Vulnerability Database

With exploit

redhat / libvirt

Title Severity Exploit Date Affected Version
CVE-2013-6458 Medium Jan 24, 2014 == 0.4.1
== 0.9.13
== 0.8.6
== 1.0.5.4
== 0.9.6.3
== 0.9.2
== 0.4.5
== 0.7.5
== 0.0.6
== 0.9.5
== 1.0.5.3
== 0.5.0
== 0.10.2.2
== 0.9.11.3
== 0.7.2
== 0.1.1
== 0.0.3
== 0.1.7
== 0.0.1
== 1.0.5
== 0.2.0
== 0.9.11.8
== 0.7.4
== 0.9.10
== 1.0.5.6
== 0.4.4
== 0.3.3
== 0.0.2
== 0.1.8
== 0.3.0
== 0.9.8
== 0.10.2.7
== 0.1.3
== 0.1.9
== 0.4.2
== 0.9.9
== 0.9.6.2
== 0.8.5
== 1.0.4
== 0.8.7
== 0.7.7
== 0.6.4
== 0.3.1
== 0.9.3
== 0.9.6.1
== 0.1.6
== 0.9.6
== 0.9.0
== 0.10.2.4
== 0.6.5
== 0.9.11.2
== 0.10.2.1
== 1.0.1
== 0.8.2
== 0.10.2.6
== 0.8.1
== 0.9.12
== 0.2.2
== 0.10.2.3
== 1.1.2
== 0.8.3
== 0.7.1
== 1.1.4
== 0.2.3
== 0.0.4
== 0.1.0
== 0.9.11.1
== 0.6.2
== 0.8.8
== 1.0.6
== 0.6.3
== 1.0.2
== 1.1.1
== 0.10.1
== 0.9.11.6
== 0.4.3
== 1.0.5.1
== 0.5.1
== 0.10.2
== 1.0.5.2
== 0.9.11.7
== 1.0.3
== 0.7.6
== 0.10.0
== 0.7.3
== 0.6.1
== 0.1.4
== 0.8.4
== 0.9.11.5
== 0.9.4
== 0.9.1
== 0.4.6
== 0.10.2.5
== 0.10.2.8
<= 1.2.0
== 0.1.5
== 0.9.7
== 1.0.5.5
== 0.7.0
== 0.4.0
== 0.0.5
== 0.2.1
== 1.0.0
== 0.6.0
== 1.1.0
== 0.9.11
== 1.1.3
== 0.8.0
== 0.9.11.4
== 0.3.2
CVE-2014-0028 Low Jan 24, 2014 == 1.2.0
== 1.1.2
== 1.1.4
== 1.1.1
== 1.1.3
CVE-2014-1447 Low Jan 24, 2014 == 0.4.1
== 0.9.13
== 0.8.6
== 1.0.5.4
== 0.9.6.3
== 0.9.2
== 0.4.5
== 0.7.5
== 0.0.6
== 0.9.5
== 1.0.5.3
== 0.5.0
== 0.10.2.2
== 0.9.11.3
== 0.7.2
== 0.1.1
== 0.0.3
== 0.1.7
== 0.0.1
== 1.0.5
== 0.2.0
== 0.9.11.8
== 0.7.4
== 0.9.10
== 1.0.5.6
== 0.4.4
== 0.3.3
== 0.0.2
== 0.1.8
== 0.3.0
== 0.9.8
== 0.10.2.7
== 0.1.3
== 0.1.9
== 0.4.2
== 0.9.9
== 0.9.6.2
== 0.8.5
== 1.0.4
== 0.8.7
== 0.7.7
== 0.6.4
== 0.3.1
== 0.9.3
== 0.9.6.1
== 0.1.6
== 0.9.6
== 0.9.0
== 0.10.2.4
== 0.6.5
== 0.9.11.2
== 0.10.2.1
== 1.0.1
== 0.8.2
== 0.10.2.6
== 0.8.1
== 0.9.12
== 0.2.2
== 0.10.2.3
== 1.1.2
== 0.8.3
== 0.7.1
== 1.1.4
== 0.2.3
