Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/redhat-virtualization-host@4.4.7-20210715.1?arch=el8_4
Typerpm
Namespaceredhat
Nameredhat-virtualization-host
Version4.4.7-20210715.1
Qualifiers
arch el8_4
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-142d-1ac5-5qdk
vulnerability_id VCID-142d-1ac5-5qdk
summary kernel: size_t-to-int conversion vulnerability in the filesystem layer
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33909.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33909.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-33909
reference_id
reference_type
scores
0
value 0.02223
scoring_system epss
scoring_elements 0.84438
published_at 2026-04-01T12:55:00Z
1
value 0.02223
scoring_system epss
scoring_elements 0.84534
published_at 2026-04-21T12:55:00Z
2
value 0.02223
scoring_system epss
scoring_elements 0.84502
published_at 2026-04-09T12:55:00Z
3
value 0.02223
scoring_system epss
scoring_elements 0.84521
published_at 2026-04-11T12:55:00Z
4
value 0.02223
scoring_system epss
scoring_elements 0.84516
published_at 2026-04-12T12:55:00Z
5
value 0.02223
scoring_system epss
scoring_elements 0.84511
published_at 2026-04-13T12:55:00Z
6
value 0.02223
scoring_system epss
scoring_elements 0.84532
published_at 2026-04-18T12:55:00Z
7
value 0.02223
scoring_system epss
scoring_elements 0.84454
published_at 2026-04-02T12:55:00Z
8
value 0.02223
scoring_system epss
scoring_elements 0.84473
published_at 2026-04-04T12:55:00Z
9
value 0.02223
scoring_system epss
scoring_elements 0.84475
published_at 2026-04-07T12:55:00Z
10
value 0.02223
scoring_system epss
scoring_elements 0.84497
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-33909
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36311
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36311
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33909
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33909
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34693
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34693
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3609
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1970273
reference_id 1970273
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1970273
8
reference_url https://security.archlinux.org/ASA-202107-48
reference_id ASA-202107-48
reference_type
scores
url https://security.archlinux.org/ASA-202107-48
9
reference_url https://security.archlinux.org/ASA-202107-49
reference_id ASA-202107-49
reference_type
scores
url https://security.archlinux.org/ASA-202107-49
10
reference_url https://security.archlinux.org/ASA-202107-50
reference_id ASA-202107-50
reference_type
scores
url https://security.archlinux.org/ASA-202107-50
11
reference_url https://security.archlinux.org/ASA-202107-51
reference_id ASA-202107-51
reference_type
scores
url https://security.archlinux.org/ASA-202107-51
12
reference_url https://security.archlinux.org/AVG-2181
reference_id AVG-2181
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2181
13
reference_url https://security.archlinux.org/AVG-2182
reference_id AVG-2182
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2182
14
reference_url https://security.archlinux.org/AVG-2183
reference_id AVG-2183
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2183
15
reference_url https://security.archlinux.org/AVG-2184
reference_id AVG-2184
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2184
16
reference_url https://access.redhat.com/errata/RHSA-2021:2714
reference_id RHSA-2021:2714
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2714
17
reference_url https://access.redhat.com/errata/RHSA-2021:2715
reference_id RHSA-2021:2715
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2715
18
reference_url https://access.redhat.com/errata/RHSA-2021:2716
reference_id RHSA-2021:2716
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2716
19
reference_url https://access.redhat.com/errata/RHSA-2021:2718
reference_id RHSA-2021:2718
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2718
20
reference_url https://access.redhat.com/errata/RHSA-2021:2719
reference_id RHSA-2021:2719
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2719
21
reference_url https://access.redhat.com/errata/RHSA-2021:2720
reference_id RHSA-2021:2720
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2720
22
reference_url https://access.redhat.com/errata/RHSA-2021:2722
reference_id RHSA-2021:2722
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2722
23
reference_url https://access.redhat.com/errata/RHSA-2021:2723
reference_id RHSA-2021:2723
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2723
24
reference_url https://access.redhat.com/errata/RHSA-2021:2725
reference_id RHSA-2021:2725
