{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","type":"deb","namespace":"debian","name":"libvirt","version":"12.0.0-1","qualifiers":{"distro":"trixie"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"12.2.0-1","latest_non_vulnerable_version":"12.2.0-1","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80749?format=json","vulnerability_id":"VCID-2qrr-11jk-z3a7","summary":"libvirt: nodedev-list command may cause libvirt to crash on hosts with GRID driver installed","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3559.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3559.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3559","reference_id":"","reference_type":"","scores":[{"value":"0.00368","scoring_system":"epss","scoring_elements":"0.58617","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00368","scoring_system":"epss","scoring_elements":"0.58701","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00368","scoring_system":"epss","scoring_elements":"0.58722","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00368","scoring_system":"epss","scoring_elements":"0.5869","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00368","scoring_system":"epss","scoring_elements":"0.58743","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00368","scoring_system":"epss","scoring_elements":"0.58749","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00368","scoring_system":"epss","scoring_elements":"0.58768","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00368","scoring_system":"epss","scoring_elements":"0.58728","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00368","scoring_system":"epss","scoring_elements":"0.58762","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00368","scoring_system":"epss","scoring_elements":"0.58766","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00368","scoring_system":"epss","scoring_elements":"0.58745","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00368","scoring_system":"epss","scoring_elements":"0.58713","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00368","scoring_system":"epss","scoring_elements":"0.58727","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00368","scoring_system":"epss","scoring_elements":"0.58711","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3559"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1962306","reference_id":"1962306","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1962306"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928932?format=json","purl":"pkg:deb/debian/libvirt@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2021-3559"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2qrr-11jk-z3a7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36440?format=json","vulnerability_id":"VCID-2ska-hmbg-kqdw","summary":"Multiple vulnerabilities have been discovered in libvirt, the worst of which could lead to a denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2494.json","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2494.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-2494","reference_id":"","reference_type":"","scores":[{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07123","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07168","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07165","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07155","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07146","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07058","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07188","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07157","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07082","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07136","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07851","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07899","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-2494"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2494","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2494"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1067461","reference_id":"1067461","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1067461"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270115","reference_id":"2270115","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T15:14:30Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270115"},{"reference_url":"https://lists.libvirt.org/archives/list/devel@lists.libvirt.org/thread/BKRQXPLPC6B7FLHJXSBQYW7HNDEBW6RJ/","reference_id":"BKRQXPLPC6B7FLHJXSBQYW7HNDEBW6RJ","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T15:14:30Z/"}],"url":"https://lists.libvirt.org/archives/list/devel@lists.libvirt.org/thread/BKRQXPLPC6B7FLHJXSBQYW7HNDEBW6RJ/"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_virtualization:8::el8","reference_id":"cpe:/a:redhat:advanced_virtualization:8::el8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_virtualization:8::el8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb","reference_id":"cpe:/a:redhat:enterprise_linux:8::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2024-2494","reference_id":"CVE-2024-2494","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T15:14:30Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2024-2494"},{"reference_url":"https://security.gentoo.org/glsa/202412-16","reference_id":"GLSA-202412-16","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-16"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2560","reference_id":"RHSA-2024:2560","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T15:14:30Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2560"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3253","reference_id":"RHSA-2024:3253","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T15:14:30Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:3253"},{"reference_url":"https://usn.ubuntu.com/6734-1/","reference_id":"USN-6734-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6734-1/"},{"reference_url":"https://usn.ubuntu.com/6734-2/","reference_id":"USN-6734-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6734-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928973?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928976?format=json","purl":"pkg:deb/debian/libvirt@10.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@10.2.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2024-2494"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2ska-hmbg-kqdw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/37767?format=json","vulnerability_id":"VCID-3w18-95nq-5ubx","summary":"Multiple vulnerabilities were found in libvirt, the worst of which\n    might allow guest OS users to read arbitrary files on the host OS.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2511.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2511.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2511","reference_id":"","reference_type":"","scores":[{"value":"0.03415","scoring_system":"epss","scoring_elements":"0.87389","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03415","scoring_system":"epss","scoring_elements":"0.87399","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03415","scoring_system":"epss","scoring_elements":"0.87413","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03415","scoring_system":"epss","scoring_elements":"0.87412","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03415","scoring_system":"epss","scoring_elements":"0.87431","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03415","scoring_system":"epss","scoring_elements":"0.87438","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03415","scoring_system":"epss","scoring_elements":"0.8745","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03415","scoring_system":"epss","scoring_elements":"0.87445","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03415","scoring_system":"epss","scoring_elements":"0.87441","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03415","scoring_system":"epss","scoring_elements":"0.87456","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03415","scoring_system":"epss","scoring_elements":"0.87458","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03415","scoring_system":"epss","scoring_elements":"0.87455","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03415","scoring_system":"epss","scoring_elements":"0.87471","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03415","scoring_system":"epss","scoring_elements":"0.87478","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03415","scoring_system":"epss","scoring_elements":"0.87479","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2511"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2511","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2511"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=633630","reference_id":"633630","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=633630"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=717199","reference_id":"717199","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=717199"},{"reference_url":"https://security.gentoo.org/glsa/201202-07","reference_id":"GLSA-201202-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201202-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1019","reference_id":"RHSA-2011:1019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1197","reference_id":"RHSA-2011:1197","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1197"},{"reference_url":"https://usn.ubuntu.com/1180-1/","reference_id":"USN-1180-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1180-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928925?format=json","purl":"pkg:deb/debian/libvirt@0.9.2-7?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@0.9.2-7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2011-2511"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3w18-95nq-5ubx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73229?format=json","vulnerability_id":"VCID-3xk5-72kc-5uhu","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1064.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1064.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-1064","reference_id":"","reference_type":"","scores":[{"value":"0.01419","scoring_system":"epss","scoring_elements":"0.80523","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01419","scoring_system":"epss","scoring_elements":"0.80529","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01419","scoring_system":"epss","scoring_elements":"0.80552","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01419","scoring_system":"epss","scoring_elements":"0.80543","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01419","scoring_system":"epss","scoring_elements":"0.80572","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01419","scoring_system":"epss","scoring_elements":"0.80582","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01419","scoring_system":"epss","scoring_elements":"0.80599","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01419","scoring_system":"epss","scoring_elements":"0.80586","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01419","scoring_system":"epss","scoring_elements":"0.80578","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01419","scoring_system":"epss","scoring_elements":"0.80606","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01419","scoring_system":"epss","scoring_elements":"0.80608","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01419","scoring_system":"epss","scoring_elements":"0.80612","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01419","scoring_system":"epss","scoring_elements":"0.80637","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01419","scoring_system":"epss","scoring_elements":"0.8064","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01419","scoring_system":"epss","scoring_elements":"0.80656","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-1064"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1064","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1064"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1550672","reference_id":"1550672","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1550672"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1396","reference_id":"RHSA-2018:1396","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1396"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1929","reference_id":"RHSA-2018:1929","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1929"},{"reference_url":"https://usn.ubuntu.com/3680-1/","reference_id":"USN-3680-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3680-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928957?format=json","purl":"pkg:deb/debian/libvirt@4.1.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@4.1.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2018-1064"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3xk5-72kc-5uhu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84598?format=json","vulnerability_id":"VCID-3zke-md7v-6be5","summary":"libvirt: Null pointer dereference when updating storage size on empty drives","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2635.json","reference_id":"","reference_type":"","scores":[{"value":"7.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2635.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-2635","reference_id":"","reference_type":"","scores":[{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55145","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55246","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.5527","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55249","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55299","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.553","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55311","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55291","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55272","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55314","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55293","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.5523","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55251","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55223","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-2635"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2635","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2635"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"1.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1427090","reference_id":"1427090","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1427090"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=856313","reference_id":"856313","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=856313"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928956?format=json","purl":"pkg:deb/debian/libvirt@3.0.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@3.0.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2017-2635"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"6.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3zke-md7v-6be5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82883?format=json","vulnerability_id":"VCID-425h-bz55-yfad","summary":"libvirt: NULL pointer dereference after running qemuAgentCommand in qemuAgentGetInterfaces function","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00101.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00101.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00105.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00105.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3840.json","reference_id":"","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3840.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-3840","reference_id":"","reference_type":"","scores":[{"value":"0.00709","scoring_system":"epss","scoring_elements":"0.72161","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00709","scoring_system":"epss","scoring_elements":"0.72297","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00709","scoring_system":"epss","scoring_elements":"0.72259","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00709","scoring_system":"epss","scoring_elements":"0.72246","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00709","scoring_system":"epss","scoring_elements":"0.72292","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00709","scoring_system":"epss","scoring_elements":"0.723","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00709","scoring_system":"epss","scoring_elements":"0.72167","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00709","scoring_system":"epss","scoring_elements":"0.72187","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00709","scoring_system":"epss","scoring_elements":"0.72164","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00709","scoring_system":"epss","scoring_elements":"0.72201","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00709","scoring_system":"epss","scoring_elements":"0.72213","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00709","scoring_system":"epss","scoring_elements":"0.72236","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00709","scoring_system":"epss","scoring_elements":"0.7222","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00709","scoring_system":"epss","scoring_elements":"0.72206","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00709","scoring_system":"epss","scoring_elements":"0.72249","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-3840"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1663051","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1663051"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3840","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3840"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3840","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3840"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TZRP2BRMI4RYFRPNFTTIAAUOGVN2ORP7/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TZRP2BRMI4RYFRPNFTTIAAUOGVN2ORP7/"},{"reference_url":"https://www.redhat.com/archives/libvir-list/2019-January/msg00241.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/libvir-list/2019-January/msg00241.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1665228","reference_id":"1665228","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1665228"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-3840","reference_id":"CVE-2019-3840","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:S/C:N/I:N/A:P"},{"value":"5.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:N/A:H"},{"value":"6.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-3840"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2294","reference_id":"RHSA-2019:2294","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2294"},{"reference_url":"https://usn.ubuntu.com/3909-1/","reference_id":"USN-3909-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3909-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928963?format=json","purl":"pkg:deb/debian/libvirt@5.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@5.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2019-3840"],"risk_score":2.9,"exploitability":"0.5","weighted_severity":"5.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-425h-bz55-yfad"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56062?format=json","vulnerability_id":"VCID-46dt-sp3g-qyf1","summary":"Multiple vulnerabilities have been found in libvirt, worst of which\n    allows context-dependent attackers to escalate privileges.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4401.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4401.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4401","reference_id":"","reference_type":"","scores":[{"value":"0.01463","scoring_system":"epss","scoring_elements":"0.80816","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01463","scoring_system":"epss","scoring_elements":"0.80825","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01463","scoring_system":"epss","scoring_elements":"0.80846","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01463","scoring_system":"epss","scoring_elements":"0.80842","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01463","scoring_system":"epss","scoring_elements":"0.80869","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01463","scoring_system":"epss","scoring_elements":"0.80878","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01463","scoring_system":"epss","scoring_elements":"0.80894","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01463","scoring_system":"epss","scoring_elements":"0.8088","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01463","scoring_system":"epss","scoring_elements":"0.80872","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01463","scoring_system":"epss","scoring_elements":"0.80908","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01463","scoring_system":"epss","scoring_elements":"0.80911","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01463","scoring_system":"epss","scoring_elements":"0.80912","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01463","scoring_system":"epss","scoring_elements":"0.80933","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01463","scoring_system":"epss","scoring_elements":"0.8094","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01463","scoring_system":"epss","scoring_elements":"0.80952","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4401"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4401","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4401"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1015259","reference_id":"1015259","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1015259"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=727101","reference_id":"727101","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=727101"},{"reference_url":"https://security.gentoo.org/glsa/201412-04","reference_id":"GLSA-201412-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-04"},{"reference_url":"https://usn.ubuntu.com/2026-1/","reference_id":"USN-2026-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2026-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928939?format=json","purl":"pkg:deb/debian/libvirt@1.1.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@1.1.4-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2013-4401"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-46dt-sp3g-qyf1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87730?format=json","vulnerability_id":"VCID-46j7-ce8y-jyay","summary":"libvirt: ignoring defined disk backing store format when recursing into disk image backing stores","references":[{"reference_url":"http://libvirt.org/news.html","reference_id":"","reference_type":"","scores":[],"url":"http://libvirt.org/news.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044520.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044520.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044579.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044579.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2238.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2238.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2238","reference_id":"","reference_type":"","scores":[{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21279","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21445","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21613","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.2167","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21425","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21502","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21561","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21573","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21534","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21479","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21474","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.2148","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21448","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.213","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21299","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2238"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2238","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2238"},{"reference_url":"http://ubuntu.com/usn/usn-1008-1","reference_id":"","reference_type":"","scores":[],"url":"http://ubuntu.com/usn/usn-1008-1"},{"reference_url":"http://ubuntu.com/usn/usn-1008-2","reference_id":"","reference_type":"","scores":[],"url":"http://ubuntu.com/usn/usn-1008-2"},{"reference_url":"http://ubuntu.com/usn/usn-1008-3","reference_id":"","reference_type":"","scores":[],"url":"http://ubuntu.com/usn/usn-1008-3"},{"reference_url":"http://www.vupen.com/english/advisories/2010/2763","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/2763"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=607811","reference_id":"607811","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=607811"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2238","reference_id":"CVE-2010-2238","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:S/C:C/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2238"},{"reference_url":"https://usn.ubuntu.com/1008-1/","reference_id":"USN-1008-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1008-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928921?format=json","purl":"pkg:deb/debian/libvirt@0.8.3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@0.8.3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2010-2238"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-46j7-ce8y-jyay"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59333?format=json","vulnerability_id":"VCID-4gha-yszs-x3hw","summary":"Libvirt is vulnerable to directory traversal when using Access\n    Control Lists (ACL).","references":[{"reference_url":"http://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=034e47c338b13a95cf02106a3af912c1c5f818d7","reference_id":"","reference_type":"","scores":[],"url":"http://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=034e47c338b13a95cf02106a3af912c1c5f818d7"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174404.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174404.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2577.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-2577.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5313.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5313.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5313","reference_id":"","reference_type":"","scores":[{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17575","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17621","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17753","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17914","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17968","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17669","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17757","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17819","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17835","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17792","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17744","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17689","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17698","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17736","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17645","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5313"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5313","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5313"},{"reference_url":"http://security.libvirt.org/2015/0004.html","reference_id":"","reference_type":"","scores":[],"url":"http://security.libvirt.org/2015/0004.html"},{"reference_url":"https://www.redhat.com/archives/libvir-list/2015-December/msg00473.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/libvir-list/2015-December/msg00473.html"},{"reference_url":"http://www.securityfocus.com/bid/90913","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/90913"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1277121","reference_id":"1277121","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1277121"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=808273","reference_id":"808273","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=808273"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-5313","reference_id":"CVE-2015-5313","reference_type":"","scores":[{"value":"1.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:N/I:P/A:N"},{"value":"2.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-5313"},{"reference_url":"https://security.gentoo.org/glsa/201612-10","reference_id":"GLSA-201612-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201612-10"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2577","reference_id":"RHSA-2016:2577","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2577"},{"reference_url":"https://usn.ubuntu.com/2867-1/","reference_id":"USN-2867-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2867-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928952?format=json","purl":"pkg:deb/debian/libvirt@1.3.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@1.3.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2015-5313"],"risk_score":1.1,"exploitability":"0.5","weighted_severity":"2.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4gha-yszs-x3hw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/55760?format=json","vulnerability_id":"VCID-4kk3-gbve-ykgt","summary":"several","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1447.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1447.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1447","reference_id":"","reference_type":"","scores":[{"value":"0.11684","scoring_system":"epss","scoring_elements":"0.93641","published_at":"2026-04-01T12:55:00Z"},{"value":"0.11684","scoring_system":"epss","scoring_elements":"0.93651","published_at":"2026-04-02T12:55:00Z"},{"value":"0.11684","scoring_system":"epss","scoring_elements":"0.9366","published_at":"2026-04-04T12:55:00Z"},{"value":"0.11684","scoring_system":"epss","scoring_elements":"0.93662","published_at":"2026-04-07T12:55:00Z"},{"value":"0.11684","scoring_system":"epss","scoring_elements":"0.93671","published_at":"2026-04-08T12:55:00Z"},{"value":"0.11684","scoring_system":"epss","scoring_elements":"0.93673","published_at":"2026-04-09T12:55:00Z"},{"value":"0.11684","scoring_system":"epss","scoring_elements":"0.93677","published_at":"2026-04-12T12:55:00Z"},{"value":"0.11684","scoring_system":"epss","scoring_elements":"0.93678","published_at":"2026-04-13T12:55:00Z"},{"value":"0.11684","scoring_system":"epss","scoring_elements":"0.93696","published_at":"2026-04-16T12:55:00Z"},{"value":"0.11684","scoring_system":"epss","scoring_elements":"0.93703","published_at":"2026-04-18T12:55:00Z"},{"value":"0.11684","scoring_system":"epss","scoring_elements":"0.93705","published_at":"2026-04-21T12:55:00Z"},{"value":"0.11684","scoring_system":"epss","scoring_elements":"0.9371","published_at":"2026-04-24T12:55:00Z"},{"value":"0.11684","scoring_system":"epss","scoring_elements":"0.93707","published_at":"2026-04-26T12:55:00Z"},{"value":"0.11684","scoring_system":"epss","scoring_elements":"0.93706","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1447"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6458","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6458"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1447","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1447"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1052957","reference_id":"1052957","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1052957"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=735676","reference_id":"735676","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=735676"},{"reference_url":"https://security.gentoo.org/glsa/201412-04","reference_id":"GLSA-201412-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0103","reference_id":"RHSA-2014:0103","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0103"},{"reference_url":"https://usn.ubuntu.com/2093-1/","reference_id":"USN-2093-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2093-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928943?format=json","purl":"pkg:deb/debian/libvirt@1.2.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@1.2.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2014-1447"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4kk3-gbve-ykgt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56067?format=json","vulnerability_id":"VCID-4myf-kv7v-4bfw","summary":"Multiple vulnerabilities have been found in libvirt, worst of which\n    allows context-dependent attackers to escalate privileges.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7336.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7336.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-7336","reference_id":"","reference_type":"","scores":[{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20833","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20983","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21041","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20755","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20895","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.2091","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20866","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20814","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20805","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20798","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20783","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20664","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20661","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20628","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-7336"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7336","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7336"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1077620","reference_id":"1077620","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1077620"},{"reference_url":"https://security.gentoo.org/glsa/201412-04","reference_id":"GLSA-201412-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-04"},{"reference_url":"https://usn.ubuntu.com/2209-1/","reference_id":"USN-2209-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2209-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928939?format=json","purl":"pkg:deb/debian/libvirt@1.1.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@1.1.4-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2013-7336"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4myf-kv7v-4bfw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56064?format=json","vulnerability_id":"VCID-4wgx-cyja-4bbx","summary":"Multiple vulnerabilities have been found in libvirt, worst of which\n    allows context-dependent attackers to escalate privileges.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6436.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6436.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6436","reference_id":"","reference_type":"","scores":[{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20833","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20983","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21041","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20755","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20895","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.2091","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20866","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20814","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20805","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20798","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20783","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20664","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20661","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20628","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6436"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6436","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6436"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1042252","reference_id":"1042252","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1042252"},{"reference_url":"https://security.gentoo.org/glsa/201412-04","reference_id":"GLSA-201412-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-04"},{"reference_url":"https://usn.ubuntu.com/2093-1/","reference_id":"USN-2093-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2093-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928941?format=json","purl":"pkg:deb/debian/libvirt@1.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@1.2.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2013-6436"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4wgx-cyja-4bbx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81776?format=json","vulnerability_id":"VCID-5a7s-trej-63cj","summary":"libvirt: Potential DoS by holding a monitor job while querying QEMU guest-agent","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-20485.json","reference_id":"","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-20485.