Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
virtualization_host Vendor: redhat

About This Product

virtualization_host is a software product offered by redhat. As an operating system, this product forms the foundation of countless systems, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 84 known vulnerabilities affecting redhat virtualization_host. This includes 5 critical-severity issues and 45 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2017 to 2024, indicating a sustained research interest and ongoing security attention. 32 medium-severity issues and 2 low-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2017-1000410 2017-12-07 2025-04-20 7.5 5.0 Likely
CVE-2017-1000407 2017-12-11 2025-04-20 7.4 6.1 Unknown
CVE-2017-7536 2018-01-10 2024-11-21 7.0 4.4 Unknown
CVE-2018-5968 2018-01-22 2024-11-21 8.1 6.8 Likely
CVE-2018-5750 2018-01-26 2024-11-21 5.5 2.1 Unknown
CVE-2018-1000001 2018-01-31 2024-11-21 7.8 7.2 Unknown
CVE-2018-6485 2018-02-01 2024-11-21 9.8 7.5 Likely
CVE-2017-7525 2018-02-06 2024-11-21 9.8 7.5 Likely
CVE-2018-6927 2018-02-12 2024-11-21 7.8 4.6 Unknown
CVE-2018-7740 2018-03-07 2024-11-21 5.5 4.9 Unknown
CVE-2018-1068 2018-03-16 2024-11-21 6.7 7.2 Unknown
CVE-2018-8088 2018-03-20 2024-11-21 9.8 7.5 Likely
CVE-2018-1088 2018-04-18 2024-11-21 8.1 6.8 Likely
CVE-2018-10322 2018-04-24 2024-11-21 5.5 4.9 Unknown
CVE-2018-10237 2018-04-26 2024-11-21 5.9 4.3 Likely
CVE-2018-10675 2018-05-02 2024-11-21 7.8 7.2 Unknown
CVE-2018-1118 2018-05-10 2024-11-21 2.3 2.1 Unknown
CVE-2018-11236 2018-05-18 2024-11-21 9.8 7.5 Likely
CVE-2018-11237 2018-05-18 2024-11-21 7.8 4.6 Unknown
CVE-2018-1067 2018-05-21 2024-11-21 6.1 5.8 Likely
CVE-2018-5803 2018-06-12 2024-11-21 5.5 4.9 Unknown
CVE-2018-5848 2018-06-12 2024-11-21 7.8 4.6 Unknown
CVE-2018-1073 2018-06-19 2024-11-21 5.3 5.0 Likely
CVE-2018-1120 2018-06-20 2024-11-21 2.8 3.5 Unknown
CVE-2018-10874 2018-07-02 2024-11-21 7.8 4.6 Unknown
CVE-2018-10875 2018-07-13 2024-11-21 7.8 4.6 Unknown
CVE-2018-10873 2018-08-17 2024-11-21 8.3 6.5 Likely
CVE-2018-10858 2018-08-22 2024-11-21 4.3 6.5 Likely
CVE-2018-10904 2018-09-04 2024-11-21 8.8 6.5 Likely
CVE-2018-10907 2018-09-04 2024-11-21 8.8 6.5 Likely
CVE-2018-10911 2018-09-04 2024-11-21 7.5 5.0 Likely
CVE-2018-10913 2018-09-04 2024-11-21 6.5 4.0 Likely
CVE-2018-10914 2018-09-04 2024-11-21 6.5 4.0 Likely
CVE-2018-10923 2018-09-04 2024-11-21 8.1 5.5 Likely
CVE-2018-10926 2018-09-04 2024-11-21 8.8 6.5 Likely
CVE-2018-10927 2018-09-04 2024-11-21 8.1 5.5 Likely