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2725
25
reference_url https://access.redhat.com/errata/RHSA-2021:2726
reference_id RHSA-2021:2726
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2726
26
reference_url https://access.redhat.com/errata/RHSA-2021:2727
reference_id RHSA-2021:2727
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2727
27
reference_url https://access.redhat.com/errata/RHSA-2021:2728
reference_id RHSA-2021:2728
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2728
28
reference_url https://access.redhat.com/errata/RHSA-2021:2729
reference_id RHSA-2021:2729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2729
29
reference_url https://access.redhat.com/errata/RHSA-2021:2730
reference_id RHSA-2021:2730
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2730
30
reference_url https://access.redhat.com/errata/RHSA-2021:2731
reference_id RHSA-2021:2731
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2731
31
reference_url https://access.redhat.com/errata/RHSA-2021:2732
reference_id RHSA-2021:2732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2732
32
reference_url https://access.redhat.com/errata/RHSA-2021:2733
reference_id RHSA-2021:2733
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2733
33
reference_url https://access.redhat.com/errata/RHSA-2021:2734
reference_id RHSA-2021:2734
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2734
34
reference_url https://access.redhat.com/errata/RHSA-2021:2735
reference_id RHSA-2021:2735
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2735
35
reference_url https://access.redhat.com/errata/RHSA-2021:2736
reference_id RHSA-2021:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2736
36
reference_url https://access.redhat.com/errata/RHSA-2021:2737
reference_id RHSA-2021:2737
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2737
37
reference_url https://usn.ubuntu.com/5014-1/
reference_id USN-5014-1
reference_type
scores
url https://usn.ubuntu.com/5014-1/
38
reference_url https://usn.ubuntu.com/5015-1/
reference_id USN-5015-1
reference_type
scores
url https://usn.ubuntu.com/5015-1/
39
reference_url https://usn.ubuntu.com/5016-1/
reference_id USN-5016-1
reference_type
scores
url https://usn.ubuntu.com/5016-1/
40
reference_url https://usn.ubuntu.com/5017-1/
reference_id USN-5017-1
reference_type
scores
url https://usn.ubuntu.com/5017-1/
41
reference_url https://usn.ubuntu.com/5018-1/
reference_id USN-5018-1
reference_type
scores
url https://usn.ubuntu.com/5018-1/
fixed_packages
aliases CVE-2021-33909
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-142d-1ac5-5qdk
1
url VCID-5b2a-5xzp-yqb9
vulnerability_id VCID-5b2a-5xzp-yqb9
summary kernel: race condition for removal of the HCI controller
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-32399.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-32399.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-32399
reference_id
reference_type
scores
0
value 0.00064
scoring_system epss
scoring_elements 0.19799
published_at 2026-04-01T12:55:00Z
1
value 0.00064
scoring_system epss
scoring_elements 0.19759
published_at 2026-04-21T12:55:00Z
2
value 0.00064
scoring_system epss
scoring_elements 0.19872
published_at 2026-04-11T12:55:00Z
3
value 0.00064
scoring_system epss
scoring_elements 0.19827
published_at 2026-04-12T12:55:00Z
4
value 0.00064
scoring_system epss
scoring_elements 0.1977
published_at 2026-04-13T12:55:00Z
5
value 0.00064
scoring_system epss
scoring_elements 0.19744
published_at 2026-04-16T12:55:00Z
6
value 0.00064
scoring_system epss
scoring_elements 0.19746
published_at 2026-04-18T12:55:00Z
7
value 0.00064
scoring_system epss
scoring_elements 0.19945
published_at 2026-04-02T12:55:00Z
8
value 0.00064
scoring_system epss
scoring_elements 0.20003
published_at 2026-04-04T12:55:00Z
9
value 0.00064
scoring_system epss
scoring_elements 0.1973
published_at 2026-04-07T12:55:00Z
10
value 0.00064
scoring_system epss
scoring_elements 0.1981
published_at 2026-04-08T12:55:00Z
11
value 0.00064
scoring_system epss
scoring_elements 0.19862
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-32399
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32399
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32399
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1970807
reference_id 1970807
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1970807
5
reference_url https://security.archlinux.org/AVG-1958
reference_id AVG-1958
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1958
6
reference_url https://security.archlinux.org/AVG-1959
reference_id AVG-1959
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1959
7
reference_url https://security.archlinux.org/AVG-1960
reference_id AVG-1960
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1960