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-20485","reference_id":"","reference_type":"","scores":[{"value":"0.00192","scoring_system":"epss","scoring_elements":"0.41033","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00192","scoring_system":"epss","scoring_elements":"0.40846","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00192","scoring_system":"epss","scoring_elements":"0.41039","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00192","scoring_system":"epss","scoring_elements":"0.40943","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00192","scoring_system":"epss","scoring_elements":"0.4093","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00192","scoring_system":"epss","scoring_elements":"0.41115","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00192","scoring_system":"epss","scoring_elements":"0.41146","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00192","scoring_system":"epss","scoring_elements":"0.41072","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00192","scoring_system":"epss","scoring_elements":"0.41121","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00192","scoring_system":"epss","scoring_elements":"0.41128","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00192","scoring_system":"epss","scoring_elements":"0.41148","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00192","scoring_system":"epss","scoring_elements":"0.41098","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00192","scoring_system":"epss","scoring_elements":"0.41142","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00192","scoring_system":"epss","scoring_elements":"0.41113","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-20485"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=953078","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=953078"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20485","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20485"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=a663a860819287e041c3de672aad1d8543098ecc","reference_id":"","reference_type":"","scores":[],"url":"https://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=a663a860819287e041c3de672aad1d8543098ecc"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D5GE6ISYUL3CIWO3FQRUGMKTKP2NYED2/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D5GE6ISYUL3CIWO3FQRUGMKTKP2NYED2/"},{"reference_url":"https://security-tracker.debian.org/tracker/CVE-2019-20485","reference_id":"","reference_type":"","scores":[],"url":"https://security-tracker.debian.org/tracker/CVE-2019-20485"},{"reference_url":"https://www.mail-archive.com/debian-bugs-dist%40lists.debian.org/msg1730509.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.mail-archive.com/debian-bugs-dist%40lists.debian.org/msg1730509.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1809740","reference_id":"1809740","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1809740"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-20485","reference_id":"CVE-2019-20485","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv2","scoring_elements":"AV:A/AC:L/Au:S/C:N/I:N/A:P"},{"value":"5.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-20485"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4000","reference_id":"RHSA-2020:4000","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4000"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4676","reference_id":"RHSA-2020:4676","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4676"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928962?format=json","purl":"pkg:deb/debian/libvirt@6.0.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@6.0.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2019-20485"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5a7s-trej-63cj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81495?format=json","vulnerability_id":"VCID-5pky-1svz-nqf6","summary":"libvirt: guest agent timeout can be set under read-only mode leading to DoS","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10701.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10701.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-10701","reference_id":"","reference_type":"","scores":[{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.47419","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.47453","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.47474","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.47423","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.47478","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.47475","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.47497","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.47473","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.47479","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.47539","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.47531","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.47483","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.47472","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.47427","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-10701"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10701","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10701"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1819163","reference_id":"1819163","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1819163"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=955841","reference_id":"955841","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=955841"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928965?format=json","purl":"pkg:deb/debian/libvirt@6.0.0-7?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@6.0.0-7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2020-10701"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5pky-1svz-nqf6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81675?format=json","vulnerability_id":"VCID-5ub6-8d2s-53hj","summary":"libvirt: Potential denial of service via active pool without target path","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10703.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10703.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-10703","reference_id":"","reference_type":"","scores":[{"value":"0.00689","scoring_system":"epss","scoring_elements":"0.71717","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00689","scoring_system":"epss","scoring_elements":"0.71843","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00689","scoring_system":"epss","scoring_elements":"0.71835","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00689","scoring_system":"epss","scoring_elements":"0.7184","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00689","scoring_system":"epss","scoring_elements":"0.71725","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00689","scoring_system":"epss","scoring_elements":"0.71743","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00689","scoring_system":"epss","scoring_elements":"0.71718","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00689","scoring_system":"epss","scoring_elements":"0.71756","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00689","scoring_system":"epss","scoring_elements":"0.71768","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00689","scoring_system":"epss","scoring_elements":"0.71792","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00689","scoring_system":"epss","scoring_elements":"0.71775","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00689","scoring_system":"epss","scoring_elements":"0.71757","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00689","scoring_system":"epss","scoring_elements":"0.718","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00689","scoring_system":"epss","scoring_elements":"0.71806","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00689","scoring_system":"epss","scoring_elements":"0.71788","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-10703"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10703","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10703"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1816650","reference_id":"1816650","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1816650"},{"reference_url":"https://security.archlinux.org/AVG-1174","reference_id":"AVG-1174","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1174"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4000","reference_id":"RHSA-2020:4000","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4000"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4676","reference_id":"RHSA-2020:4676","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4676"},{"reference_url":"https://usn.ubuntu.com/4371-1/","reference_id":"USN-4371-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4371-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928962?format=json","purl":"pkg:deb/debian/libvirt@6.0.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@6.0.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2020-10703"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5ub6-8d2s-53hj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34486?format=json","vulnerability_id":"VCID-5wmb-1zue-tfh8","summary":"Multiple vulnerabilities have been found in libvirt, worst of which\n    allows context-dependent attackers to cause Denial of Service.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-updates/2015-01/msg00005.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2015-01/msg00005.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8131.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8131.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8131","reference_id":"","reference_type":"","scores":[{"value":"0.00374","scoring_system":"epss","scoring_elements":"0.59087","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00374","scoring_system":"epss","scoring_elements":"0.58982","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00374","scoring_system":"epss","scoring_elements":"0.59057","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00374","scoring_system":"epss","scoring_elements":"0.5908","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00374","scoring_system":"epss","scoring_elements":"0.59045","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00374","scoring_system":"epss","scoring_elements":"0.59095","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00374","scoring_system":"epss","scoring_elements":"0.591","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00374","scoring_system":"epss","scoring_elements":"0.59119","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00374","scoring_system":"epss","scoring_elements":"0.59081","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00374","scoring_system":"epss","scoring_elements":"0.59118","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00374","scoring_system":"epss","scoring_elements":"0.59122","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00374","scoring_system":"epss","scoring_elements":"0.59102","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00374","scoring_system":"epss","scoring_elements":"0.59082","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8131"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8131","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8131"},{"reference_url":"http://security.libvirt.org/2014/0008.html","reference_id":"","reference_type":"","scores":[],"url":"http://security.libvirt.org/2014/0008.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1172569","reference_id":"1172569","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1172569"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773858","reference_id":"773858","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773858"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8131","reference_id":"CVE-2014-8131","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8131"},{"reference_url":"https://security.gentoo.org/glsa/201412-36","reference_id":"GLSA-201412-36","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-36"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928948?format=json","purl":"pkg:deb/debian/libvirt@1.2.9-7?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@1.2.9-7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2014-8131"],"risk_score":1.8,"exploitability":"0.5","weighted_severity":"3.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5wmb-1zue-tfh8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86597?format=json","vulnerability_id":"VCID-6a1z-xemq-43cq","summary":"libvirt: memory corruption in xenDaemonListDefinedDomains function","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4239.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4239.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4239","reference_id":"","reference_type":"","scores":[{"value":"0.0058","scoring_system":"epss","scoring_elements":"0.68821","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0058","scoring_system":"epss","scoring_elements":"0.68839","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0058","scoring_system":"epss","scoring_elements":"0.6886","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0058","scoring_system":"epss","scoring_elements":"0.6884","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0058","scoring_system":"epss","scoring_elements":"0.6889","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0058","scoring_system":"epss","scoring_elements":"0.68908","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0058","scoring_system":"epss","scoring_elements":"0.68931","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0058","scoring_system":"epss","scoring_elements":"0.68917","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0058","scoring_system":"epss","scoring_elements":"0.68888","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0058","scoring_system":"epss","scoring_elements":"0.68929","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0058","scoring_system":"epss","scoring_elements":"0.68939","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0058","scoring_system":"epss","scoring_elements":"0.68918","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0058","scoring_system":"epss","scoring_elements":"0.68968","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0058","scoring_system":"epss","scoring_elements":"0.68974","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0058","scoring_system":"epss","scoring_elements":"0.6898","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4239"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4239","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4239"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=719533","reference_id":"719533","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=719533"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=996241","reference_id":"996241","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=996241"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928936?format=json","purl":"pkg:deb/debian/libvirt@1.1.2~rc1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@1.1.2~rc1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2013-4239"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6a1z-xemq-43cq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86580?format=json","vulnerability_id":"VCID-6j14-6esu-sqcp","summary":"libvirt: supplementary groups not adjusted correctly when parsing label","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4291.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4291.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4291","reference_id":"","reference_type":"","scores":[{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14268","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14349","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14413","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.1422","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14303","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14357","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14264","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14209","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14099","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14098","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14172","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14205","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.1418","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14114","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4291"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1006509","reference_id":"1006509","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1006509"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928937?format=json","purl":"pkg:deb/debian/libvirt@1.1.2-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@1.1.2-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2013-4291"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6j14-6esu-sqcp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88235?format=json","vulnerability_id":"VCID-718w-xw7m-zyhm","summary":"libvirt: libvirt_proxy buffer overflow","references":[{"reference_url":"http://git.et.redhat.com/?p=libvirt.git%3Ba=commitdiff%3Bh=2bb0657e28","reference_id":"","reference_type":"","scores":[],"url":"http://git.et.redhat.com/?p=libvirt.git%3Ba=commitdiff%3Bh=2bb0657e28"},{"reference_url":"http://openwall.com/lists/oss-security/2009/02/10/8","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2009/02/10/8"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0036.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0036.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0036","reference_id":"","reference_type":"","scores":[{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.476","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47561","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.5016","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.502","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50206","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.5022","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50169","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50223","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50217","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50245","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50218","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50207","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50252","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50253","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50228","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0036"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0036","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0036"},{"reference_url":"http://secunia.com/advisories/34397","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34397"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10127","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10127"},{"reference_url":"https://www.redhat.com/archives/libvir-list/2009-January/msg00699.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/libvir-list/2009-January/msg00699.html"},{"reference_url":"https://www.redhat.com/archives/libvir-list/2009-January/msg00726.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/libvir-list/2009-January/msg00726.html"},{"reference_url":"https://www.redhat.com/archives/libvir-list/2009-January/msg00728.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/libvir-list/2009-January/msg00728.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2009-0382.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2009-0382.html"},{"reference_url":"http://www.securityfocus.com/bid/33724","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/33724"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=484947","reference_id":"484947","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=484947"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2009-0036","reference_id":"CVE-2009-0036","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2009-0036"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/8534.c","reference_id":"CVE-2009-0036;OSVDB-51866","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/8534.c"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0382","reference_id":"RHSA-2009:0382","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0382"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928920?format=json","purl":"pkg:deb/debian/libvirt@0.5.1-7?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@0.5.1-7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2009-0036"],"risk_score":8.0,"exploitability":"2.0","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-718w-xw7m-zyhm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87731?format=json","vulnerability_id":"VCID-7cqr-8mu4-bqba","summary":"libvirt: not setting user defined backing store format when creating new image","references":[{"reference_url":"http://libvirt.org/news.html","reference_id":"","reference_type":"","scores":[],"url":"http://libvirt.org/news.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044520.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044520.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044579.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044579.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2239.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2239.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2239","reference_id":"","reference_type":"","scores":[{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21837","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22001","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22055","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21819","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21894","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.2195","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21963","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25348","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25302","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25486","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25429","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25435","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25425","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.2539","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25355","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2239"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2239","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2239"},{"reference_url":"http://ubuntu.com/usn/usn-1008-1","reference_id":"","reference_type":"","scores":[],"url":"http://ubuntu.com/usn/usn-1008-1"},{"reference_url":"http://ubuntu.com/usn/usn-1008-2","reference_id":"","reference_type":"","scores":[],"url":"http://ubuntu.com/usn/usn-1008-2"},{"reference_url":"http://ubuntu.com/usn/usn-1008-3","reference_id":"","reference_type":"","scores":[],"url":"http://ubuntu.com/usn/usn-1008-3"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0615.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0615.html"},{"reference_url":"http://www.vupen.com/english/advisories/2010/2062","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/2062"},{"reference_url":"http://www.vupen.com/english/advisories/2010/2763","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/2763"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=607812","reference_id":"607812","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=607812"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.6.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.6.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.6.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.6.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.6.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.6.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.6.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2239","reference_id":"CVE-2010-2239","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:S/C:C/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2239"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0615","reference_id":"RHSA-2010:0615","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0615"},{"reference_url":"https://usn.ubuntu.com/1008-1/","reference_id":"USN-1008-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1008-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928921?format=json","purl":"pkg:deb/debian/libvirt@0.8.3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@0.8.3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2010-2239"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7cqr-8mu4-bqba"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56058?format=json","vulnerability_id":"VCID-8bmv-jut6-mfdc","summary":"Multiple vulnerabilities have been found in libvirt, worst of which\n    allows context-dependent attackers to escalate privileges.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4292.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4292.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4292","reference_id":"","reference_type":"","scores":[{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20984","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21139","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21193","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20907","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20988","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21049","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21065","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21021","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20968","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20957","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20956","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20935","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20805","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20801","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20769","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4292"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4292","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4292"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1002666","reference_id":"1002666","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1002666"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=721325","reference_id":"721325","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=721325"},{"reference_url":"https://security.gentoo.org/glsa/201412-04","reference_id":"GLSA-201412-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-04"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928938?format=json","purl":"pkg:deb/debian/libvirt@1.1.2~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@1.1.2~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2013-4292"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8bmv-jut6-mfdc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81582?format=json","vulnerability_id":"VCID-8bqx-15w5-4kdm","summary":"security update","references":[{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-07/msg00054.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-07/msg00054.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-07/msg00055.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-07/msg00055.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00024.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00024.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2577.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-2577.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5008.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5008.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5008","reference_id":"","reference_type":"","scores":[{"value":"0.02119","scoring_system":"epss","scoring_elements":"0.84066","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02119","scoring_system":"epss","scoring_elements":"0.842","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02119","scoring_system":"epss","scoring_elements":"0.84163","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02119","scoring_system":"epss","scoring_elements":"0.84188","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02119","scoring_system":"epss","scoring_elements":"0.84195","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02119","scoring_system":"epss","scoring_elements":"0.84079","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02119","scoring_system":"epss","scoring_elements":"0.84096","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02119","scoring_system":"epss","scoring_elements":"0.84098","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02119","scoring_system":"epss","scoring_elements":"0.84121","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02119","scoring_system":"epss","scoring_elements":"0.84127","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02119","scoring_system":"epss","scoring_elements":"0.84145","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02119","scoring_system":"epss","scoring_elements":"0.84139","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02119","scoring_system":"epss","scoring_elements":"0.84135","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02119","scoring_system":"epss","scoring_elements":"0.84157","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02119","scoring_system":"epss","scoring_elements":"0.84159","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5008"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1180092","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1180092"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5008","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5008"},{"reference_url":"http://security.libvirt.org/2016/0001.html","reference_id":"","reference_type":"","scores":[],"url":"http://security.libvirt.org/2016/0001.html"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DZZMOMRXNPALA34XDF5NK363KDLAYSTL/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DZZMOMRXNPALA34XDF5NK363KDLAYSTL/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QTQF6LXKEEMJG4VOOCIAPJAD6ACBYP4W/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QTQF6LXKEEMJG4VOOCIAPJAD6ACBYP4W/"},{"reference_url":"http://www.debian.org/security/2016/dsa-3613","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3613"},{"reference_url":"http://www.securityfocus.com/bid/91562","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/91562"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1351514","reference_id":"1351514","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1351514"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5008","reference_id":"CVE-2016-5008","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:N"},{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5008"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2577","reference_id":"RHSA-2016:2577","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2577"},{"reference_url":"https://usn.ubuntu.com/3576-1/","reference_id":"USN-3576-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3576-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928954?format=json","purl":"pkg:deb/debian/libvirt@2.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@2.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2016-5008"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8bqx-15w5-4kdm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87729?format=json","vulnerability_id":"VCID-8n5x-5hfu-t3h5","summary":"libvirt: ignoring defined main disk format when looking up disk backing stores","references":[{"reference_url":"http://libvirt.org/news.html","reference_id":"","reference_type":"","scores":[],"url":"http://libvirt.org/news.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044520.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044520.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044579.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044579.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2237.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2237.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2237","reference_id":"","reference_type":"","scores":[{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21279","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21445","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21613","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.2167","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21425","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21502","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21561","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21573","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21534","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21479","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21474","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.2148","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21448","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.213","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21299","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2237"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2237","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2237"},{"reference_url":"http://ubuntu.com/usn/usn-1008-1","reference_id":"","reference_type":"","scores":[],"url":"http://ubuntu.com/usn/usn-1008-1"},{"reference_url":"http://ubuntu.com/usn/usn-1008-2","reference_id":"","reference_type":"","scores":[],"url":"http://ubuntu.com/usn/usn-1008-2"},{"reference_url":"http://ubuntu.com/usn/usn-1008-3","reference_id":"","reference_type":"","scores":[],"url":"http://ubuntu.com/usn/usn-1008-3"},{"reference_url":"http://www.vupen.com/english/advisories/2010/2763","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/2763"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=607810","reference_id":"607810","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=607810"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.6.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.6.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.6.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.6.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.6.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.6.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.6.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2237","reference_id":"CVE-2010-2237","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:S/C:C/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2237"},{"reference_url":"https://usn.ubuntu.com/1008-1/","reference_id":"USN-1008-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1008-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928921?format=json","purl":"pkg:deb/debian/libvirt@0.8.3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@0.8.3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2010-2237"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8n5x-5hfu-t3h5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87728?format=json","vulnerability_id":"VCID-92zx-d4rq-yka1","summary":"libvirt: improperly mapped source privileged ports may allow for obtaining privileged resources on the host","references":[{"reference_url":"http://libvirt.org/news.html","reference_id":"","reference_type":"","scores":[],"url":"http://libvirt.org/news.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044520.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044520.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044579.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044579.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2242.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2242.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2242","reference_id":"","reference_type":"","scores":[{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18724","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18973","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18921","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18876","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18888","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.189","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18789","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18768","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23548","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23433","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23595","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23631","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23411","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23482","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.2353","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2242"},{"reference_url":"https://bugs.launchpad.net/ubuntu/+source/libvirt/+bug/591943","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.launchpad.net/ubuntu/+source/libvirt/+bug/591943"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2242","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2242"},{"reference_url":"http://ubuntu.com/usn/usn-1008-1","reference_id":"","reference_type":"","scores":[],"url":"http://ubuntu.com/usn/usn-1008-1"},{"reference_url":"http://ubuntu.com/usn/usn-1008-2","reference_id":"","reference_type":"","scores":[],"url":"http://ubuntu.com/usn/usn-1008-2"},{"reference_url":"http://ubuntu.com/usn/usn-1008-3","reference_id":"","reference_type":"","scores":[],"url":"http://ubuntu.com/usn/usn-1008-3"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0615.