Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
virtualization Vendor: redhat

About This Product

virtualization is a software product offered by redhat. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 129 known vulnerabilities affecting redhat virtualization. This includes 14 critical-severity issues and 61 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2009 to 2024, indicating a sustained research interest and ongoing security attention. 51 medium-severity issues and 3 low-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2009-2910 2009-10-20 2025-04-09 - 2.1 Unknown
CVE-2009-3939 2009-11-16 2025-04-09 7.1 6.6 Unknown
CVE-2009-3080 2009-11-20 2025-04-09 - 7.2 Unknown
CVE-2009-4272 2010-01-27 2025-04-11 7.5 7.8 Likely
CVE-2012-3515 2012-11-23 2025-04-11 - 7.2 Unknown
CVE-2012-6075 2013-02-13 2025-04-11 - 9.3 Likely
CVE-2013-4344 2013-10-04 2025-04-11 - 7.2 Unknown
CVE-2014-0160 2014-04-07 2025-10-22 7.5 5.0 Likely
CVE-2014-3467 2014-06-05 2025-04-12 - 5.0 Likely
CVE-2014-3468 2014-06-05 2025-04-12 - 7.5 Likely
CVE-2014-3469 2014-06-05 2025-04-12 - 5.0 Likely
CVE-2014-6271 2014-09-24 2025-10-22 9.8 10.0 Likely
CVE-2014-7169 2014-09-25 2025-10-22 9.8 10.0 Likely
CVE-2014-3615 2014-11-01 2025-04-12 - 2.1 Unknown
CVE-2014-7815 2014-11-14 2025-04-12 - 5.0 Likely
CVE-2014-7840 2014-12-12 2025-04-12 - 7.5 Likely
CVE-2015-0235 2015-01-28 2025-04-12 - 10.0 Likely
CVE-2015-3209 2015-06-15 2025-04-12 - 7.5 Likely
CVE-2015-5165 2015-08-12 2025-04-12 - 9.3 Likely
CVE-2015-3214 2015-08-31 2025-04-12 - 6.9 Unknown
CVE-2015-7512 2016-01-08 2025-04-12 9.0 6.8 Likely
CVE-2015-1779 2016-01-12 2025-04-12 8.6 7.8 Likely
CVE-2016-1568 2016-04-12 2025-04-12 8.8 6.9 Unknown
CVE-2016-2857 2016-04-12 2025-04-12 8.4 3.6 Unknown
CVE-2016-3710 2016-05-11 2025-04-12 8.8 7.2 Unknown
CVE-2016-4020 2016-05-25 2025-04-12 6.5 2.1 Unknown
CVE-2016-5126 2016-06-01 2025-04-12 7.8 4.6 Unknown
CVE-2016-5403 2016-08-02 2025-04-12 5.5 4.9 Unknown
CVE-2016-8576 2016-11-04 2025-04-12 6.0 2.1 Unknown
CVE-2016-8669 2016-11-04 2025-04-12 6.0 2.1 Unknown
CVE-2016-8909 2016-11-04 2025-04-12 6.0 2.1 Unknown
CVE-2016-8910 2016-11-04 2025-04-12 6.0 2.1 Unknown
CVE-2016-6835 2016-12-10 2025-04-12 6.0 2.1 Unknown
CVE-2016-6888 2016-12-10 2025-04-12 4.4 2.1 Unknown
CVE-2016-7422 2016-12-10 2025-04-12 6.0 2.1 Unknown
CVE-2016-7466 2016-12-10 2025-04-12 6.0 1.9 Unknown
CVE-2016-9907 2016-12-23 2025-04-12 6.5 4.9 Unknown
