}],"fixed_packages":[],"aliases":["CVE-2010-0429"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-z8bc-51qw-tues"}],"fixing_vulnerabilities":[],"risk_score":"3.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rhev-hypervisor@5.5-2.2.6.1%3Farch=el5_5rhev2_2"}