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0615.html"},{"reference_url":"http://www.vupen.com/english/advisories/2010/2062","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/2062"},{"reference_url":"http://www.vupen.com/english/advisories/2010/2763","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/2763"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=602455","reference_id":"602455","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=602455"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.4.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.4.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.4.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.4.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.4.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.4.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.6.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.6.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.6.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.6.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.6.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.6.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.6.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2242","reference_id":"CVE-2010-2242","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2242"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0615","reference_id":"RHSA-2010:0615","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0615"},{"reference_url":"https://usn.ubuntu.com/1008-1/","reference_id":"USN-1008-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1008-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928921?format=json","purl":"pkg:deb/debian/libvirt@0.8.3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@0.8.3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2010-2242"],"risk_score":0.9,"exploitability":"0.5","weighted_severity":"1.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-92zx-d4rq-yka1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86765?format=json","vulnerability_id":"VCID-9xr2-bm1e-3bge","summary":"libvirt: kvm-group writable storage","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1766.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1766.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1766","reference_id":"","reference_type":"","scores":[{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.1742","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17629","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17791","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17844","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17543","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17632","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17693","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17711","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17665","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17614","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.1756","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17568","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.176","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17511","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17488","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1766"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1766","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1766"},{"reference_url":"http://secunia.com/advisories/52628","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/52628"},{"reference_url":"http://www.debian.org/security/2013/dsa-2650","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2013/dsa-2650"},{"reference_url":"http://www.securityfocus.com/bid/58178","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/58178"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701649","reference_id":"701649","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701649"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=915718","reference_id":"915718","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=915718"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.1.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.1.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.1.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.1.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.1.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.1.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.1.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.1.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.1.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.1.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.1.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.1.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.1.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.1.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.1.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.4.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.4.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.4.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.4.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.4.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.4.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.4.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.4.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.4.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.6.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.6.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.6.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.6.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.6.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.6.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.6.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.8.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.8.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.8.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.8.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.8.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1766","reference_id":"CVE-2013-1766","reference_type":"","scores":[{"value":"3.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1766"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928931?format=json","purl":"pkg:deb/debian/libvirt@0.9.12-8?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@0.9.12-8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2013-1766"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9xr2-bm1e-3bge"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60682?format=json","vulnerability_id":"VCID-a5ed-jnjb-pybr","summary":"Multiple vulnerabilities have been discovered in libvirt, the worst\n    of which may result in the execution of arbitrary commands.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10168.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10168.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-10168","reference_id":"","reference_type":"","scores":[{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45677","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45742","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45765","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45714","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45771","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45768","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45791","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45761","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45766","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45816","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45811","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45757","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45687","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45698","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45638","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-10168"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10168","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10168"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1720118","reference_id":"1720118","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1720118"},{"reference_url":"https://security.gentoo.org/glsa/202003-18","reference_id":"GLSA-202003-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-18"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1579","reference_id":"RHSA-2019:1579","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1579"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1580","reference_id":"RHSA-2019:1580","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1580"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1699","reference_id":"RHSA-2019:1699","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1699"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1762","reference_id":"RHSA-2019:1762","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1762"},{"reference_url":"https://usn.ubuntu.com/4047-1/","reference_id":"USN-4047-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4047-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928961?format=json","purl":"pkg:deb/debian/libvirt@5.0.0-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@5.0.0-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2019-10168"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a5ed-jnjb-pybr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60680?format=json","vulnerability_id":"VCID-b489-x5z3-pkfh","summary":"Multiple vulnerabilities have been discovered in libvirt, the worst\n    of which may result in the execution of arbitrary commands.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10166.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10166.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-10166","reference_id":"","reference_type":"","scores":[{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.34157","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.34496","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.34524","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.34391","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.34433","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.34463","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.34464","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.34426","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.34402","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.34436","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.34423","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.34382","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.34011","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.33993","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.33907","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-10166"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10166","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10166"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1720114","reference_id":"1720114","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1720114"},{"reference_url":"https://security.gentoo.org/glsa/202003-18","reference_id":"GLSA-202003-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-18"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1579","reference_id":"RHSA-2019:1579","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1579"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1580","reference_id":"RHSA-2019:1580","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1580"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1699","reference_id":"RHSA-2019:1699","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1699"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1762","reference_id":"RHSA-2019:1762","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1762"},{"reference_url":"https://usn.ubuntu.com/4047-1/","reference_id":"USN-4047-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4047-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928961?format=json","purl":"pkg:deb/debian/libvirt@5.0.0-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@5.0.0-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2019-10166"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b489-x5z3-pkfh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/37760?format=json","vulnerability_id":"VCID-brry-h5uf-sffk","summary":"Multiple vulnerabilities were found in libvirt, the worst of which\n    might allow guest OS users to read arbitrary files on the host OS.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2178.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2178.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2178","reference_id":"","reference_type":"","scores":[{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24378","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24504","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24538","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24319","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24387","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24431","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24447","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24405","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24348","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24365","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24355","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24325","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.242","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24187","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24147","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2178"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2178","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2178"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=629128","reference_id":"629128","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=629128"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=709769","reference_id":"709769","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=709769"},{"reference_url":"https://security.gentoo.org/glsa/201202-07","reference_id":"GLSA-201202-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201202-07"},{"reference_url":"https://usn.ubuntu.com/1152-1/","reference_id":"USN-1152-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1152-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928924?format=json","purl":"pkg:deb/debian/libvirt@0.9.1-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@0.9.1-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2011-2178"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-brry-h5uf-sffk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79897?format=json","vulnerability_id":"VCID-bsjb-frkp-b3an","summary":"libvirt: deadlock and crash in libxl driver","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4147.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4147.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-4147","reference_id":"","reference_type":"","scores":[{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23184","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23361","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23401","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23189","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23262","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23312","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23333","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23295","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23238","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23254","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23248","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23228","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23036","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23029","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23026","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-4147"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4147","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4147"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1002535","reference_id":"1002535","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1002535"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2034195","reference_id":"2034195","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2034195"},{"reference_url":"https://usn.ubuntu.com/5399-1/","reference_id":"USN-5399-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5399-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928970?format=json","purl":"pkg:deb/debian/libvirt@7.10.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.10.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2021-4147"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bsjb-frkp-b3an"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/37756?format=json","vulnerability_id":"VCID-bvhf-srz3-7fa5","summary":"Multiple vulnerabilities were found in libvirt, the worst of which\n    might allow guest OS users to read arbitrary files on the host OS.","references":[{"reference_url":"http://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=f44bfb7fb978c9313ce050a1c4149bf04aa0a670","reference_id":"","reference_type":"","scores":[],"url":"http://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=f44bfb7fb978c9313ce050a1c4149bf04aa0a670"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1486.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1486.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1486","reference_id":"","reference_type":"","scores":[{"value":"0.00859","scoring_system":"epss","scoring_elements":"0.75081","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00859","scoring_system":"epss","scoring_elements":"0.74957","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00859","scoring_system":"epss","scoring_elements":"0.7496","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00859","scoring_system":"epss","scoring_elements":"0.74989","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00859","scoring_system":"epss","scoring_elements":"0.74965","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00859","scoring_system":"epss","scoring_elements":"0.74999","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00859","scoring_system":"epss","scoring_elements":"0.75011","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00859","scoring_system":"epss","scoring_elements":"0.75033","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00859","scoring_system":"epss","scoring_elements":"0.75001","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00859","scoring_system":"epss","scoring_elements":"0.75037","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00859","scoring_system":"epss","scoring_elements":"0.75044","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00859","scoring_system":"epss","scoring_elements":"0.75034","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00859","scoring_system":"epss","scoring_elements":"0.75072","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00859","scoring_system":"epss","scoring_elements":"0.75077","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1486"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1486","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1486"},{"reference_url":"http://secunia.com/advisories/44459","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/44459"},{"reference_url":"http://securitytracker.com/id?1025477","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1025477"},{"reference_url":"http://support.avaya.com/css/P8/documents/100134583","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/css/P8/documents/100134583"},{"reference_url":"https://www.redhat.com/archives/libvir-list/2011-March/msg01087.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/libvir-list/2011-March/msg01087.html"},{"reference_url":"http://www.debian.org/security/2011/dsa-2280","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2011/dsa-2280"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-0478.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2011-0478.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-0479.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2011-0479.html"},{"reference_url":"http://www.securityfocus.com/bid/47148","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/47148"},{"reference_url":"http://www.ubuntu.com/usn/USN-1152-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1152-1"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=623222","reference_id":"623222","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=623222"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=693391","reference_id":"693391","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=693391"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.1.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.1.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.1.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.1.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.1.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.1.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.1.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.1.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.1.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.1.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.1.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.1.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.1.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.1.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.1.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.4.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.4.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.4.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.4.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.4.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.4.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.4.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.4.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.4.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.6.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.6.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.6.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.6.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.6.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.6.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.6.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.8.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.8.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.8.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.8.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2011-1486","reference_id":"CVE-2011-1486","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv2","scoring_elements":"AV:A/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2011-1486"},{"reference_url":"https://security.gentoo.org/glsa/201202-07","reference_id":"GLSA-201202-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201202-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0478","reference_id":"RHSA-2011:0478","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0478"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0479","reference_id":"RHSA-2011:0479","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0479"},{"reference_url":"https://usn.ubuntu.com/1152-1/","reference_id":"USN-1152-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1152-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928923?format=json","purl":"pkg:deb/debian/libvirt@0.9.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@0.9.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2011-1486"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bvhf-srz3-7fa5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56024?format=json","vulnerability_id":"VCID-bz31-74av-9kgf","summary":"security update","references":[{"reference_url":"http://libvirt.org/news.html","reference_id":"","reference_type":"","scores":[],"url":"http://libvirt.org/news.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-05/msg00048.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-05/msg00048.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-05/msg00052.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-05/msg00052.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-0560.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-0560.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0179.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0179.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0179","reference_id":"","reference_type":"","scores":[{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28374","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28775","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28855","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28904","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28711","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28777","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28817","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.2882","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28776","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28727","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28746","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28723","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28675","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28561","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28449","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0179"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0179","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0179"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3633","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3633"},{"reference_url":"http://secunia.com/advisories/60895","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60895"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201412-04.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201412-04.xml"},{"reference_url":"http://security.libvirt.org/2014/0003.html","reference_id":"","reference_type":"","scores":[],"url":"http://security.libvirt.org/2014/0003.html"},{"reference_url":"http://www.debian.org/security/2014/dsa-3038","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3038"},{"reference_url":"http://www.ubuntu.com/usn/USN-2366-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2366-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1088290","reference_id":"1088290","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1088290"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:enterprise_virtualization:3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:enterprise_virtualization:3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:enterprise_virtualization:3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.10.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.10.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.10.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.10.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.10.2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.2.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.10.2.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.2.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.2.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.10.2.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.2.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.2.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.10.2.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.2.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.2.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.10.2.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.2.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.2.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.10.2.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.2.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.8.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.8.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.8.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.8.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.8.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.11.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.11.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.11.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.11.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.11.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.11.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.11.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.6.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.6.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.6.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.0.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.0.5.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.0.5.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.0.5.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.0.5.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.0.5.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.1.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.1.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.1.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.2.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-0179","reference_id":"CVE-2014-0179","reference_type":"","scores":[{"value":"1.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-0179"},{"reference_url":"https://security.gentoo.org/glsa/201412-04","reference_id":"GLSA-201412-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0560","reference_id":"RHSA-2014:0560","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0560"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0914","reference_id":"RHSA-2014:0914","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0914"},{"reference_url":"https://usn.ubuntu.com/2366-1/","reference_id":"USN-2366-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2366-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928944?format=json","purl":"pkg:deb/debian/libvirt@1.2.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@1.2.4-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2014-0179"],"risk_score":0.8,"exploitability":"0.5","weighted_severity":"1.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bz31-74av-9kgf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81578?format=json","vulnerability_id":"VCID-c628-5r9h-37ad","summary":"libvirt: memory leak in domstats may allow read-only user to perform DoS attack","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12430.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12430.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-12430","reference_id":"","reference_type":"","scores":[{"value":"0.00859","scoring_system":"epss","scoring_elements":"0.74964","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00859","scoring_system":"epss","scoring_elements":"0.74968","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00859","scoring_system":"epss","scoring_elements":"0.74997","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00859","scoring_system":"epss","scoring_elements":"0.74973","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00859","scoring_system":"epss","scoring_elements":"0.75007","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00859","scoring_system":"epss","scoring_elements":"0.75018","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00859","scoring_system":"epss","scoring_elements":"0.7504","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00859","scoring_system":"epss","scoring_elements":"0.75008","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00859","scoring_system":"epss","scoring_elements":"0.75044","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00859","scoring_system":"epss","scoring_elements":"0.75052","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00859","scoring_system":"epss","scoring_elements":"0.75041","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00859","scoring_system":"epss","scoring_elements":"0.75079","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00859","scoring_system":"epss","scoring_elements":"0.75085","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00859","scoring_system":"epss","scoring_elements":"0.75088","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-12430"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12430","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12430"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1828190","reference_id":"1828190","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1828190"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=959447","reference_id":"959447","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=959447"},{"reference_url":"https://usn.ubuntu.com/4371-1/","reference_id":"USN-4371-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4371-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928966?format=json","purl":"pkg:deb/debian/libvirt@6.4.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@6.4.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2020-12430"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c628-5r9h-37ad"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56065?format=json","vulnerability_id":"VCID-cfgr-2prz-mkh3","summary":"Multiple vulnerabilities have been found in libvirt, worst of which\n    allows context-dependent attackers to escalate privileges.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6456.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6456.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6456","reference_id":"","reference_type":"","scores":[{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.4701","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47048","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47067","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47014","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47069","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47065","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.4709","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47064","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47071","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47127","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47123","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.4707","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47056","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47016","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6456"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6456","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6456"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1048627","reference_id":"1048627","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1048627"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=732394","reference_id":"732394","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=732394"},{"reference_url":"https://security.gentoo.org/glsa/201412-04","reference_id":"GLSA-201412-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-04"},{"reference_url":"https://usn.ubuntu.com/2209-1/","reference_id":"USN-2209-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2209-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928942?format=json","purl":"pkg:deb/debian/libvirt@1.2.3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@1.2.3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2013-6456"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cfgr-2prz-mkh3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87195?format=json","vulnerability_id":"VCID-cfv9-s42e-3fdq","summary":"libvirt: unintended firewall port exposure after restarting libvirtd when defining a bridged forward-mode network","references":[{"reference_url":"http://libvirt.org/git/?p=libvirt.git%3Ba=commitdiff%3Bh=ae1232b298323dd7bef909426e2ebafa6bca9157","reference_id":"","reference_type":"","scores":[],"url":"http://libvirt.org/git/?p=libvirt.git%3Ba=commitdiff%3Bh=ae1232b298323dd7bef909426e2ebafa6bca9157"},{"reference_url":"http://libvirt.org/news-2012.html","reference_id":"","reference_type":"","scores":[],"url":"http://libvirt.org/news-2012.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4600.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4600.