V-Server
by Fujielectric
Standard maintenance is sufficient
V-Server has low exploitation rates. Attackers rarely target this software's known vulnerabilities.
What to do
- Keep automatic updates enabled
- No urgent action needed
- Review periodically as part of normal maintenance
What Attackers Target
Vulnerabilities with high exploit probability
0.0%
Confirmed actively exploited (CISA)
0.0%
Public exploit code available
0.0%
Based on 29 known vulnerabilities. Percentages show the proportion that are actively dangerous — a low percentage means most vulnerabilities in this product are not being exploited.
Most Dangerous Vulnerabilities
| CVE | CVSS | Exploit Probability | Confirmed |
|---|---|---|---|
| CVE-2017-9639 | 7.3 | 1.5% | — |
| CVE-2019-18240 | 9.8 | 1.5% | — |
| CVE-2019-3946 | 7.5 | 1.2% | — |
| CVE-2022-29522 | 7.8 | 0.5% | — |
| CVE-2021-22641 | 7.8 | 0.5% | — |
| CVE-2018-10637 | 7.8 | 0.5% | — |
| CVE-2019-3947 | 9.8 | 0.4% | — |
| CVE-2022-29524 | 7.8 | 0.4% | — |
| CVE-2022-30549 | 7.8 | 0.4% | — |
| CVE-2022-29506 | 7.8 | 0.4% | — |
| CVE-2021-38415 | 7.8 | 0.4% | — |
| CVE-2021-38413 | 7.8 | 0.4% | — |
| CVE-2021-22637 | 7.8 | 0.4% | — |
| CVE-2021-22653 | 7.8 | 0.3% | — |
| CVE-2021-22655 | 7.8 | 0.3% | — |
| CVE-2020-25171 | 7.8 | 0.3% | — |
| CVE-2021-38419 | 7.8 | 0.2% | — |
| CVE-2021-38401 | 7.8 | 0.2% | — |
| CVE-2021-22639 | 7.8 | 0.2% | — |
| CVE-2020-10646 | 7.8 | 0.2% | — |
0
/ 100
low-risk
Active Threat
0/50 · Minimal
Exploit Availability
0/50 · Minimal
Score uses Wilson score intervals to account for sample size. Products with few CVEs are scored conservatively.