{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-15T12:19:41.575","vulnerabilities":[{"cve":{"id":"CVE-2019-10183","sourceIdentifier":"secalert@redhat.com","published":"2019-07-03T14:15:10.260","lastModified":"2024-11-21T04:18:36.153","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Virt-install(1) utility used to provision new virtual machines has introduced an option '--unattended' to create VMs without user interaction. This option accepts guest VM password as command line arguments, thus leaking them to others users on the system via process listing. It was introduced recently in the virt-manager v2.2.0 release."},{"lang":"es","value":"La utilidad Virt-install (1) utilizada para aprovisionar nuevas máquinas virtuales ha introducido una opción '--atattended' para crear máquinas virtuales sin interacción del usuario. Esta opción acepta la contraseña de la máquina virtual invitada como argumentos de la línea de comando, por lo que se filtra a otros usuarios en el sistema a través del listado de procesos. Se introdujo recientemente en la versión virt-manager versión 2.2.0."}],"metrics":{"cvssMetricV30":[{"source":"secalert@redhat.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0\/AV:L\/AC:L\/PR:L\/UI:R\/S:C\/C:L\/I:N\/A:N","baseScore":3.2,"baseSeverity":"LOW","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":1.5,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:L\/I:N\/A:N","baseScore":3.3,"baseSeverity":"LOW","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":1.8,"impactScore":1.4}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L\/AC:L\/Au:N\/C:P\/I:N\/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"secalert@redhat.com","type":"Secondary","description":[{"lang":"en","value":"CWE-200"}]},{"source":"nvd@nist.gov","type":"Secondary","description":[{"lang":"en","value":"CWE-200"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:redhat:virt-manager:2.2.0:*:*:*:*:*:*:*","matchCriteriaId":"024942F3-ADBB-4668-9BA3-C016F35B42D1"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","matchCriteriaId":"F4CFF558-3C47-480D-A2F0-BABF26042943"}]}]}],"references":[{"url":"http:\/\/www.securityfocus.com\/bid\/109027","source":"secalert@redhat.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"https:\/\/access.redhat.com\/errata\/RHSA-2019:3464","source":"secalert@redhat.com"},{"url":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=CVE-2019-10183","source":"secalert@redhat.com","tags":["Issue Tracking","Vendor Advisory"]},{"url":"http:\/\/www.securityfocus.com\/bid\/109027","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https:\/\/access.redhat.com\/errata\/RHSA-2019:3464","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=CVE-2019-10183","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Issue Tracking","Vendor Advisory"]}]}}]}