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4600","reference_id":"","reference_type":"","scores":[{"value":"0.00306","scoring_system":"epss","scoring_elements":"0.53818","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00306","scoring_system":"epss","scoring_elements":"0.5385","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00306","scoring_system":"epss","scoring_elements":"0.53761","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00306","scoring_system":"epss","scoring_elements":"0.53781","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00306","scoring_system":"epss","scoring_elements":"0.53808","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00306","scoring_system":"epss","scoring_elements":"0.53782","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00306","scoring_system":"epss","scoring_elements":"0.53834","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00306","scoring_system":"epss","scoring_elements":"0.53832","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00306","scoring_system":"epss","scoring_elements":"0.5388","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00306","scoring_system":"epss","scoring_elements":"0.53863","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00306","scoring_system":"epss","scoring_elements":"0.53847","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00306","scoring_system":"epss","scoring_elements":"0.53885","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00306","scoring_system":"epss","scoring_elements":"0.5389","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00306","scoring_system":"epss","scoring_elements":"0.53871","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00306","scoring_system":"epss","scoring_elements":"0.53838","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4600"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=760442","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=760442"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4600"},{"reference_url":"http://www.ubuntu.com/usn/USN-2867-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2867-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=765964","reference_id":"765964","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=765964"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2011-4600","reference_id":"CVE-2011-4600","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:N"},{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2011-4600"},{"reference_url":"https://usn.ubuntu.com/2867-1/","reference_id":"USN-2867-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2867-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928926?format=json","purl":"pkg:deb/debian/libvirt@0.9.9-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@0.9.9-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2011-4600"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cfv9-s42e-3fdq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/37749?format=json","vulnerability_id":"VCID-cma6-wset-7uaf","summary":"Multiple vulnerabilities were found in libvirt, the worst of which\n    might allow guest OS users to read arbitrary files on the host OS.","references":[{"reference_url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=617773","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=617773"},{"reference_url":"http://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=71753cb7f7a16ff800381c0b5ee4e99eea92fed3","reference_id":"","reference_type":"","scores":[],"url":"http://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=71753cb7f7a16ff800381c0b5ee4e99eea92fed3"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056209.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056209.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2011-04/msg00022.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2011-04/msg00022.html"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/09/3","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/09/3"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/10/5","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/10/5"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1146.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1146.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1146","reference_id":"","reference_type":"","scores":[{"value":"0.01556","scoring_system":"epss","scoring_elements":"0.81522","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01556","scoring_system":"epss","scoring_elements":"0.81382","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01556","scoring_system":"epss","scoring_elements":"0.81391","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01556","scoring_system":"epss","scoring_elements":"0.81414","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01556","scoring_system":"epss","scoring_elements":"0.81413","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01556","scoring_system":"epss","scoring_elements":"0.81441","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01556","scoring_system":"epss","scoring_elements":"0.81447","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01556","scoring_system":"epss","scoring_elements":"0.81468","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01556","scoring_system":"epss","scoring_elements":"0.81456","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01556","scoring_system":"epss","scoring_elements":"0.81449","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01556","scoring_system":"epss","scoring_elements":"0.81486","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01556","scoring_system":"epss","scoring_elements":"0.81487","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01556","scoring_system":"epss","scoring_elements":"0.81488","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01556","scoring_system":"epss","scoring_elements":"0.8151","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01556","scoring_system":"epss","scoring_elements":"0.81518","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1146"},{"reference_url":"https://bugzilla.novell.com/show_bug.cgi?id=678406","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.novell.com/show_bug.cgi?id=678406"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1146","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1146"},{"reference_url":"http://secunia.com/advisories/43670","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/43670"},{"reference_url":"http://secunia.com/advisories/43780","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/43780"},{"reference_url":"http://secunia.com/advisories/43897","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/43897"},{"reference_url":"http://secunia.com/advisories/43917","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/43917"},{"reference_url":"http://secunia.com/advisories/44069","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/44069"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/66012","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/66012"},{"reference_url":"http://www.debian.org/security/2011/dsa-2194","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2011/dsa-2194"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-0391.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2011-0391.html"},{"reference_url":"http://www.securityfocus.com/bid/46820","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/46820"},{"reference_url":"http://www.securitytracker.com/id?1025262","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1025262"},{"reference_url":"http://www.ubuntu.com/usn/USN-1094-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1094-1"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0694","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0694"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0700","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0700"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0794","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0794"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0805","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0805"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=617773","reference_id":"617773","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=617773"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=683650","reference_id":"683650","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=683650"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.8.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2011-1146","reference_id":"CVE-2011-1146","reference_type":"","scores":[{"value":"6.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2011-1146"},{"reference_url":"https://security.gentoo.org/glsa/201202-07","reference_id":"GLSA-201202-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201202-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0391","reference_id":"RHSA-2011:0391","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0391"},{"reference_url":"https://usn.ubuntu.com/1094-1/","reference_id":"USN-1094-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1094-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928922?format=json","purl":"pkg:deb/debian/libvirt@0.8.8-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@0.8.8-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2011-1146"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cma6-wset-7uaf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57256?format=json","vulnerability_id":"VCID-cue5-u48q-87ft","summary":"Multiple vulnerabilities have been discovered in libvirt, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3667.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3667.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3667","reference_id":"","reference_type":"","scores":[{"value":"0.00435","scoring_system":"epss","scoring_elements":"0.62977","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00435","scoring_system":"epss","scoring_elements":"0.62963","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00435","scoring_system":"epss","scoring_elements":"0.62942","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00435","scoring_system":"epss","scoring_elements":"0.62962","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.62964","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.62957","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.63008","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.63024","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.63042","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.63027","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.63005","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.62905","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.62993","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3667"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3667","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3667"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986094","reference_id":"1986094","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986094"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991594","reference_id":"991594","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991594"},{"reference_url":"https://security.archlinux.org/AVG-2230","reference_id":"AVG-2230","reference_type":"","scores":[{"value":"Low","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2230"},{"reference_url":"https://security.gentoo.org/glsa/202210-06","reference_id":"GLSA-202210-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202210-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3703","reference_id":"RHSA-2021:3703","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3703"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3704","reference_id":"RHSA-2021:3704","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3704"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4191","reference_id":"RHSA-2021:4191","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4191"},{"reference_url":"https://usn.ubuntu.com/5399-1/","reference_id":"USN-5399-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5399-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928969?format=json","purl":"pkg:deb/debian/libvirt@7.6.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.6.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2021-3667"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cue5-u48q-87ft"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56836?format=json","vulnerability_id":"VCID-d2tk-fnzu-muhf","summary":"Multiple vulnerabilities have been found in libvirt, allowing\n    remote attackers to execute arbitrary code or cause Denial of Service.","references":[{"reference_url":"http://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=ca697e90d5bd6a6dfb94bfb6d4438bdf9a44b739","reference_id":"","reference_type":"","scores":[],"url":"http://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=ca697e90d5bd6a6dfb94bfb6d4438bdf9a44b739"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106906.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106906.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106921.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106921.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00022.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00022.html"},{"reference_url":"http://osvdb.org/93451","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/93451"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2013-0831.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2013-0831.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1962.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1962.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1962","reference_id":"","reference_type":"","scores":[{"value":"0.03779","scoring_system":"epss","scoring_elements":"0.88092","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03779","scoring_system":"epss","scoring_elements":"0.88001","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03779","scoring_system":"epss","scoring_elements":"0.8801","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03779","scoring_system":"epss","scoring_elements":"0.88024","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03779","scoring_system":"epss","scoring_elements":"0.88029","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03779","scoring_system":"epss","scoring_elements":"0.8805","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03779","scoring_system":"epss","scoring_elements":"0.88055","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03779","scoring_system":"epss","scoring_elements":"0.88065","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03779","scoring_system":"epss","scoring_elements":"0.88058","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03779","scoring_system":"epss","scoring_elements":"0.88059","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03779","scoring_system":"epss","scoring_elements":"0.88073","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03779","scoring_system":"epss","scoring_elements":"0.8807","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03779","scoring_system":"epss","scoring_elements":"0.88089","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03779","scoring_system":"epss","scoring_elements":"0.88094","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1962"},{"reference_url":"http://secunia.com/advisories/53440","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/53440"},{"reference_url":"http://secunia.com/advisories/53475","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/53475"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/84341","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/84341"},{"reference_url":"https://www.redhat.com/archives/libvir-list/2013-May/msg01222.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/libvir-list/2013-May/msg01222.html"},{"reference_url":"http://www.openwall.com/lists/oss-security/2013/05/16/9","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2013/05/16/9"},{"reference_url":"http://www.securityfocus.com/bid/59937","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/59937"},{"reference_url":"http://www.securitytracker.com/id/1028577","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1028577"},{"reference_url":"http://www.ubuntu.com/usn/USN-1895-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1895-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=953107","reference_id":"953107","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=953107"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1962","reference_id":"CVE-2013-1962","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1962"},{"reference_url":"https://security.gentoo.org/glsa/201309-18","reference_id":"GLSA-201309-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201309-18"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:0831","reference_id":"RHSA-2013:0831","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:0831"},{"reference_url":"https://usn.ubuntu.com/1895-1/","reference_id":"USN-1895-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1895-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928932?format=json","purl":"pkg:deb/debian/libvirt@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2013-1962"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-d2tk-fnzu-muhf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86631?format=json","vulnerability_id":"VCID-e4vr-p8vg-y3bn","summary":"libvirt: multiple registered events crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2230.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2230.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-2230","reference_id":"","reference_type":"","scores":[{"value":"0.0058","scoring_system":"epss","scoring_elements":"0.68821","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0058","scoring_system":"epss","scoring_elements":"0.68839","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0058","scoring_system":"epss","scoring_elements":"0.6886","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0058","scoring_system":"epss","scoring_elements":"0.6884","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0058","scoring_system":"epss","scoring_elements":"0.6889","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0058","scoring_system":"epss","scoring_elements":"0.68908","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0058","scoring_system":"epss","scoring_elements":"0.68931","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0058","scoring_system":"epss","scoring_elements":"0.68917","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0058","scoring_system":"epss","scoring_elements":"0.68888","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0058","scoring_system":"epss","scoring_elements":"0.68929","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0058","scoring_system":"epss","scoring_elements":"0.68939","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0058","scoring_system":"epss","scoring_elements":"0.68918","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0058","scoring_system":"epss","scoring_elements":"0.68968","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0058","scoring_system":"epss","scoring_elements":"0.68974","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0058","scoring_system":"epss","scoring_elements":"0.6898","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-2230"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2230","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2230"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=715559","reference_id":"715559","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=715559"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=981476","reference_id":"981476","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=981476"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928934?format=json","purl":"pkg:deb/debian/libvirt@1.1.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@1.1.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2013-2230"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e4vr-p8vg-y3bn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82675?format=json","vulnerability_id":"VCID-e93r-zft5-33dk","summary":"libvirt: virsh domhostname command discloses guest hostname in readonly mode","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00105.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00105.html"},{"reference_url":"https://access.redhat.com/errata/RHBA-2019:3723","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHBA-2019:3723"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3886.json","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3886.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-3886","reference_id":"","reference_type":"","scores":[{"value":"0.00463","scoring_system":"epss","scoring_elements":"0.64184","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00463","scoring_system":"epss","scoring_elements":"0.64338","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00463","scoring_system":"epss","scoring_elements":"0.64304","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00463","scoring_system":"epss","scoring_elements":"0.64315","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00463","scoring_system":"epss","scoring_elements":"0.64324","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00463","scoring_system":"epss","scoring_elements":"0.64337","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00463","scoring_system":"epss","scoring_elements":"0.64242","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00463","scoring_system":"epss","scoring_elements":"0.64269","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00463","scoring_system":"epss","scoring_elements":"0.6423","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00463","scoring_system":"epss","scoring_elements":"0.6428","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00463","scoring_system":"epss","scoring_elements":"0.64295","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00463","scoring_system":"epss","scoring_elements":"0.64308","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00463","scoring_system":"epss","scoring_elements":"0.64297","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00463","scoring_system":"epss","scoring_elements":"0.6427","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-3886"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3886","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3886"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3886","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3886"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CYMNKXAUBZCFBBPFH64FJPH5EJH4GSU2/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CYMNKXAUBZCFBBPFH64FJPH5EJH4GSU2/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R5DHYIFECZ7BMVXK4EP4FDFZXK7I5MZH/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R5DHYIFECZ7BMVXK4EP4FDFZXK7I5MZH/"},{"reference_url":"http://www.securityfocus.com/bid/107777","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/107777"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1694880","reference_id":"1694880","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1694880"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926418","reference_id":"926418","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926418"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-3886","reference_id":"CVE-2019-3886","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv2","scoring_elements":"AV:A/AC:L/Au:N/C:P/I:N/A:P"},{"value":"5.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"},{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-3886"},{"reference_url":"https://usn.ubuntu.com/4021-1/","reference_id":"USN-4021-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4021-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928964?format=json","purl":"pkg:deb/debian/libvirt@5.0.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@5.0.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2019-3886"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"4.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e93r-zft5-33dk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/45695?format=json","vulnerability_id":"VCID-efnj-ea3r-uyb2","summary":"A race condition in polkit could allow a local attacker to gain\n    escalated privileges.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4311.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4311.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4311","reference_id":"","reference_type":"","scores":[{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06449","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06482","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.0652","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06511","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06561","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06603","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06597","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06589","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.0658","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06506","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06514","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06666","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06676","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06689","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.0668","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4311"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4311","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4311"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1005332","reference_id":"1005332","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1005332"},{"reference_url":"https://security.gentoo.org/glsa/201406-27","reference_id":"GLSA-201406-27","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-27"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1272","reference_id":"RHSA-2013:1272","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1272"},{"reference_url":"https://usn.ubuntu.com/1954-1/","reference_id":"USN-1954-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1954-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928940?format=json","purl":"pkg:deb/debian/libvirt@1.1.3~rc1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@1.1.3~rc1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2013-4311"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-efnj-ea3r-uyb2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/76487?format=json","vulnerability_id":"VCID-f42m-zfwv-vqe5","summary":"libvirt: stack use-after-free in virNetClientIOEventLoop()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4418.json","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4418.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-4418","reference_id":"","reference_type":"","scores":[{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67099","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67085","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67065","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67086","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67002","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67027","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67001","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67051","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67063","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67082","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67068","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67037","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.6707","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-4418"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1070330","reference_id":"1070330","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1070330"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2278616","reference_id":"2278616","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-08T15:25:15Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2278616"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_virtualization:8::el8","reference_id":"cpe:/a:redhat:advanced_virtualization:8::el8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_virtualization:8::el8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb","reference_id":"cpe:/a:redhat:enterprise_linux:8::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb","reference_id":"cpe:/a:redhat:rhel_eus:9.2::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2024-4418","reference_id":"CVE-2024-4418","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-08T15:25:15Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2024-4418"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4351","reference_id":"RHSA-2024:4351","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-08T15:25:15Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:4351"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4432","reference_id":"RHSA-2024:4432","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-08T15:25:15Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:4432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4757","reference_id":"RHSA-2024:4757","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-08T15:25:15Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:4757"},{"reference_url":"https://usn.ubuntu.com/6763-1/","reference_id":"USN-6763-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6763-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928932?format=json","purl":"pkg:deb/debian/libvirt@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928978?format=json","purl":"pkg:deb/debian/libvirt@10.3.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@10.3.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2024-4418"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-f42m-zfwv-vqe5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56066?format=json","vulnerability_id":"VCID-fk4t-hh7x-77he","summary":"Multiple vulnerabilities have been found in libvirt, worst of which\n    allows context-dependent attackers to escalate privileges.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6457.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6457.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6457","reference_id":"","reference_type":"","scores":[{"value":"0.00135","scoring_system":"epss","scoring_elements":"0.33164","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00135","scoring_system":"epss","scoring_elements":"0.33292","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00135","scoring_system":"epss","scoring_elements":"0.33324","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00135","scoring_system":"epss","scoring_elements":"0.33157","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00135","scoring_system":"epss","scoring_elements":"0.332","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00135","scoring_system":"epss","scoring_elements":"0.33233","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00135","scoring_system":"epss","scoring_elements":"0.33236","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00135","scoring_system":"epss","scoring_elements":"0.33195","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00135","scoring_system":"epss","scoring_elements":"0.33172","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00135","scoring_system":"epss","scoring_elements":"0.33212","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00135","scoring_system":"epss","scoring_elements":"0.3319","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00135","scoring_system":"epss","scoring_elements":"0.33154","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00135","scoring_system":"epss","scoring_elements":"0.33007","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00135","scoring_system":"epss","scoring_elements":"0.3299","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00135","scoring_system":"epss","scoring_elements":"0.32914","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6457"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6457","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6457"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1048629","reference_id":"1048629","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1048629"},{"reference_url":"https://security.gentoo.org/glsa/201412-04","reference_id":"GLSA-201412-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-04"},{"reference_url":"https://usn.ubuntu.com/2093-1/","reference_id":"USN-2093-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2093-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928943?format=json","purl":"pkg:deb/debian/libvirt@1.2.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@1.2.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2013-6457"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fk4t-hh7x-77he"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80991?format=json","vulnerability_id":"VCID-g9e9-hz2r-3uah","summary":"libvirt: incorrect permissions on the UNIX domain socket allows local attacker to escalate privileges","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15708.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15708.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-15708","reference_id":"","reference_type":"","scores":[{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.35938","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.36129","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.36159","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.35994","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.36044","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.36066","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.36073","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.36034","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.36008","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.36047","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.36033","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.35982","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.35754","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.35723","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.35634","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-15708"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1866270","reference_id":"1866270","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1866270"},{"reference_url":"https://usn.ubuntu.com/4452-1/","reference_id":"USN-4452-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4452-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928932?format=json","purl":"pkg:deb/debian/libvirt@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2020-15708"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-g9e9-hz2r-3uah"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82522?format=json","vulnerability_id":"VCID-gc5z-hy4a-8uft","summary":"libvirt: wrong permissions in systemd admin-sock due to missing SocketMode parameter","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10132.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10132.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-10132","reference_id":"","reference_type":"","scores":[{"value":"0.01283","scoring_system":"epss","scoring_elements":"0.79685","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01283","scoring_system":"epss","scoring_elements":"0.79663","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01283","scoring_system":"epss","scoring_elements":"0.7967","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01333","scoring_system":"epss","scoring_elements":"0.79923","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01333","scoring_system":"epss","scoring_elements":"0.79932","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01333","scoring_system":"epss","scoring_elements":"0.79961","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01333","scoring_system":"epss","scoring_elements":"0.7997","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01333","scoring_system":"epss","scoring_elements":"0.7999","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01333","scoring_system":"epss","scoring_elements":"0.79973","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01333","scoring_system":"epss","scoring_elements":"0.79965","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01333","scoring_system":"epss","scoring_elements":"0.79993","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01333","scoring_system":"epss","scoring_elements":"0.79994","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01333","scoring_system":"epss","scoring_elements":"0.79996","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01333","scoring_system":"epss","scoring_elements":"0.79916","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01333","scoring_system":"epss","scoring_elements":"0.79944","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-10132"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10132","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10132"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1706067","reference_id":"1706067","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1706067"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929334","reference_id":"929334","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929334"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1264","reference_id":"RHSA-2019:1264","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1264"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1268","reference_id":"RHSA-2019:1268","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1268"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1455","reference_id":"RHSA-2019:1455","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1455"},{"reference_url":"https://usn.ubuntu.com/4021-1/","reference_id":"USN-4021-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4021-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928960?format=json","purl":"pkg:deb/debian/libvirt@5.0.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@5.0.