== 0.0.4
== 0.1.0
== 0.9.11.1
== 0.6.2
== 0.8.8
== 1.0.6
== 0.6.3
== 1.0.2
== 1.1.1
== 0.10.1
== 0.9.11.6
== 0.4.3
== 1.0.5.1
== 0.5.1
== 0.10.2
== 1.0.5.2
== 0.9.11.7
== 1.0.3
== 0.7.6
== 0.10.0
== 0.7.3
== 0.6.1
== 0.1.4
== 0.8.4
== 0.9.11.5
== 0.9.4
== 0.9.1
== 0.4.6
== 0.10.2.5
== 0.10.2.8
<= 1.2.0
== 0.1.5
== 0.9.7
== 1.0.5.5
== 0.7.0
== 0.4.0
== 0.0.5
== 0.2.1
== 1.0.0
== 0.6.0
== 1.1.0
== 0.9.11
== 1.1.3
== 0.8.0
== 0.9.11.4
== 0.3.2
CVE-2013-6436 Low Jan 7, 2014 == 1.0.5.4
== 1.0.5.3
== 1.0.5
== 1.0.5.6
== 1.2.0
== 1.1.2
== 1.1.4
== 1.0.6
== 1.1.1
== 1.0.5.1
== 1.0.5.2
== 1.0.5.5
== 1.1.0
== 1.1.3
CVE-2013-4400 High Dec 9, 2013 == 1.1.2
== 1.1.3
CVE-2013-4401 High Nov 2, 2013 == 1.1.2
== 1.1.1
== 1.1.0
== 1.1.3
CVE-2013-4311 Low Oct 3, 2013 == 1.0.5.4
== 1.0.5.3
== 0.10.2.2
== 1.0.5
== 0.10.2.7
== 0.10.2.4
== 0.10.2.1
== 0.10.2.6
== 0.9.12
== 0.10.2.3
== 1.0.5.1
== 0.10.2
== 1.0.5.2
== 0.10.2.5
== 1.0.5.5
CVE-2013-2218 Medium Sep 30, 2013 == 1.0.6
CVE-2013-2230 Low Sep 30, 2013 <= 1.1.0
== 0.0.1
== 0.0.2
== 0.0.3
== 0.0.4
== 0.0.5
== 0.0.6
== 0.1.0
== 0.1.1
== 0.1.3
== 0.1.4
== 0.1.5
== 0.1.6
== 0.1.7
== 0.1.8
== 0.1.9
== 0.10.0
== 0.10.1
== 0.10.2
== 0.10.2.1
== 0.10.2.2
== 0.2.0
== 0.2.1
== 0.2.2
== 0.2.3
== 0.3.0
== 0.3.1
== 0.3.2
== 0.3.3
== 0.4.0
== 0.4.1
== 0.4.2
== 0.4.3
== 0.4.4
== 0.4.5
== 0.4.6
== 0.5.0
== 0.5.1
== 0.6.0
== 0.6.1
== 0.6.2
== 0.6.3
== 0.6.4
== 0.6.5
== 0.7.0
== 0.7.1
== 0.7.2
== 0.7.3
== 0.7.4
== 0.7.5
== 0.7.6
== 0.7.7
== 0.8.0
== 0.8.1
== 0.8.2
== 0.8.3
== 0.8.4
== 0.8.5
== 0.8.6
== 0.8.7
== 0.8.8
== 0.9.0
== 0.9.1
== 0.9.10
== 0.9.11
== 0.9.11.1
== 0.9.11.2
== 0.9.11.3
== 0.9.11.4
== 0.9.11.5
== 0.9.11.6
== 0.9.11.7
== 0.9.11.8
== 0.9.12
== 0.9.13
== 0.9.2
== 0.9.3
== 0.9.4
== 0.9.5
== 0.9.6
== 0.9.6.1
== 0.9.6.2
== 0.9.6.3
== 0.9.7
== 0.9.8
== 0.9.9
== 1.0.0
== 1.0.1
== 1.0.2
== 1.0.3
== 1.0.4
== 1.0.5
== 1.0.6
CVE-2013-4153 Medium Sep 30, 2013 == 1.0.6
== 1.1.0