CVE-2016-9911 2016-12-23 2025-04-12 6.5 4.9 Unknown
CVE-2016-9921 2016-12-23 2025-04-12 6.5 2.1 Unknown
CVE-2017-5973 2017-03-27 2025-04-20 5.5 2.1 Unknown
CVE-2017-9214 2017-05-23 2025-04-20 9.8 7.5 Likely
CVE-2017-7980 2017-07-25 2025-04-20 7.8 4.6 Unknown
CVE-2017-10664 2017-08-02 2025-04-20 7.5 5.0 Likely
CVE-2017-7536 2018-01-10 2024-11-21 7.0 4.4 Unknown
CVE-2018-5344 2018-01-12 2024-11-21 7.8 4.6 Unknown
CVE-2018-5968 2018-01-22 2024-11-21 8.1 6.8 Likely
CVE-2017-7525 2018-02-06 2024-11-21 9.8 7.5 Likely
CVE-2018-6764 2018-02-23 2024-11-21 7.8 4.6 Unknown
CVE-2018-7750 2018-03-13 2024-11-21 9.8 7.5 Likely
CVE-2018-8088 2018-03-20 2024-11-21 9.8 7.5 Likely
CVE-2017-12196 2018-04-18 2024-11-21 4.8 4.3 Likely
CVE-2018-1088 2018-04-18 2024-11-21 8.1 6.8 Likely
CVE-2018-1059 2018-04-24 2024-11-21 6.1 2.9 Unknown
CVE-2018-10237 2018-04-26 2024-11-21 5.9 4.3 Likely
CVE-2018-3639 2018-05-22 2024-11-21 5.5 2.1 Unknown
CVE-2018-1000180 2018-06-05 2025-05-12 7.5 5.0 Likely
CVE-2018-11806 2018-06-13 2024-11-21 8.2 7.2 Unknown
CVE-2018-1073 2018-06-19 2024-11-21 5.3 5.0 Likely
CVE-2018-10874 2018-07-02 2024-11-21 7.8 4.6 Unknown
CVE-2018-10855 2018-07-03 2024-11-21 5.9 4.3 Likely
CVE-2018-13405 2018-07-06 2024-11-21 7.8 4.6 Unknown
CVE-2018-10875 2018-07-13 2024-11-21 7.8 4.6 Unknown
CVE-2017-7481 2018-07-19 2024-11-21 9.8 7.5 Likely
CVE-2016-8647 2018-07-26 2024-11-21 4.9 4.0 Likely
CVE-2017-7539 2018-07-26 2024-11-21 5.3 5.0 Likely
CVE-2018-10862 2018-07-27 2024-11-21 5.5 4.9 Unknown
CVE-2017-15113 2018-07-27 2024-11-21 7.2 3.5 Unknown
CVE-2017-15119 2018-07-27 2024-11-21 5.8 5.0 Likely
CVE-2018-10897 2018-08-01 2024-11-21 8.1 9.3 Likely
CVE-2018-5390 2018-08-06 2024-11-21 7.5 7.8 Likely
CVE-2018-10908 2018-08-09 2024-11-21 6.5 7.1 Likely
CVE-2018-10915 2018-08-09 2024-11-21 8.5 6.0 Unknown
CVE-2018-10873 2018-08-17 2024-11-21 8.3 6.5 Likely
CVE-2015-5160 2018-08-20 2024-11-21 5.5 2.1 Unknown
CVE-2018-10858 2018-08-22 2024-11-21 4.3 6.5 Likely
CVE-2018-10930 2018-09-04 2024-11-21 6.5 4.0 Likely
CVE-2018-1114 2018-09-11 2024-11-21 6.5 4.0 Likely
CVE-2018-17958 2018-10-09 2024-11-21 7.5 5.0 Likely
CVE-2018-17963 2018-10-09 2024-11-21 9.8 7.5 Likely
CVE-2018-14654 2018-10-31 2024-11-21 6.5 8.5 Likely
CVE-2018-14659 2018-10-31 2024-11-21 6.5 4.0 Likely
CVE-2018-14661 2018-10-31 2024-11-21 6.5 4.0 Likely
CVE-2018-14660 2018-11-01 2024-11-21 6.5 4.0 Likely