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2019-10132"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gc5z-hy4a-8uft"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56835?format=json","vulnerability_id":"VCID-gmyn-vg39-q3bv","summary":"Multiple vulnerabilities have been found in libvirt, allowing\n    remote attackers to execute arbitrary code or cause Denial of Service.","references":[{"reference_url":"http://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=46532e3e8ed5f5a736a02f67d6c805492f9ca720","reference_id":"","reference_type":"","scores":[],"url":"http://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=46532e3e8ed5f5a736a02f67d6c805492f9ca720"},{"reference_url":"http://libvirt.org/news.html","reference_id":"","reference_type":"","scores":[],"url":"http://libvirt.org/news.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-February/098326.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-February/098326.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-February/098370.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-February/098370.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-February/098398.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-February/098398.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00002.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00016.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00016.html"},{"reference_url":"http://osvdb.org/89644","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/89644"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2013-0199.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2013-0199.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0170.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0170.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-0170","reference_id":"","reference_type":"","scores":[{"value":"0.2022","scoring_system":"epss","scoring_elements":"0.95524","published_at":"2026-04-29T12:55:00Z"},{"value":"0.2022","scoring_system":"epss","scoring_elements":"0.95469","published_at":"2026-04-01T12:55:00Z"},{"value":"0.2022","scoring_system":"epss","scoring_elements":"0.95478","published_at":"2026-04-02T12:55:00Z"},{"value":"0.2022","scoring_system":"epss","scoring_elements":"0.95484","published_at":"2026-04-04T12:55:00Z"},{"value":"0.2022","scoring_system":"epss","scoring_elements":"0.95489","published_at":"2026-04-07T12:55:00Z"},{"value":"0.2022","scoring_system":"epss","scoring_elements":"0.95495","published_at":"2026-04-08T12:55:00Z"},{"value":"0.2022","scoring_system":"epss","scoring_elements":"0.95498","published_at":"2026-04-09T12:55:00Z"},{"value":"0.2022","scoring_system":"epss","scoring_elements":"0.95503","published_at":"2026-04-11T12:55:00Z"},{"value":"0.2022","scoring_system":"epss","scoring_elements":"0.95505","published_at":"2026-04-13T12:55:00Z"},{"value":"0.2022","scoring_system":"epss","scoring_elements":"0.95514","published_at":"2026-04-16T12:55:00Z"},{"value":"0.2022","scoring_system":"epss","scoring_elements":"0.9552","published_at":"2026-04-18T12:55:00Z"},{"value":"0.2022","scoring_system":"epss","scoring_elements":"0.95522","published_at":"2026-04-21T12:55:00Z"},{"value":"0.2022","scoring_system":"epss","scoring_elements":"0.95523","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-0170"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0170","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0170"},{"reference_url":"http://secunia.com/advisories/52001","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/52001"},{"reference_url":"http://secunia.com/advisories/52003","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/52003"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/81552","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/81552"},{"reference_url":"http://wiki.libvirt.org/page/Maintenance_Releases","reference_id":"","reference_type":"","scores":[],"url":"http://wiki.libvirt.org/page/Maintenance_Releases"},{"reference_url":"http://www.securityfocus.com/bid/57578","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/57578"},{"reference_url":"http://www.securitytracker.com/id/1028047","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1028047"},{"reference_url":"http://www.ubuntu.com/usn/USN-1708-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1708-1"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699224","reference_id":"699224","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699224"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=893450","reference_id":"893450","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=893450"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-0170","reference_id":"CVE-2013-0170","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-0170"},{"reference_url":"https://security.gentoo.org/glsa/201309-18","reference_id":"GLSA-201309-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201309-18"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:0199","reference_id":"RHSA-2013:0199","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:0199"},{"reference_url":"https://usn.ubuntu.com/1708-1/","reference_id":"USN-1708-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1708-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928930?format=json","purl":"pkg:deb/debian/libvirt@0.9.12-6?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@0.9.12-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2013-0170"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gmyn-vg39-q3bv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60679?format=json","vulnerability_id":"VCID-gp93-s21f-8fh7","summary":"Multiple vulnerabilities have been discovered in libvirt, the worst\n    of which may result in the execution of arbitrary commands.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10161.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10161.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-10161","reference_id":"","reference_type":"","scores":[{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49809","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49847","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49874","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49826","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49881","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49875","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49893","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49865","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49866","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49912","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49913","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49885","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49871","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49878","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49833","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-10161"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10161","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10161"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10167","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10167"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1720115","reference_id":"1720115","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1720115"},{"reference_url":"https://security.gentoo.org/glsa/202003-18","reference_id":"GLSA-202003-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-18"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1578","reference_id":"RHSA-2019:1578","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1578"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1579","reference_id":"RHSA-2019:1579","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1579"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1580","reference_id":"RHSA-2019:1580","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1580"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1699","reference_id":"RHSA-2019:1699","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1699"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1762","reference_id":"RHSA-2019:1762","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1762"},{"reference_url":"https://usn.ubuntu.com/4047-1/","reference_id":"USN-4047-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4047-1/"},{"reference_url":"https://usn.ubuntu.com/4047-2/","reference_id":"USN-4047-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4047-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928961?format=json","purl":"pkg:deb/debian/libvirt@5.0.0-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@5.0.0-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2019-10161"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gp93-s21f-8fh7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/74124?format=json","vulnerability_id":"VCID-gqm9-twrh-tbcn","summary":"libvirt: Crash of virtinterfaced via virConnectListInterfaces()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8235.json","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8235.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-8235","reference_id":"","reference_type":"","scores":[{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22761","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27754","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27548","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27656","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27712","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27923","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27965","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27756","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27824","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27865","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27871","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27829","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27772","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27779","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-8235"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1080218","reference_id":"1080218","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1080218"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2308680","reference_id":"2308680","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-30T17:10:46Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2308680"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_virtualization:8::el8","reference_id":"cpe:/a:redhat:advanced_virtualization:8::el8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_virtualization:8::el8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10","reference_id":"cpe:/o:redhat:enterprise_linux:10","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8","reference_id":"cpe:/o:redhat:enterprise_linux:8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2024-8235","reference_id":"CVE-2024-8235","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-30T17:10:46Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2024-8235"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9128","reference_id":"RHSA-2024:9128","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-30T17:10:46Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:9128"},{"reference_url":"https://lists.libvirt.org/archives/list/devel@lists.libvirt.org/thread/X6WOVCL6QF3FQRFIIXL736RFZVSUWLWJ/","reference_id":"X6WOVCL6QF3FQRFIIXL736RFZVSUWLWJ","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-30T17:10:46Z/"}],"url":"https://lists.libvirt.org/archives/list/devel@lists.libvirt.org/thread/X6WOVCL6QF3FQRFIIXL736RFZVSUWLWJ/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928932?format=json","purl":"pkg:deb/debian/libvirt@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928979?format=json","purl":"pkg:deb/debian/libvirt@10.7.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@10.7.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2024-8235"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gqm9-twrh-tbcn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86619?format=json","vulnerability_id":"VCID-grvk-64s2-mbdc","summary":"libvirt: double free of returned JSON array in qemuAgentGetVCPUs()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4153.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4153.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4153","reference_id":"","reference_type":"","scores":[{"value":"0.00642","scoring_system":"epss","scoring_elements":"0.70534","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00642","scoring_system":"epss","scoring_elements":"0.70548","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00642","scoring_system":"epss","scoring_elements":"0.70565","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00642","scoring_system":"epss","scoring_elements":"0.70542","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00642","scoring_system":"epss","scoring_elements":"0.70588","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00642","scoring_system":"epss","scoring_elements":"0.70603","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00642","scoring_system":"epss","scoring_elements":"0.70625","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00642","scoring_system":"epss","scoring_elements":"0.70611","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00642","scoring_system":"epss","scoring_elements":"0.70597","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00642","scoring_system":"epss","scoring_elements":"0.70642","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00642","scoring_system":"epss","scoring_elements":"0.70651","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00642","scoring_system":"epss","scoring_elements":"0.7063","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00642","scoring_system":"epss","scoring_elements":"0.70681","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00642","scoring_system":"epss","scoring_elements":"0.70691","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4153"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4153","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4153"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717354","reference_id":"717354","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717354"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=986383","reference_id":"986383","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=986383"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928935?format=json","purl":"pkg:deb/debian/libvirt@1.1.0-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@1.1.0-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2013-4153"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-grvk-64s2-mbdc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85561?format=json","vulnerability_id":"VCID-hpgc-t8mr-qkan","summary":"libvirt: Ceph id/key leaked in the process list","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5160.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5160.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5160","reference_id":"","reference_type":"","scores":[{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34716","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34924","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.3495","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.3483","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34875","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34902","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34906","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34869","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34846","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34885","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34868","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34823","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34587","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34567","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.3448","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5160"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5160","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5160"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1245647","reference_id":"1245647","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1245647"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=796111","reference_id":"796111","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=796111"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2577","reference_id":"RHSA-2016:2577","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2577"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928950?format=json","purl":"pkg:deb/debian/libvirt@2.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@2.2.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2015-5160"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hpgc-t8mr-qkan"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56069?format=json","vulnerability_id":"VCID-jcqj-y7ve-dkf3","summary":"Multiple vulnerabilities have been found in libvirt, worst of which\n    allows context-dependent attackers to escalate privileges.","references":[{"reference_url":"http://libvirt.org/news.html","reference_id":"","reference_type":"","scores":[],"url":"http://libvirt.org/news.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-05/msg00048.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-05/msg00048.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-05/msg00052.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-05/msg00052.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-0560.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-0560.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5177.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5177.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-5177","reference_id":"","reference_type":"","scores":[{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.29678","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.30075","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.30112","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.30161","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.29974","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.30034","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.3007","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.30074","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.3003","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.2998","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.29995","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.29975","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.29929","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.29855","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.29742","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-5177"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5177","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5177"},{"reference_url":"http://secunia.com/advisories/60895","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60895"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201412-04.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201412-04.xml"},{"reference_url":"http://security.libvirt.org/2014/0003.html","reference_id":"","reference_type":"","scores":[],"url":"http://security.libvirt.org/2014/0003.html"},{"reference_url":"http://www.ubuntu.com/usn/USN-2366-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2366-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1088290","reference_id":"1088290","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1088290"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:enterprise_virtualization:3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:enterprise_virtualization:3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:enterprise_virtualization:3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.0.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.0.5.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.0.5.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.0.5.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.0.5.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.0.5.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.1.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.1.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.1.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.2.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-5177","reference_id":"CVE-2014-5177","reference_type":"","scores":[{"value":"1.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:H/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-5177"},{"reference_url":"https://security.gentoo.org/glsa/201412-04","reference_id":"GLSA-201412-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0914","reference_id":"RHSA-2014:0914","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0914"},{"reference_url":"https://usn.ubuntu.com/2366-1/","reference_id":"USN-2366-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2366-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928944?format=json","purl":"pkg:deb/debian/libvirt@1.2.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@1.2.4-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2014-5177"],"risk_score":0.6,"exploitability":"0.5","weighted_severity":"1.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jcqj-y7ve-dkf3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57253?format=json","vulnerability_id":"VCID-ju7x-j33y-8khv","summary":"Multiple vulnerabilities have been discovered in libvirt, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25637.json","reference_id":"","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25637.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-25637","reference_id":"","reference_type":"","scores":[{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29407","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29452","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29473","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29521","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29343","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29448","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29355","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31088","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31009","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31431","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31382","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31212","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.3141","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-25637"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25637","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25637"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1881037","reference_id":"1881037","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1881037"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=971555","reference_id":"971555","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=971555"},{"reference_url":"https://security.archlinux.org/ASA-202101-42","reference_id":"ASA-202101-42","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202101-42"},{"reference_url":"https://security.archlinux.org/AVG-1240","reference_id":"AVG-1240","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1240"},{"reference_url":"https://security.gentoo.org/glsa/202210-06","reference_id":"GLSA-202210-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202210-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5040","reference_id":"RHSA-2020:5040","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5040"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5111","reference_id":"RHSA-2020:5111","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5111"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1762","reference_id":"RHSA-2021:1762","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1762"},{"reference_url":"https://usn.ubuntu.com/5399-1/","reference_id":"USN-5399-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5399-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928968?format=json","purl":"pkg:deb/debian/libvirt@6.8.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@6.8.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2020-25637"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ju7x-j33y-8khv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36439?format=json","vulnerability_id":"VCID-k218-u33j-hkbt","summary":"Multiple vulnerabilities have been discovered in libvirt, the worst of which could lead to a denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3750.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3750.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-3750","reference_id":"","reference_type":"","scores":[{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.29823","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30142","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30124","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30078","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30008","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.29893","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30118","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30178","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30214","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30217","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30174","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30127","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.3718","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.37209","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-3750"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041811","reference_id":"1041811","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041811"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2222210","reference_id":"2222210","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-12T17:10:30Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2222210"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_virtualization:8::el8","reference_id":"cpe:/a:redhat:advanced_virtualization:8::el8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_virtualization:8::el8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8","reference_id":"cpe:/o:redhat:enterprise_linux:8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2023-3750","reference_id":"CVE-2023-3750","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-12T17:10:30Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2023-3750"},{"reference_url":"https://security.gentoo.org/glsa/202412-16","reference_id":"GLSA-202412-16","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-16"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6409","reference_id":"RHSA-2023:6409","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-12T17:10:30Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:6409"},{"reference_url":"https://usn.ubuntu.com/6253-1/","reference_id":"USN-6253-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6253-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928932?format=json","purl":"pkg:deb/debian/libvirt@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928973?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928974?format=json","purl":"pkg:deb/debian/libvirt@9.6.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.6.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2023-3750"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k218-u33j-hkbt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85913?format=json","vulnerability_id":"VCID-kwfx-bbqy-1kdv","summary":"libvirt: missing ACL check for the VIR_DOMAIN_XML_SECURE flag in save images and snapshots objects","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0236.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0236.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0236","reference_id":"","reference_type":"","scores":[{"value":"0.0065","scoring_system":"epss","scoring_elements":"0.70906","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0065","scoring_system":"epss","scoring_elements":"0.70753","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0065","scoring_system":"epss","scoring_elements":"0.70769","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0065","scoring_system":"epss","scoring_elements":"0.70787","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0065","scoring_system":"epss","scoring_elements":"0.70763","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0065","scoring_system":"epss","scoring_elements":"0.70807","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0065","scoring_system":"epss","scoring_elements":"0.70823","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0065","scoring_system":"epss","scoring_elements":"0.70846","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0065","scoring_system":"epss","scoring_elements":"0.7083","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0065","scoring_system":"epss","scoring_elements":"0.70815","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0065","scoring_system":"epss","scoring_elements":"0.7086","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0065","scoring_system":"epss","scoring_elements":"0.70866","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0065","scoring_system":"epss","scoring_elements":"0.70845","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0065","scoring_system":"epss","scoring_elements":"0.70898","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0065","scoring_system":"epss","scoring_elements":"0.70908","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0236"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0236","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0236"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:M/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1184431","reference_id":"1184431","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1184431"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776065","reference_id":"776065","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776065"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0323","reference_id":"RHSA-2015:0323","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0323"},{"reference_url":"https://usn.ubuntu.com/2867-1/","reference_id":"USN-2867-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2867-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928949?format=json","purl":"pkg:deb/debian/libvirt@1.2.9-8?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@1.2.9-8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2015-0236"],"risk_score":1.0,"exploitability":"0.5","weighted_severity":"2.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kwfx-bbqy-1kdv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88276?format=json","vulnerability_id":"VCID-mutw-29j1-3ygb","summary":"libvirt: missing checks for read-only connection","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html"},{"reference_url":"http://osvdb.org/50919","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/50919"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5086.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5086.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-5086","reference_id":"","reference_type":"","scores":[{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14517","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14636","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14686","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.1476","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14568","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14658","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14717","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14677","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14638","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14583","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14475","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14479","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14546","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14576","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14574","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-5086"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5086","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5086"},{"reference_url":"http://secunia.com/advisories/33198","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33198"},{"reference_url":"http://secunia.com/advisories/33217","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33217"},{"reference_url":"http://secunia.com/advisories/33292","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33292"},{"reference_url":"http://secunia.com/advisories/34397","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34397"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8765","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8765"},{"reference_url":"https://www.redhat.com/archives/libvir-list/2008-December/msg00522.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/libvir-list/2008-December/msg00522.html"},{"reference_url":"http://www.redhat.com/archives/fedora-package-announce/2008-December/msg00938.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/archives/fedora-package-announce/2008-December/msg00938.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2009-0382.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2009-0382.html"},{"reference_url":"http://www.securityfocus.com/bid/32905","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/32905"},{"reference_url":"http://www.ubuntu.com/usn/usn-694-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-694-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=476560","reference_id":"476560","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=476560"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.4.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.4.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.4.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:0.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:0.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-5086","reference_id":"CVE-2008-5086","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-5086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0382","reference_id":"RHSA-2009:0382","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0382"},{"reference_url":"https://usn.ubuntu.com/694-1/","reference_id":"USN-694-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/694-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928916?format=json","purl":"pkg:deb/debian/libvirt@0.4.6-10?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@0.4.6-10%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2008-5086"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mutw-29j1-3ygb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87089?format=json","vulnerability_id":"VCID-mxuh-upfq-sycs","summary":"libvirt: address bus= device= when identicle vendor ID/product IDs usb devices attached are ignored","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2693.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2693.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-2693","reference_id":"","reference_type":"","scores":[{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18564","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18703","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18758","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18474","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18554","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18607","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.1861","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18563","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.1851","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18451","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18461","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18482","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18384","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18367","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18327","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-2693"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2693","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2693"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=677496","reference_id":"677496","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=677496"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=831164","reference_id":"831164","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=831164"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0748","reference_id":"RHSA-2012:0748","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0748"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:0127","reference_id":"RHSA-2013:0127","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:0127"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928927?format=json","purl":"pkg:deb/debian/libvirt@0.9.12-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@0.9.12-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2012-2693"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mxuh-upfq-sycs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60681?format=json","vulnerability_id":"VCID-nfem-925f-bfdw","summary":"Multiple vulnerabilities have been discovered in libvirt, the worst\n    of which may result in the execution of arbitrary commands.