CVE-2018-10928 2018-09-04 2024-11-21 8.8 6.5 Likely
CVE-2018-10929 2018-09-04 2024-11-21 8.8 6.5 Likely
CVE-2018-10930 2018-09-04 2024-11-21 6.5 4.0 Likely
CVE-2018-1114 2018-09-11 2024-11-21 6.5 4.0 Likely
CVE-2018-1000805 2018-10-08 2024-11-21 8.8 6.5 Likely
CVE-2018-18559 2018-10-22 2024-11-21 8.1 6.8 Likely
CVE-2018-14654 2018-10-31 2024-11-21 6.5 8.5 Likely
CVE-2018-14659 2018-10-31 2024-11-21 6.5 4.0 Likely
CVE-2018-14661 2018-10-31 2024-11-21 6.5 4.0 Likely
CVE-2018-14660 2018-11-01 2024-11-21 6.5 4.0 Likely
CVE-2018-18397 2018-12-12 2024-11-21 5.5 2.1 Unknown
CVE-2018-16881 2019-01-25 2024-11-21 7.5 5.0 Likely
CVE-2019-1559 2019-02-27 2024-11-21 5.9 4.3 Likely
CVE-2019-3460 2019-04-11 2024-11-21 6.5 3.3 Unknown
CVE-2019-3888 2019-06-12 2024-11-21 9.8 5.0 Likely
CVE-2019-11479 2019-06-19 2024-11-21 7.5 5.0 Likely
CVE-2019-10161 2019-07-30 2024-11-21 7.8 7.2 Unknown
CVE-2019-1125 2019-09-03 2026-02-20 5.6 2.1 Unknown
CVE-2019-14835 2019-09-17 2024-11-21 7.8 7.2 Unknown
CVE-2019-14821 2019-09-19 2024-11-21 8.8 7.2 Unknown
CVE-2020-10711 2020-05-22 2024-11-21 5.9 4.3 Likely
CVE-2021-3501 2021-05-06 2024-11-21 7.1 3.6 Unknown
CVE-2021-3621 2021-12-23 2025-11-03 8.8 9.3 Likely
CVE-2021-45417 2022-01-20 2024-11-21 7.8 7.2 Unknown
CVE-2021-3560 2022-02-16 2025-11-06 7.8 7.2 Unknown
CVE-2021-3752 2022-02-16 2024-11-21 7.1 7.9 Unknown
CVE-2016-2124 2022-02-18 2024-11-21 5.9 4.3 Likely
CVE-2020-25717 2022-02-18 2024-11-21 8.1 8.5 Likely
CVE-2021-44142 2022-02-21 2025-04-23 8.8 9.0 Likely
CVE-2021-3609 2022-03-03 2024-11-21 7.0 6.9 Unknown
CVE-2021-3620 2022-03-03 2024-11-21 5.5 2.1 Unknown
CVE-2022-0492 2022-03-03 2024-11-21 7.8 6.9 Unknown
CVE-2021-3744 2022-03-04 2024-11-21 5.5 2.1 Unknown
CVE-2021-3656 2022-03-04 2024-11-21 8.8 7.2 Unknown
CVE-2022-0516 2022-03-10 2024-11-21 7.8 4.6 Unknown
CVE-2022-0847 2022-03-10 2025-11-06 7.8 7.2 Unknown
CVE-2022-1011 2022-03-18 2024-11-21 7.8 4.6 Unknown
CVE-2022-0330 2022-03-25 2024-11-21 7.8 4.6 Unknown
CVE-2022-0435 2022-03-25 2024-11-21 8.8 9.0 Likely
CVE-2021-3659 2022-08-22 2024-11-21 5.5 - -
CVE-2021-20316 2022-08-23 2024-11-21 6.8 - -
CVE-2021-3669 2022-08-26 2025-11-03 5.5 - -
CVE-2022-0207 2022-08-26 2024-11-21 4.7 - -
CVE-2023-4911 2023-10-03 2026-02-13 7.8 - -
CVE-2023-6356 2024-02-07 2025-11-04 6.5 - -
CVE-2023-6535 2024-02-07 2025-11-04 6.5 - -
CVE-2023-6536 2024-02-07 2025-11-04 6.5 - -
CVE-2023-3758 2024-04-18 2025-11-03 7.1 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for redhat virtualization_host by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.