CVE-2018-16881 2019-01-25 2024-11-21 7.5 5.0 Likely
CVE-2019-1559 2019-02-27 2024-11-21 5.9 4.3 Likely
CVE-2019-9636 2019-03-08 2024-11-21 9.8 5.0 Likely
CVE-2019-3879 2019-03-25 2024-11-21 8.1 5.5 Likely
CVE-2019-3804 2019-03-26 2024-11-21 7.5 5.0 Likely
CVE-2019-10160 2019-06-07 2024-11-21 9.8 5.0 Likely
CVE-2019-3888 2019-06-12 2024-11-21 9.8 5.0 Likely
CVE-2019-10126 2019-06-14 2024-11-21 9.8 7.5 Likely
CVE-2019-10161 2019-07-30 2024-11-21 7.8 7.2 Unknown
CVE-2019-10166 2019-08-02 2024-11-21 7.8 4.6 Unknown
CVE-2019-10167 2019-08-02 2024-11-21 7.8 4.6 Unknown
CVE-2019-10168 2019-08-02 2024-11-21 7.8 4.6 Unknown
CVE-2019-14835 2019-09-17 2024-11-21 7.8 7.2 Unknown
CVE-2019-14816 2019-09-20 2024-11-21 7.8 7.2 Unknown
CVE-2019-14287 2019-10-17 2024-11-21 8.8 9.0 Likely
CVE-2015-1780 2019-11-22 2024-11-21 6.5 4.0 Likely
CVE-2019-14859 2020-01-02 2024-11-21 9.1 6.4 Likely
CVE-2013-4535 2020-02-11 2024-11-21 8.8 7.2 Unknown
CVE-2019-19336 2020-03-19 2024-11-21 6.1 4.3 Likely
CVE-2020-35497 2020-12-21 2024-11-21 6.5 4.0 Likely
CVE-2020-25657 2021-01-12 2024-11-21 5.9 4.3 Likely
CVE-2020-27827 2021-03-18 2025-12-03 7.5 7.1 Likely
CVE-2019-14850 2021-03-18 2024-11-21 3.7 2.6 Unknown
CVE-2021-3501 2021-05-06 2024-11-21 7.1 3.6 Unknown
CVE-2021-3634 2021-08-31 2024-11-21 6.5 4.0 Likely
CVE-2021-3621 2021-12-23 2025-11-03 8.8 9.3 Likely
CVE-2021-4154 2022-02-04 2024-11-21 8.8 7.2 Unknown
CVE-2021-3560 2022-02-16 2025-11-06 7.8 7.2 Unknown
CVE-2020-25717 2022-02-18 2024-11-21 8.1 8.5 Likely
CVE-2021-3677 2022-03-02 2024-11-21 6.5 4.0 Likely
CVE-2021-3609 2022-03-03 2024-11-21 7.0 6.9 Unknown
CVE-2021-3620 2022-03-03 2024-11-21 5.5 2.1 Unknown
CVE-2022-27666 2022-03-23 2024-11-21 7.8 4.6 Unknown
CVE-2022-0330 2022-03-25 2024-11-21 7.8 4.6 Unknown
CVE-2022-0435 2022-03-25 2024-11-21 8.8 9.0 Likely
CVE-2022-2078 2022-06-30 2024-11-21 5.5 2.1 Unknown
CVE-2022-0207 2022-08-26 2024-11-21 4.7 - -
CVE-2022-2132 2022-08-31 2024-11-21 8.6 - -
CVE-2014-0144 2022-09-29 2024-11-21 8.6 - -
CVE-2014-0147 2022-09-29 2024-11-21 6.2 - -
CVE-2014-0148 2022-09-29 2024-11-21 5.5 - -
CVE-2022-2805 2022-10-19 2025-05-09 6.5 - -
CVE-2023-1668 2023-04-10 2025-04-23 8.2 - -
CVE-2023-4911 2023-10-03 2026-02-13 7.8 - -
CVE-2023-5366 2023-10-06 2024-11-21 7.1 - -
CVE-2024-7259 2024-09-26 2026-01-08 4.9 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for redhat virtualization by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.