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10167.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10167.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-10167","reference_id":"","reference_type":"","scores":[{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.37993","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38174","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38197","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38067","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38117","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38126","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38144","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38107","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38083","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38129","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.3811","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38046","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.3783","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.37807","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.37712","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-10167"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10161","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10161"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10167","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10167"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1720117","reference_id":"1720117","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1720117"},{"reference_url":"https://security.gentoo.org/glsa/202003-18","reference_id":"GLSA-202003-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-18"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1579","reference_id":"RHSA-2019:1579","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1579"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1580","reference_id":"RHSA-2019:1580","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1580"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1699","reference_id":"RHSA-2019:1699","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1699"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1762","reference_id":"RHSA-2019:1762","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1762"},{"reference_url":"https://usn.ubuntu.com/4047-1/","reference_id":"USN-4047-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4047-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928961?format=json","purl":"pkg:deb/debian/libvirt@5.0.0-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@5.0.0-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2019-10167"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nfem-925f-bfdw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66582?format=json","vulnerability_id":"VCID-nfg5-ubxa-uqad","summary":"libvirt: Information disclosure via world-readable VM snapshots","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13193.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13193.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-13193","reference_id":"","reference_type":"","scores":[{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09515","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09394","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09396","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09545","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09591","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09557","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16539","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16593","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16574","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16534","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16475","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16591","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16653","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16453","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-13193"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120119","reference_id":"1120119","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120119"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2415409","reference_id":"2415409","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-17T18:35:16Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2415409"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10","reference_id":"cpe:/o:redhat:enterprise_linux:10","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8","reference_id":"cpe:/o:redhat:enterprise_linux:8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9","reference_id":"cpe:/o:redhat:enterprise_linux:9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2025-13193","reference_id":"CVE-2025-13193","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-17T18:35:16Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2025-13193"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928932?format=json","purl":"pkg:deb/debian/libvirt@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928980?format=json","purl":"pkg:deb/debian/libvirt@11.10.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.10.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2025-13193"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nfg5-ubxa-uqad"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77417?format=json","vulnerability_id":"VCID-nqd8-35a9-7bc5","summary":"libvirt: off-by-one error in udevListInterfacesByStatus()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-1441.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-1441.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-1441","reference_id":"","reference_type":"","scores":[{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17385","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17523","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17531","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17565","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17475","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17452","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17508","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17597","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17658","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17676","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.1763","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17577","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19217","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19269","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-1441"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1441","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1441"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1066058","reference_id":"1066058","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1066058"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2263841","reference_id":"2263841","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T17:29:32Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2263841"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_virtualization:8::el8","reference_id":"cpe:/a:redhat:advanced_virtualization:8::el8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_virtualization:8::el8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8","reference_id":"cpe:/o:redhat:enterprise_linux:8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2024-1441","reference_id":"CVE-2024-1441","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T17:29:32Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2024-1441"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2560","reference_id":"RHSA-2024:2560","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T17:29:32Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2560"},{"reference_url":"https://usn.ubuntu.com/6734-1/","reference_id":"USN-6734-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6734-1/"},{"reference_url":"https://usn.ubuntu.com/6734-2/","reference_id":"USN-6734-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6734-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928973?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928975?format=json","purl":"pkg:deb/debian/libvirt@10.1.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@10.1.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2024-1441"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nqd8-35a9-7bc5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81427?format=json","vulnerability_id":"VCID-nyuf-8nvx-8uc2","summary":"libvirt: leak of sensitive cookie information via dumpxml","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14301.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14301.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14301","reference_id":"","reference_type":"","scores":[{"value":"0.0049","scoring_system":"epss","scoring_elements":"0.65492","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0049","scoring_system":"epss","scoring_elements":"0.65541","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0049","scoring_system":"epss","scoring_elements":"0.65571","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0049","scoring_system":"epss","scoring_elements":"0.65537","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0049","scoring_system":"epss","scoring_elements":"0.65589","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0049","scoring_system":"epss","scoring_elements":"0.65601","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0049","scoring_system":"epss","scoring_elements":"0.6562","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0049","scoring_system":"epss","scoring_elements":"0.65606","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0049","scoring_system":"epss","scoring_elements":"0.65578","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0049","scoring_system":"epss","scoring_elements":"0.65613","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0049","scoring_system":"epss","scoring_elements":"0.65626","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0049","scoring_system":"epss","scoring_elements":"0.65609","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0049","scoring_system":"epss","scoring_elements":"0.65624","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0049","scoring_system":"epss","scoring_elements":"0.65636","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0049","scoring_system":"epss","scoring_elements":"0.65635","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14301"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1848640","reference_id":"1848640","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1848640"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4676","reference_id":"RHSA-2020:4676","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4676"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928932?format=json","purl":"pkg:deb/debian/libvirt@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2020-14301"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nyuf-8nvx-8uc2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86117?format=json","vulnerability_id":"VCID-p5zb-sdha-b7bu","summary":"libvirt: domain_conf: domain deadlock DoS","references":[{"reference_url":"http://libvirt.org/git/?p=libvirt.git%3Ba=commitdiff%3Bh=fc22b2e74890873848b43fffae43025d22053669","reference_id":"","reference_type":"","scores":[],"url":"http://libvirt.org/git/?p=libvirt.git%3Ba=commitdiff%3Bh=fc22b2e74890873848b43fffae43025d22053669"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-10/msg00014.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-10/msg00014.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-10/msg00017.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-10/msg00017.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1352.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1352.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3657.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3657.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-3657","reference_id":"","reference_type":"","scores":[{"value":"0.01284","scoring_system":"epss","scoring_elements":"0.79691","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01284","scoring_system":"epss","scoring_elements":"0.79556","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01284","scoring_system":"epss","scoring_elements":"0.79562","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01284","scoring_system":"epss","scoring_elements":"0.79585","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01284","scoring_system":"epss","scoring_elements":"0.79572","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01284","scoring_system":"epss","scoring_elements":"0.796","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01284","scoring_system":"epss","scoring_elements":"0.79607","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01284","scoring_system":"epss","scoring_elements":"0.79628","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01284","scoring_system":"epss","scoring_elements":"0.79612","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01284","scoring_system":"epss","scoring_elements":"0.79605","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01284","scoring_system":"epss","scoring_elements":"0.79635","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01284","scoring_system":"epss","scoring_elements":"0.79634","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01284","scoring_system":"epss","scoring_elements":"0.79637","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01284","scoring_system":"epss","scoring_elements":"0.79668","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01284","scoring_system":"epss","scoring_elements":"0.79675","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-3657"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3657","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3657"},{"reference_url":"http://secunia.com/advisories/60291","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60291"},{"reference_url":"http://secunia.com/advisories/62303","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62303"},{"reference_url":"http://security.libvirt.org/2014/0005.html","reference_id":"","reference_type":"","scores":[],"url":"http://security.libvirt.org/2014/0005.html"},{"reference_url":"http://www.ubuntu.com/usn/USN-2404-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2404-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1145667","reference_id":"1145667","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1145667"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:1.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:1.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:1.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:1.2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:1.2.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:1.2.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:1.2.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:1.2.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-3657","reference_id":"CVE-2014-3657","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-3657"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1352","reference_id":"RHSA-2014:1352","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1873","reference_id":"RHSA-2014:1873","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1873"},{"reference_url":"https://usn.ubuntu.com/2404-1/","reference_id":"USN-2404-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2404-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928946?format=json","purl":"pkg:deb/debian/libvirt@1.2.9-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@1.2.9-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2014-3657"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p5zb-sdha-b7bu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82599?format=json","vulnerability_id":"VCID-pqce-1qud-kbef","summary":"libvirt: libvirt-domain.c supports virDomainGetTime API calls with an RO connection instead of RW connection","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10746.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10746.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10746","reference_id":"","reference_type":"","scores":[{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67051","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67185","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.6717","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67151","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67173","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67089","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67112","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67087","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67136","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67148","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67167","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67153","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67123","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00527","scoring_system":"epss","scoring_elements":"0.67156","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10746"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10746","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10746"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/libvirt/libvirt/commit/506e9d6c2d4baaf580d489fff0690c0ff2ff588f","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/libvirt/libvirt/commit/506e9d6c2d4baaf580d489fff0690c0ff2ff588f"},{"reference_url":"https://github.com/libvirt/libvirt/compare/11288f5...8fd6867","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/libvirt/libvirt/compare/11288f5...8fd6867"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/04/msg00032.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/04/msg00032.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1705507","reference_id":"1705507","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1705507"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-10746","reference_id":"CVE-2016-10746","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:P/A:N"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-10746"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928953?format=json","purl":"pkg:deb/debian/libvirt@1.3.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@1.3.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2016-10746"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pqce-1qud-kbef"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87034?format=json","vulnerability_id":"VCID-pr8b-xk2q-hfdg","summary":"libvirt: null function pointer invocation in virNetServerProgramDispatchCall()","references":[{"reference_url":"http://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=b7ff9e696063189a715802d081d55a398663c15a","reference_id":"","reference_type":"","scores":[],"url":"http://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=b7ff9e696063189a715802d081d55a398663c15a"},{"reference_url":"http://libvirt.org/git/?p=libvirt.git%3Ba=commitdiff%3Bh=f8fbeb50d52520a109d71c8566fed2ea600650ec","reference_id":"","reference_type":"","scores":[],"url":"http://libvirt.org/git/?p=libvirt.git%3Ba=commitdiff%3Bh=f8fbeb50d52520a109d71c8566fed2ea600650ec"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2012-October/089976.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2012-October/089976.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090121.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090121.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00001.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2012-1359.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2012-1359.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4423.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4423.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-4423","reference_id":"","reference_type":"","scores":[{"value":"0.0287","scoring_system":"epss","scoring_elements":"0.86312","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0287","scoring_system":"epss","scoring_elements":"0.86206","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0287","scoring_system":"epss","scoring_elements":"0.86216","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0287","scoring_system":"epss","scoring_elements":"0.86232","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0287","scoring_system":"epss","scoring_elements":"0.86251","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0287","scoring_system":"epss","scoring_elements":"0.86262","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0287","scoring_system":"epss","scoring_elements":"0.86276","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0287","scoring_system":"epss","scoring_elements":"0.86274","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0287","scoring_system":"epss","scoring_elements":"0.8627","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0287","scoring_system":"epss","scoring_elements":"0.86286","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0287","scoring_system":"epss","scoring_elements":"0.86291","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0287","scoring_system":"epss","scoring_elements":"0.86284","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0287","scoring_system":"epss","scoring_elements":"0.86303","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-4423"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4423","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4423"},{"reference_url":"https://www.redhat.com/archives/libvir-list/2012-September/msg00843.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/libvir-list/2012-September/msg00843.html"},{"reference_url":"http://www.openwall.com/lists/oss-security/2012/09/13/14","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2012/09/13/14"},{"reference_url":"http://www.securityfocus.com/bid/55541","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/55541"},{"reference_url":"http://www.securitytracker.com/id?1027649","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1027649"},{"reference_url":"http://www.ubuntu.com/usn/USN-1708-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1708-1"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=687598","reference_id":"687598","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=687598"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=857133","reference_id":"857133","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=857133"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.1.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.1.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.1.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.1.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.1.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.1.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.1.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.1.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.1.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.1.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.1.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.1.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.1.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.1.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.1.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.4.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.4.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.4.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.4.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.4.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.4.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.4.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.4.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.4.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.6.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.6.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.6.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.6.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.6.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.6.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.6.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.8.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.8.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.8.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.8.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.8.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2012-4423","reference_id":"CVE-2012-4423","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-4423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1359","reference_id":"RHSA-2012:1359","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1359"},{"reference_url":"https://usn.ubuntu.com/1708-1/","reference_id":"USN-1708-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1708-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928929?format=json","purl":"pkg:deb/debian/libvirt@0.9.12-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@0.9.12-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2012-4423"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pr8b-xk2q-hfdg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34489?format=json","vulnerability_id":"VCID-pw95-vhme-ufdr","summary":"Multiple vulnerabilities have been found in libvirt, worst of which\n    allows context-dependent attackers to cause Denial of Service.","references":[{"reference_url":"http://advisories.mageia.org/MGASA-2015-0002.html","reference_id":"","reference_type":"","scores":[],"url":"http://advisories.mageia.org/MGASA-2015-0002.html"},{"reference_url":"http://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=2bdcd29c713dfedd813c89f56ae98f6f3898313d","reference_id":"","reference_type":"","scores":[],"url":"http://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=2bdcd29c713dfedd813c89f56ae98f6f3898313d"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2015-01/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2015-01/msg00003.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2015-01/msg00005.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2015-01/msg00005.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-0323.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-0323.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8136.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8136.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8136","reference_id":"","reference_type":"","scores":[{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22413","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22561","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22734","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22778","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22568","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22644","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22695","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22713","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22674","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22616","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22632","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22628","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.2258","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22425","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22415","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8136"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8136","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8136"},{"reference_url":"http://secunia.com/advisories/61111","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61111"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:023","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:023"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:070","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:070"},{"reference_url":"http://www.ubuntu.com/usn/USN-2867-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2867-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1176176","reference_id":"1176176","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1176176"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773856","reference_id":"773856","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773856"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia:mageia:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:mageia:mageia:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia:mageia:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8136","reference_id":"CVE-2014-8136","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8136"},{"reference_url":"https://security.gentoo.org/glsa/201412-36","reference_id":"GLSA-201412-36","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-36"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0323","reference_id":"RHSA-2015:0323","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0323"},{"reference_url":"https://usn.ubuntu.com/2867-1/","reference_id":"USN-2867-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2867-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928948?format=json","purl":"pkg:deb/debian/libvirt@1.2.9-7?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@1.2.9-7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2014-8136"],"risk_score":0.9,"exploitability":"0.5","weighted_severity":"1.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pw95-vhme-ufdr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56063?format=json","vulnerability_id":"VCID-pyrh-w789-8fbb","summary":"Multiple vulnerabilities have been found in libvirt, worst of which\n    allows context-dependent attackers to escalate privileges.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5651.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5651.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5651","reference_id":"","reference_type":"","scores":[{"value":"0.00639","scoring_system":"epss","scoring_elements":"0.70462","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00639","scoring_system":"epss","scoring_elements":"0.70475","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00639","scoring_system":"epss","scoring_elements":"0.70493","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00639","scoring_system":"epss","scoring_elements":"0.7047","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00639","scoring_system":"epss","scoring_elements":"0.70517","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00639","scoring_system":"epss","scoring_elements":"0.70532","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00639","scoring_system":"epss","scoring_elements":"0.70555","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00639","scoring_system":"epss","scoring_elements":"0.7054","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00639","scoring_system":"epss","scoring_elements":"0.70526","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00639","scoring_system":"epss","scoring_elements":"0.7057","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00639","scoring_system":"epss","scoring_elements":"0.70579","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00639","scoring_system":"epss","scoring_elements":"0.70557","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00639","scoring_system":"epss","scoring_elements":"0.70607","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00639","scoring_system":"epss","scoring_elements":"0.70616","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00639","scoring_system":"epss","scoring_elements":"0.70615","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5651"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5651","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5651"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1006493","reference_id":"1006493","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1006493"},{"reference_url":"https://security.gentoo.org/glsa/201412-04","reference_id":"GLSA-201412-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-04"},{"reference_url":"https://usn.ubuntu.com/1954-1/","reference_id":"USN-1954-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1954-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928936?format=json","purl":"pkg:deb/debian/libvirt@1.1.2~rc1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@1.1.2~rc1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2013-5651"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pyrh-w789-8fbb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56059?format=json","vulnerability_id":"VCID-q2ed-rmxa-m3hq","summary":"Multiple vulnerabilities have been found in libvirt, worst of which\n    allows context-dependent attackers to escalate privileges.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4297.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4297.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4297","reference_id":"","reference_type":"","scores":[{"value":"0.0058","scoring_system":"epss","scoring_elements":"0.68821","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0058","scoring_system":"epss","scoring_elements":"0.68839","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0058","scoring_system":"epss","scoring_elements":"0.6886","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0058","scoring_system":"epss","scoring_elements":"0.6884","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0058","scoring_system":"epss","scoring_elements":"0.6889","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0058","scoring_system":"epss","scoring_elements":"0.68908","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0058","scoring_system":"epss","scoring_elements":"0.68931","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0058","scoring_system":"epss","scoring_elements":"0.68917","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0058","scoring_system":"epss","scoring_elements":"0.68888","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0058","scoring_system":"epss","scoring_elements":"0.68929","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0058","scoring_system":"epss","scoring_elements":"0.68939","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0058","scoring_system":"epss","scoring_elements":"0.68918","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0058","scoring_system":"epss","scoring_elements":"0.68968","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0058","scoring_system":"epss","scoring_elements":"0.68974","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0058","scoring_system":"epss","scoring_elements":"0.6898","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4297"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4297","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4297"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1006505","reference_id":"1006505","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1006505"},{"reference_url":"https://security.gentoo.org/glsa/201412-04","reference_id":"GLSA-201412-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-04"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928937?format=json","purl":"pkg:deb/debian/libvirt@1.1.2-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@1.1.2-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2013-4297"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-q2ed-rmxa-m3hq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79912?format=json","vulnerability_id":"VCID-r65y-py21-u3eu","summary":"libvirt: segmentation fault during VM shutdown can lead to vdsm hang","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3975.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3975.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3975","reference_id":"","reference_type":"","scores":[{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66795","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66834","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.6686","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66832","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66881","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66894","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66914","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.669","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66868","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66901","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66915","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66898","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66922","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66936","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66933","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3975"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3975","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3975"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2024326","reference_id":"2024326","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2024326"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1759","reference_id":"RHSA-2022:1759","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1759"},{"reference_url":"https://usn.ubuntu.com/5399-1/","reference_id":"USN-5399-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5399-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928969?format=json","purl":"pkg:deb/debian/libvirt@7.6.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.6.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2021-3975"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r65y-py21-u3eu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56061?format=json","vulnerability_id":"VCID-r6kr-1kw6-abet","summary":"Multiple vulnerabilities have been found in libvirt, worst of which\n    allows context-dependent attackers to escalate privileges.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4400.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4400.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4400","reference_id":"","reference_type":"","scores":[{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.1642","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16602","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16664","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16463","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16549","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16604","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16585","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16545","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16486","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16427","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16447","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16484","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16379","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16377","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16332","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4400"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4400","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4400"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1015228","reference_id":"1015228","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1015228"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=727101","reference_id":"727101","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=727101"},{"reference_url":"https://security.gentoo.org/glsa/201412-04","reference_id":"GLSA-201412-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-04"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928939?format=json","purl":"pkg:deb/debian/libvirt@1.1.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@1.1.4-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2013-4400"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r6kr-1kw6-abet"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34654?format=json","vulnerability_id":"VCID-re7g-2nvj-j3dp","summary":"Multiple vulnerabilities have been discovered in libvirt, the worst\n    of which may result in the execution of arbitrary commands.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5748.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5748.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-5748","reference_id":"","reference_type":"","scores":[{"value":"0.01494","scoring_system":"epss","scoring_elements":"0.81013","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01494","scoring_system":"epss","scoring_elements":"0.81022","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01494","scoring_system":"epss","scoring_elements":"0.81045","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01494","scoring_system":"epss","scoring_elements":"0.81073","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01494","scoring_system":"epss","scoring_elements":"0.81079","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01494","scoring_system":"epss","scoring_elements":"0.81097","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01494","scoring_system":"epss","scoring_elements":"0.81083","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01494","scoring_system":"epss","scoring_elements":"0.81076","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01494","scoring_system":"epss","scoring_elements":"0.81113","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01494","scoring_system":"epss","scoring_elements":"0.81115","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01494","scoring_system":"epss","scoring_elements":"0.81112","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01494","scoring_system":"epss","scoring_elements":"0.81135","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01494","scoring_system":"epss","scoring_elements":"0.81143","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01494","scoring_system":"epss","scoring_elements":"0.8115","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-5748"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5748","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5748"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1528396","reference_id":"1528396","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1528396"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=887700","reference_id":"887700","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=887700"},{"reference_url":"https://security.gentoo.org/glsa/201804-07","reference_id":"GLSA-201804-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201804-07"},{"reference_url":"https://security.gentoo.org/glsa/201804-08","reference_id":"GLSA-201804-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201804-08"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1396","reference_id":"RHSA-2018:1396","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1396"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1929","reference_id":"RHSA-2018:1929","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1929"},{"reference_url":"https://usn.ubuntu.com/3576-1/","reference_id":"USN-3576-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3576-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928958?format=json","purl":"pkg:deb/debian/libvirt@4.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@4.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2018-5748"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-re7g-2nvj-j3dp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36438?format=json","vulnerability_id":"VCID-rrbw-31ka-5fca","summary":"Multiple vulnerabilities have been discovered in libvirt, the worst of which could lead to a denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2700.json","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2700.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-2700","reference_id":"","reference_type":"","scores":[{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09983","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10028","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10061","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.1012","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.1016","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10098","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09973","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09949","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10082","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10059","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10038","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10087","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09984","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-2700"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036297","reference_id":"1036297","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036297"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2203653","reference_id":"2203653","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-23T18:55:49Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2203653"},{"reference_url":"https://gitlab.com/libvirt/libvirt/-/commit/6425a311b8ad19d6f9c0b315bf1d722551ea3585#874a1e768ade6ceb4538931cbc06248e73223306","reference_id":"6425a311b8ad19d6f9c0b315bf1d722551ea3585#874a1e768ade6ceb4538931cbc06248e73223306","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-23T18:55:49Z/"}],"url":"https://gitlab.com/libvirt/libvirt/-/commit/6425a311b8ad19d6f9c0b315bf1d722551ea3585#874a1e768ade6ceb4538931cbc06248e73223306"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2023-2700","reference_id":"CVE-2023-2700","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-23T18:55:49Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2023-2700"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EVK6JKP36CHE7YAFDJNPNLTW4OWJJ7TQ/","reference_id":"EVK6JKP36CHE7YAFDJNPNLTW4OWJJ7TQ","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-23T18:55:49Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EVK6JKP36CHE7YAFDJNPNLTW4OWJJ7TQ/"},{"reference_url":"https://security.gentoo.org/glsa/202412-16","reference_id":"GLSA-202412-16","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-16"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230706-0001/","reference_id":"ntap-20230706-0001","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-23T18:55:49Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230706-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3715","reference_id":"RHSA-2023:3715","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3715"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3822","reference_id":"RHSA-2023:3822","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3822"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4799","reference_id":"RHSA-2023:4799","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4799"},{"reference_url":"https://usn.ubuntu.com/6126-1/","reference_id":"USN-6126-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6126-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928932?format=json","purl":"pkg:deb/debian/libvirt@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928972?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2023-2700"],"risk_score":2.9,"exploitability":"0.5","weighted_severity":"5.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rrbw-31ka-5fca"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85531?format=json","vulnerability_id":"VCID-smdn-m8vh-9bb8","summary":"libvirt: denial of service when volume creation fails on NFS pool","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5247.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5247.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5247","reference_id":"","reference_type":"","scores":[{"value":"0.00485","scoring_system":"epss","scoring_elements":"0.65393","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00485","scoring_system":"epss","scoring_elements":"0.65398","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00485","scoring_system":"epss","scoring_elements":"0.65255","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00485","scoring_system":"epss","scoring_elements":"0.65305","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00485","scoring_system":"epss","scoring_elements":"0.6533","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00485","scoring_system":"epss","scoring_elements":"0.65295","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00485","scoring_system":"epss","scoring_elements":"0.65347","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00485","scoring_system":"epss","scoring_elements":"0.65358","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00485","scoring_system":"epss","scoring_elements":"0.65377","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00485","scoring_system":"epss","scoring_elements":"0.65365","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00485","scoring_system":"epss","scoring_elements":"0.65337","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00485","scoring_system":"epss","scoring_elements":"0.65372","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00485","scoring_system":"epss","scoring_elements":"0.65384","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00485","scoring_system":"epss","scoring_elements":"0.65368","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00485","scoring_system":"epss","scoring_elements":"0.65386","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5247"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5247","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5247"},{"reference_url":"http://security.libvirt.org/2015/0003.html","reference_id":"","reference_type":"","scores":[],"url":"http://security.libvirt.org/2015/0003.html"},{"reference_url":"http://www.ubuntu.com/usn/USN-2867-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2867-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1259350","reference_id":"1259350","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1259350"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=799132","reference_id":"799132","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=799132"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.2.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.2.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.2.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.17:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.2.17:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.17:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.18:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.2.18:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.18:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.19:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.2.19:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.19:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-5247","reference_id":"CVE-2015-5247","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:N/I:N/A:P"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-5247"},{"reference_url":"https://usn.ubuntu.com/2867-1/","reference_id":"USN-2867-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2867-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928951?format=json","purl":"pkg:deb/debian/libvirt@1.2.20-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@1.2.20-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2015-5247"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-smdn-m8vh-9bb8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56060?format=json","vulnerability_id":"VCID-ttae-7135-n7ff","summary":"Multiple vulnerabilities have been found in libvirt, worst of which\n    allows context-dependent attackers to escalate privileges.","references":[{"reference_url":"http://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=8294aa0c1750dcb49d6345cd9bd97bf421580d8b","reference_id":"","reference_type":"","scores":[],"url":"http://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=8294aa0c1750dcb49d6345cd9bd97bf421580d8b"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4399.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4399.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4399","reference_id":"","reference_type":"","scores":[{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71463","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71501","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71547","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71552","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.7153","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.7147","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71487","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.7146","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.715","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71512","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71535","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71519","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00707","scoring_system":"epss","scoring_elements":"0.72242","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00707","scoring_system":"epss","scoring_elements":"0.72236","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00707","scoring_system":"epss","scoring_elements":"0.72233","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4399"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4399","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4399"},{"reference_url":"http://secunia.com/advisories/60895","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60895"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201412-04.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201412-04.xml"},{"reference_url":"http://security.libvirt.org/2013/0013.html","reference_id":"","reference_type":"","scores":[],"url":"http://security.libvirt.org/2013/0013.html"},{"reference_url":"http://www.securityfocus.com/bid/62972","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/62972"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1015214","reference_id":"1015214","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1015214"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.10.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.10.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.10.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.10.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.10.2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.2.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.10.2.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.2.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.2.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.10.2.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.2.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.2.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.10.2.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.2.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.2.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.10.2.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.2.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.2.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.10.2.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.10.2.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.1.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.1.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.1.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.1.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.1.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.1.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.1.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.1.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.1.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.1.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.1.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.1.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.1.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.1.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.1.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.4.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.4.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.4.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.4.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.4.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.4.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.4.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.4.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.4.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.6.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.6.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.6.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.6.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.6.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.6.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.6.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.8.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.8.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.8.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.8.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.8.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.8.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.11.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.11.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.11.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.11.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.11.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.11.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.11.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.11.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.6.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.6.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.6.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:0.9.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:0.9.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.0.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.0.5.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.0.5.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.0.5.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.0.5.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.0.5.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.5.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-4399","reference_id":"CVE-2013-4399","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-4399"},{"reference_url":"https://security.gentoo.org/glsa/201412-04","reference_id":"GLSA-201412-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-04"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928939?format=json","purl":"pkg:deb/debian/libvirt@1.1.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@1.1.4-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2013-4399"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ttae-7135-n7ff"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86620?format=json","vulnerability_id":"VCID-ty73-ba9j-cyea","summary":"libvirt: crash of libvirtd without guest agent configuration","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4154.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4154.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4154","reference_id":"","reference_type":"","scores":[{"value":"0.00731","scoring_system":"epss","scoring_elements":"0.72623","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00731","scoring_system":"epss","scoring_elements":"0.72631","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00731","scoring_system":"epss","scoring_elements":"0.72649","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00731","scoring_system":"epss","scoring_elements":"0.72626","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00731","scoring_system":"epss","scoring_elements":"0.72665","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00731","scoring_system":"epss","scoring_elements":"0.72678","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00731","scoring_system":"epss","scoring_elements":"0.72702","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00731","scoring_system":"epss","scoring_elements":"0.72685","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00731","scoring_system":"epss","scoring_elements":"0.72674","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00731","scoring_system":"epss","scoring_elements":"0.72717","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00731","scoring_system":"epss","scoring_elements":"0.72728","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00731","scoring_system":"epss","scoring_elements":"0.7272","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00731","scoring_system":"epss","scoring_elements":"0.72761","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00731","scoring_system":"epss","scoring_elements":"0.7277","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00731","scoring_system":"epss","scoring_elements":"0.72766","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4154"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4154","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4154"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717355","reference_id":"717355","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717355"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=986386","reference_id":"986386","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=986386"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928935?format=json","purl":"pkg:deb/debian/libvirt@1.1.0-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@1.1.0-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2013-4154"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ty73-ba9j-cyea"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66609?format=json","vulnerability_id":"VCID-ubdh-hdtv-akgt","summary":"libvirt: Denial of service in XML parsing","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-12748.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-12748.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-12748","reference_id":"","reference_type":"","scores":[{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26323","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26608","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26563","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26506","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26511","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26484","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26446","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26385","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26379","published_at":"2026-04-26T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27708","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30308","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30357","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30174","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30234","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-12748"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12748","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12748"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120584","reference_id":"1120584","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120584"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2413801","reference_id":"2413801","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-12T14:40:15Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2413801"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10","reference_id":"cpe:/o:redhat:enterprise_linux:10","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8","reference_id":"cpe:/o:redhat:enterprise_linux:8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9","reference_id":"cpe:/o:redhat:enterprise_linux:9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2025-12748","reference_id":"CVE-2025-12748","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-12T14:40:15Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2025-12748"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928980?format=json","purl":"pkg:deb/debian/libvirt@11.10.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.10.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2025-12748"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ubdh-hdtv-akgt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56025?format=json","vulnerability_id":"VCID-unyh-d92r-8udp","summary":"security update","references":[{"reference_url":"http://libvirt.org/git/?p=libvirt.git%3Ba=commitdiff%3Bh=3e745e8f775dfe6f64f18b5c2fe4791b35d3546b","reference_id":"","reference_type":"","scores":[],"url":"http://libvirt.org/git/?p=libvirt.git%3Ba=commitdiff%3Bh=3e745e8f775dfe6f64f18b5c2fe4791b35d3546b"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-10/msg00014.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-10/msg00014.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-10/msg00017.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-10/msg00017.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1352.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1352.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3633.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3633.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-3633","reference_id":"","reference_type":"","scores":[{"value":"0.0292","scoring_system":"epss","scoring_elements":"0.86432","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0292","scoring_system":"epss","scoring_elements":"0.86327","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0292","scoring_system":"epss","scoring_elements":"0.86337","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0292","scoring_system":"epss","scoring_elements":"0.86356","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0292","scoring_system":"epss","scoring_elements":"0.86357","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0292","scoring_system":"epss","scoring_elements":"0.86375","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0292","scoring_system":"epss","scoring_elements":"0.86385","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0292","scoring_system":"epss","scoring_elements":"0.86398","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0292","scoring_system":"epss","scoring_elements":"0.86397","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0292","scoring_system":"epss","scoring_elements":"0.86391","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0292","scoring_system":"epss","scoring_elements":"0.86408","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0292","scoring_system":"epss","scoring_elements":"0.86413","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0292","scoring_system":"epss","scoring_elements":"0.86406","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0292","scoring_system":"epss","scoring_elements":"0.86426","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0292","scoring_system":"epss","scoring_elements":"0.86435","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-3633"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0179","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0179"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3633","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3633"},{"reference_url":"http://secunia.com/advisories/60291","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60291"},{"reference_url":"http://secunia.com/advisories/60895","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60895"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201412-04.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201412-04.xml"},{"reference_url":"http://security.libvirt.org/2014/0004.html","reference_id":"","reference_type":"","scores":[],"url":"http://security.libvirt.org/2014/0004.html"},{"reference_url":"http://www.debian.org/security/2014/dsa-3038","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3038"},{"reference_url":"http://www.ubuntu.com/usn/USN-2366-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2366-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1141131","reference_id":"1141131","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1141131"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=762203","reference_id":"762203","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=762203"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:1.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:1.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:1.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:1.2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:1.2.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:1.2.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:1.2.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libvirt:libvirt:1.2.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvirt:libvirt:1.2.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:lts:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:lts:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:lts:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:lts:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:lts:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:lts:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-3633","reference_id":"CVE-2014-3633","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-3633"},{"reference_url":"https://security.gentoo.org/glsa/201412-04","reference_id":"GLSA-201412-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1352","reference_id":"RHSA-2014:1352","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1873","reference_id":"RHSA-2014:1873","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1873"},{"reference_url":"https://usn.ubuntu.com/2366-1/","reference_id":"USN-2366-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2366-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928945?format=json","purl":"pkg:deb/debian/libvirt@1.2.8-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@1.2.8-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2014-3633"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-unyh-d92r-8udp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56070?format=json","vulnerability_id":"VCID-ure4-cjpz-r3b5","summary":"Multiple vulnerabilities have been found in libvirt, worst of which\n    allows context-dependent attackers to escalate privileges.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00083.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00083.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-7823.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-7823.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-7823","reference_id":"","reference_type":"","scores":[{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67305","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67174","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67211","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67235","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67262","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67276","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67296","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67282","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67247","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67281","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67294","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67273","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67293","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67303","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-7823"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7823","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7823"},{"reference_url":"http://secunia.com/advisories/60010","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60010"},{"reference_url":"http://secunia.com/advisories/60895","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60895"},{"reference_url":"http://secunia.com/advisories/62058","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62058"},{"reference_url":"http://secunia.com/advisories/62303","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62303"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201412-04.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201412-04.xml"},{"reference_url":"http://security.libvirt.org/2014/0007.html","reference_id":"","reference_type":"","scores":[],"url":"http://security.libvirt.org/2014/0007.html"},{"reference_url":"http://www.ubuntu.com/usn/USN-2404-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2404-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1160817","reference_id":"1160817","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1160817"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=769149","reference_id":"769149","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=769149"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.2.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.2.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.2.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.2.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.2.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:1.2.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:1.2.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-7823","reference_id":"CVE-2014-7823","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-7823"},{"reference_url":"https://security.gentoo.org/glsa/201412-04","reference_id":"GLSA-201412-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1873","reference_id":"RHSA-2014:1873","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1873"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0008","reference_id":"RHSA-2015:0008","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0008"},{"reference_url":"https://usn.ubuntu.com/2404-1/","reference_id":"USN-2404-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2404-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928947?format=json","purl":"pkg:deb/debian/libvirt@1.2.9-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@1.2.9-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2014-7823"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ure4-cjpz-r3b5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34487?format=json","vulnerability_id":"VCID-vmnc-v6zq-dkhv","summary":"Multiple vulnerabilities have been found in libvirt, worst of which\n    allows context-dependent attackers to cause Denial of Service.","references":[{"reference_url":"http://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=87b9437f8951f9d24f9a85c6bbfff0e54df8c984","reference_id":"","reference_type":"","scores":[],"url":"http://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=87b9437f8951f9d24f9a85c6bbfff0e54df8c984"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2015-01/msg00005.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2015-01/msg00005.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8135.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8135.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8135","reference_id":"","reference_type":"","scores":[{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20572","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20769","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20921","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.2098","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20694","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20771","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20832","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20848","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20805","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20753","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20744","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20736","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20723","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20606","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20603","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8135"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1087104","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1087104"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8135","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8135"},{"reference_url":"http://secunia.com/advisories/61111","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61111"},{"reference_url":"http://security.libvirt.org/2014/0009.html","reference_id":"","reference_type":"","scores":[],"url":"http://security.libvirt.org/2014/0009.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1176182","reference_id":"1176182","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1176182"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773855","reference_id":"773855","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773855"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8135","reference_id":"CVE-2014-8135","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8135"},{"reference_url":"https://security.gentoo.org/glsa/201412-36","reference_id":"GLSA-201412-36","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-36"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928948?format=json","purl":"pkg:deb/debian/libvirt@1.2.9-7?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@1.2.9-7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2014-8135"],"risk_score":0.9,"exploitability":"0.5","weighted_severity":"1.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vmnc-v6zq-dkhv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87031?format=json","vulnerability_id":"VCID-vwry-7s56-v7e8","summary":"libvirt: crash in virTypedParameterArrayClear","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3445.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3445.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3445","reference_id":"","reference_type":"","scores":[{"value":"0.01323","scoring_system":"epss","scoring_elements":"0.79841","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01323","scoring_system":"epss","scoring_elements":"0.79849","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01323","scoring_system":"epss","scoring_elements":"0.7987","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01323","scoring_system":"epss","scoring_elements":"0.79858","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01323","scoring_system":"epss","scoring_elements":"0.79886","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01323","scoring_system":"epss","scoring_elements":"0.79893","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01323","scoring_system":"epss","scoring_elements":"0.79914","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01323","scoring_system":"epss","scoring_elements":"0.79897","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01323","scoring_system":"epss","scoring_elements":"0.79889","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01323","scoring_system":"epss","scoring_elements":"0.79918","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01323","scoring_system":"epss","scoring_elements":"0.79919","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01323","scoring_system":"epss","scoring_elements":"0.79922","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01323","scoring_system":"epss","scoring_elements":"0.79951","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01323","scoring_system":"epss","scoring_elements":"0.79957","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01323","scoring_system":"epss","scoring_elements":"0.79974","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3445"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3445","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3445"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683483","reference_id":"683483","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683483"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=844734","reference_id":"844734","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=844734"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1202","reference_id":"RHSA-2012:1202","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1202"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928928?format=json","purl":"pkg:deb/debian/libvirt@0.9.12-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@0.9.12-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2012-3445"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vwry-7s56-v7e8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35573?format=json","vulnerability_id":"VCID-wf9y-4uwu-gkaz","summary":"A vulnerability in libvirt may allow root privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14339.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14339.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14339","reference_id":"","reference_type":"","scores":[{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22741","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22598","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22611","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22603","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22914","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22957","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.2275","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22826","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22879","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22899","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22861","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22805","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22819","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22813","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22773","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14339"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14339","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14339"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1860069","reference_id":"1860069","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1860069"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=966563","reference_id":"966563","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=966563"},{"reference_url":"https://security.archlinux.org/ASA-202009-8","reference_id":"ASA-202009-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202009-8"},{"reference_url":"https://security.archlinux.org/AVG-1232","reference_id":"AVG-1232","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1232"},{"reference_url":"https://security.gentoo.org/glsa/202101-22","reference_id":"GLSA-202101-22","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202101-22"},{"reference_url":"https://security.gentoo.org/glsa/202210-06","reference_id":"GLSA-202210-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202210-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3586","reference_id":"RHSA-2020:3586","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3586"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4676","reference_id":"RHSA-2020:4676","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4676"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928967?format=json","purl":"pkg:deb/debian/libvirt@6.6.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@6.6.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2020-14339"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wf9y-4uwu-gkaz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63538?format=json","vulnerability_id":"VCID-whhu-jy51-qkec","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000256.json","reference_id":"","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000256.json"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2017-1000256","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/security/cve/CVE-2017-1000256"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-1000256","reference_id":"","reference_type":"","scores":[{"value":"0.00778","scoring_system":"epss","scoring_elements":"0.73592","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.758","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75755","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75758","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75744","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75782","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00904","scoring_system":"epss","scoring_elements":"0.75788","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01015","scoring_system":"epss","scoring_elements":"0.7715","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01015","scoring_system":"epss","scoring_elements":"0.77178","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01015","scoring_system":"epss","scoring_elements":"0.77156","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01015","scoring_system":"epss","scoring_elements":"0.77152","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01015","scoring_system":"epss","scoring_elements":"0.77108","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01015","scoring_system":"epss","scoring_elements":"0.77141","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01015","scoring_system":"epss","scoring_elements":"0.77097","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01015","scoring_system":"epss","scoring_elements":"0.77126","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-1000256"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000256","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000256"},{"reference_url":"https://www.mail-archive.com/debian-bugs-dist%40lists.debian.org/msg1556251.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.mail-archive.com/debian-bugs-dist%40lists.debian.org/msg1556251.html"},{"reference_url":"https://www.redhat.com/archives/libvirt-announce/2017-October/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/libvirt-announce/2017-October/msg00001.html"},{"reference_url":"http://www.debian.org/security/2017/dsa-4003","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2017/dsa-4003"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1503658","reference_id":"1503658","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1503658"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878799","reference_id":"878799","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878799"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-1000256","reference_id":"CVE-2017-1000256","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-1000256"},{"reference_url":"https://usn.ubuntu.com/3576-1/","reference_id":"USN-3576-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3576-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928955?format=json","purl":"pkg:deb/debian/libvirt@3.8.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@3.8.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2017-1000256"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-whhu-jy51-qkec"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77667?format=json","vulnerability_id":"VCID-wkrz-dcvc-5ugc","summary":"libvirt: NULL pointer dereference in udevConnectListAllInterfaces()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2496.json","reference_id":"","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2496.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-2496","reference_id":"","reference_type":"","scores":[{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10794","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10805","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10818","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10938","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10893","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10852","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10865","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.1094","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10994","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10996","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10963","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18628","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18683","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-2496"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2496","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2496"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2269672","reference_id":"2269672","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T19:25:01Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2269672"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_virtualization:8::el8","reference_id":"cpe:/a:redhat:advanced_virtualization:8::el8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:advanced_virtualization:8::el8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8","reference_id":"cpe:/o:redhat:enterprise_linux:8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2024-2496","reference_id":"CVE-2024-2496","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T19:25:01Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2024-2496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2236","reference_id":"RHSA-2024:2236","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T19:25:01Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:2236"},{"reference_url":"https://usn.ubuntu.com/6734-1/","reference_id":"USN-6734-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6734-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928973?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928977?format=json","purl":"pkg:deb/debian/libvirt@9.8.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.8.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2024-2496"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wkrz-dcvc-5ugc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/55578?format=json","vulnerability_id":"VCID-x76t-fcgm-3yf3","summary":"programming error","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4296.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4296.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4296","reference_id":"","reference_type":"","scores":[{"value":"0.03294","scoring_system":"epss","scoring_elements":"0.87156","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03294","scoring_system":"epss","scoring_elements":"0.87167","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03294","scoring_system":"epss","scoring_elements":"0.87184","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03294","scoring_system":"epss","scoring_elements":"0.87181","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03294","scoring_system":"epss","scoring_elements":"0.87202","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03294","scoring_system":"epss","scoring_elements":"0.87209","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03294","scoring_system":"epss","scoring_elements":"0.87221","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03294","scoring_system":"epss","scoring_elements":"0.87214","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03294","scoring_system":"epss","scoring_elements":"0.87211","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03294","scoring_system":"epss","scoring_elements":"0.87225","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03294","scoring_system":"epss","scoring_elements":"0.8723","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03294","scoring_system":"epss","scoring_elements":"0.87224","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03294","scoring_system":"epss","scoring_elements":"0.87242","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03294","scoring_system":"epss","scoring_elements":"0.87248","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03294","scoring_system":"epss","scoring_elements":"0.87251","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4296"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1006173","reference_id":"1006173","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1006173"},{"reference_url":"https://security.gentoo.org/glsa/201412-04","reference_id":"GLSA-201412-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1272","reference_id":"RHSA-2013:1272","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1272"},{"reference_url":"https://usn.ubuntu.com/1954-1/","reference_id":"USN-1954-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1954-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928939?format=json","purl":"pkg:deb/debian/libvirt@1.1.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@1.1.4-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2013-4296"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-x76t-fcgm-3yf3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86637?format=json","vulnerability_id":"VCID-xkwg-y7f7-pfac","summary":"libvirt: virConnectListAllInterfaces crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2218.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2218.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-2218","reference_id":"","reference_type":"","scores":[{"value":"0.10811","scoring_system":"epss","scoring_elements":"0.93385","published_at":"2026-04-29T12:55:00Z"},{"value":"0.10811","scoring_system":"epss","scoring_elements":"0.93326","published_at":"2026-04-01T12:55:00Z"},{"value":"0.10811","scoring_system":"epss","scoring_elements":"0.93335","published_at":"2026-04-02T12:55:00Z"},{"value":"0.10811","scoring_system":"epss","scoring_elements":"0.93341","published_at":"2026-04-07T12:55:00Z"},{"value":"0.10811","scoring_system":"epss","scoring_elements":"0.93349","published_at":"2026-04-08T12:55:00Z"},{"value":"0.10811","scoring_system":"epss","scoring_elements":"0.93354","published_at":"2026-04-09T12:55:00Z"},{"value":"0.10811","scoring_system":"epss","scoring_elements":"0.93358","published_at":"2026-04-11T12:55:00Z"},{"value":"0.10811","scoring_system":"epss","scoring_elements":"0.93356","published_at":"2026-04-12T12:55:00Z"},{"value":"0.10811","scoring_system":"epss","scoring_elements":"0.93357","published_at":"2026-04-13T12:55:00Z"},{"value":"0.10811","scoring_system":"epss","scoring_elements":"0.93375","published_at":"2026-04-16T12:55:00Z"},{"value":"0.10811","scoring_system":"epss","scoring_elements":"0.9338","published_at":"2026-04-18T12:55:00Z"},{"value":"0.10811","scoring_system":"epss","scoring_elements":"0.93386","published_at":"2026-04-21T12:55:00Z"},{"value":"0.10811","scoring_system":"epss","scoring_elements":"0.9339","published_at":"2026-04-24T12:55:00Z"},{"value":"0.10811","scoring_system":"epss","scoring_elements":"0.93387","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-2218"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2218","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2218"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:N/I:P/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=714699","reference_id":"714699","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=714699"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=980112","reference_id":"980112","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=980112"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/38622.txt","reference_id":"CVE-2013-2218;OSVDB-94704","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/38622.txt"},{"reference_url":"https://www.securityfocus.com/bid/60876/info","reference_id":"CVE-2013-2218;OSVDB-94704","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/60876/info"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928933?format=json","purl":"pkg:deb/debian/libvirt@1.1.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@1.1.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2013-2218"],"risk_score":5.4,"exploitability":"2.0","weighted_severity":"2.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xkwg-y7f7-pfac"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/55757?format=json","vulnerability_id":"VCID-xp7b-461n-a3d2","summary":"several","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6458.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6458.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6458","reference_id":"","reference_type":"","scores":[{"value":"0.00892","scoring_system":"epss","scoring_elements":"0.75504","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00892","scoring_system":"epss","scoring_elements":"0.75507","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00892","scoring_system":"epss","scoring_elements":"0.75537","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00892","scoring_system":"epss","scoring_elements":"0.75518","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00892","scoring_system":"epss","scoring_elements":"0.7556","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00892","scoring_system":"epss","scoring_elements":"0.75571","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00892","scoring_system":"epss","scoring_elements":"0.75596","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00892","scoring_system":"epss","scoring_elements":"0.75576","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00892","scoring_system":"epss","scoring_elements":"0.7557","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00892","scoring_system":"epss","scoring_elements":"0.75607","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00892","scoring_system":"epss","scoring_elements":"0.75611","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00892","scoring_system":"epss","scoring_elements":"0.75595","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00892","scoring_system":"epss","scoring_elements":"0.75633","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00892","scoring_system":"epss","scoring_elements":"0.75638","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00892","scoring_system":"epss","scoring_elements":"0.75649","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6458"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6458","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6458"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1447","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1447"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1048631","reference_id":"1048631","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1048631"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=734556","reference_id":"734556","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=734556"},{"reference_url":"https://security.gentoo.org/glsa/201412-04","reference_id":"GLSA-201412-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0103","reference_id":"RHSA-2014:0103","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0103"},{"reference_url":"https://usn.ubuntu.com/2093-1/","reference_id":"USN-2093-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2093-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928943?format=json","purl":"pkg:deb/debian/libvirt@1.2.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@1.2.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2013-6458"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xp7b-461n-a3d2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57257?format=json","vulnerability_id":"VCID-ypmp-rsaw-s3hb","summary":"Multiple vulnerabilities have been discovered in libvirt, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0897.json","reference_id":"","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0897.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-0897","reference_id":"","reference_type":"","scores":[{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16768","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16935","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16919","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16991","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16773","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16862","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16893","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16848","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16789","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.22965","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.22976","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.22969","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23195","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23188","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23148","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-0897"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0897","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0897"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1009075","reference_id":"1009075","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1009075"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2063883","reference_id":"2063883","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-08T15:53:19Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2063883"},{"reference_url":"https://security.gentoo.org/glsa/202210-06","reference_id":"GLSA-202210-06","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-08T15:53:19Z/"}],"url":"https://security.gentoo.org/glsa/202210-06"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00000.html","reference_id":"msg00000.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-08T15:53:19Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00000.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7472","reference_id":"RHSA-2022:7472","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7472"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8003","reference_id":"RHSA-2022:8003","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8003"},{"reference_url":"https://usn.ubuntu.com/5399-1/","reference_id":"USN-5399-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5399-1/"},{"reference_url":"https://usn.ubuntu.com/6126-1/","reference_id":"USN-6126-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6126-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928971?format=json","purl":"pkg:deb/debian/libvirt@8.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@8.2.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2022-0897"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ypmp-rsaw-s3hb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34655?format=json","vulnerability_id":"VCID-yvkr-qhaj-bfcx","summary":"Multiple vulnerabilities have been discovered in libvirt, the worst\n    of which may result in the execution of arbitrary commands.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6764.json","reference_id":"","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6764.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-6764","reference_id":"","reference_type":"","scores":[{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10649","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10789","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10851","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10678","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10754","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10811","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10824","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10794","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10769","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.1063","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10646","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10771","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10725","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10705","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.1065","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-6764"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6764","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6764"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1541444","reference_id":"1541444","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1541444"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=889839","reference_id":"889839","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=889839"},{"reference_url":"https://security.gentoo.org/glsa/201804-07","reference_id":"GLSA-201804-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201804-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3113","reference_id":"RHSA-2018:3113","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3113"},{"reference_url":"https://usn.ubuntu.com/3576-1/","reference_id":"USN-3576-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3576-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928959?format=json","purl":"pkg:deb/debian/libvirt@4.0.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@4.0.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2018-6764"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yvkr-qhaj-bfcx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56068?format=json","vulnerability_id":"VCID-zd79-93nb-pye7","summary":"Multiple vulnerabilities have been found in libvirt, worst of which\n    allows context-dependent attackers to escalate privileges.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0028.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0028.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0028","reference_id":"","reference_type":"","scores":[{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28414","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28488","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.2853","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28326","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28391","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28434","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28438","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28395","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28337","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28348","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.2828","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28184","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28072","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.27994","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0028"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0028","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0028"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1048637","reference_id":"1048637","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1048637"},{"reference_url":"https://security.gentoo.org/glsa/201412-04","reference_id":"GLSA-201412-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-04"},{"reference_url":"https://usn.ubuntu.com/2093-1/","reference_id":"USN-2093-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2093-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928943?format=json","purl":"pkg:deb/debian/libvirt@1.2.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@1.2.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2014-0028"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zd79-93nb-pye7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57254?format=json","vulnerability_id":"VCID-zj24-rwt5-g3dg","summary":"Multiple vulnerabilities have been discovered in libvirt, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3631.json","reference_id":"","reference_type":"","scores":[{"value":"3.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3631.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3631","reference_id":"","reference_type":"","scores":[{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20867","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20487","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20724","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20794","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20751","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20699","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20689","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20643","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20634","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20522","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20518","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20926","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20639","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20716","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20776","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3631"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3631","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3631"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gitlab.com/libvirt/libvirt/-/commit/15073504dbb624d3f6c911e85557019d3620fdb2","reference_id":"15073504dbb624d3f6c911e85557019d3620fdb2","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-19T19:33:05Z/"}],"url":"https://gitlab.com/libvirt/libvirt/-/commit/15073504dbb624d3f6c911e85557019d3620fdb2"},{"reference_url":"https://gitlab.com/libvirt/libvirt/-/issues/153","reference_id":"153","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-19T19:33:05Z/"}],"url":"https://gitlab.com/libvirt/libvirt/-/issues/153"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1977726","reference_id":"1977726","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-19T19:33:05Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1977726"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990709","reference_id":"990709","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990709"},{"reference_url":"https://security.archlinux.org/AVG-2124","reference_id":"AVG-2124","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2124"},{"reference_url":"https://security.gentoo.org/glsa/202210-06","reference_id":"GLSA-202210-06","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-19T19:33:05Z/"}],"url":"https://security.gentoo.org/glsa/202210-06"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00000.html","reference_id":"msg00000.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-19T19:33:05Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00000.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220331-0010/","reference_id":"ntap-20220331-0010","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-19T19:33:05Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220331-0010/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3631","reference_id":"RHSA-2021:3631","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-19T19:33:05Z/"}],"url":"https://access.redhat.com/errata/RHSA-2021:3631"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3703","reference_id":"RHSA-2021:3703","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3703"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3704","reference_id":"RHSA-2021:3704","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3704"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4191","reference_id":"RHSA-2021:4191","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4191"},{"reference_url":"https://usn.ubuntu.com/5399-1/","reference_id":"USN-5399-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5399-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928917?format=json","purl":"pkg:deb/debian/libvirt@7.0.0-3%2Bdeb11u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.0.0-3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928969?format=json","purl":"pkg:deb/debian/libvirt@7.6.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@7.6.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928915?format=json","purl":"pkg:deb/debian/libvirt@9.0.0-4%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ubdh-hdtv-akgt"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@9.0.0-4%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928919?format=json","purl":"pkg:deb/debian/libvirt@11.3.0-3%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@11.3.0-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928918?format=json","purl":"pkg:deb/debian/libvirt@12.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076085?format=json","purl":"pkg:deb/debian/libvirt@12.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.2.0-1%3Fdistro=trixie"}],"aliases":["CVE-2021-3631"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zj24-rwt5-g3dg"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvirt@12.0.0-1%3Fdistro=trixie"}