8
reference_url https://security.archlinux.org/AVG-1961
reference_id AVG-1961
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1961
9
reference_url https://access.redhat.com/errata/RHSA-2021:2714
reference_id RHSA-2021:2714
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2714
10
reference_url https://access.redhat.com/errata/RHSA-2021:2715
reference_id RHSA-2021:2715
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2715
11
reference_url https://access.redhat.com/errata/RHSA-2021:2716
reference_id RHSA-2021:2716
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2716
12
reference_url https://access.redhat.com/errata/RHSA-2021:2736
reference_id RHSA-2021:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2736
13
reference_url https://access.redhat.com/errata/RHSA-2021:3173
reference_id RHSA-2021:3173
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3173
14
reference_url https://access.redhat.com/errata/RHSA-2021:3181
reference_id RHSA-2021:3181
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3181
15
reference_url https://access.redhat.com/errata/RHSA-2021:3320
reference_id RHSA-2021:3320
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3320
16
reference_url https://access.redhat.com/errata/RHSA-2021:3321
reference_id RHSA-2021:3321
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3321
17
reference_url https://access.redhat.com/errata/RHSA-2021:3327
reference_id RHSA-2021:3327
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3327
18
reference_url https://access.redhat.com/errata/RHSA-2021:3328
reference_id RHSA-2021:3328
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3328
19
reference_url https://access.redhat.com/errata/RHSA-2021:3363
reference_id RHSA-2021:3363
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3363
20
reference_url https://access.redhat.com/errata/RHSA-2021:3375
reference_id RHSA-2021:3375
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3375
21
reference_url https://access.redhat.com/errata/RHSA-2021:3380
reference_id RHSA-2021:3380
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3380
22
reference_url https://access.redhat.com/errata/RHSA-2021:3381
reference_id RHSA-2021:3381
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3381
23
reference_url https://access.redhat.com/errata/RHSA-2021:3392
reference_id RHSA-2021:3392
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3392
24
reference_url https://access.redhat.com/errata/RHSA-2021:3399
reference_id RHSA-2021:3399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3399
25
reference_url https://access.redhat.com/errata/RHSA-2021:3477
reference_id RHSA-2021:3477
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3477
26
reference_url https://access.redhat.com/errata/RHSA-2021:3522
reference_id RHSA-2021:3522
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3522
27
reference_url https://access.redhat.com/errata/RHSA-2021:3523
reference_id RHSA-2021:3523
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3523
28
reference_url https://access.redhat.com/errata/RHSA-2021:3725
reference_id RHSA-2021:3725
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3725
29
reference_url https://access.redhat.com/errata/RHSA-2022:0157
reference_id RHSA-2022:0157
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0157
30
reference_url https://usn.ubuntu.com/4997-1/
reference_id USN-4997-1
reference_type
scores
url https://usn.ubuntu.com/4997-1/
31
reference_url https://usn.ubuntu.com/4997-2/
reference_id USN-4997-2
reference_type
scores
url https://usn.ubuntu.com/4997-2/
32
reference_url https://usn.ubuntu.com/5000-1/
reference_id USN-5000-1
reference_type
scores
url https://usn.ubuntu.com/5000-1/
33
reference_url https://usn.ubuntu.com/5000-2/
reference_id USN-5000-2
reference_type
scores
url https://usn.ubuntu.com/5000-2/
34
reference_url https://usn.ubuntu.com/5001-1/
reference_id USN-5001-1
reference_type
scores
url https://usn.ubuntu.com/5001-1/
35
reference_url https://usn.ubuntu.com/5016-1/
reference_id USN-5016-1
reference_type
scores
url https://usn.ubuntu.com/5016-1/
36
reference_url https://usn.ubuntu.com/5018-1/
reference_id USN-5018-1
reference_type
scores
url https://usn.ubuntu.com/5018-1/
37
reference_url https://usn.ubuntu.com/5343-1/
reference_id USN-5343-1
reference_type
scores
url https://usn.ubuntu.com/5343-1/
fixed_packages
aliases CVE-2021-32399
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5b2a-5xzp-yqb9
2
url VCID-7mtw-85gb-vyfz
vulnerability_id VCID-7mtw-85gb-vyfz
summary
Multiple vulnerabilities have been found in systemd, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33910.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33910.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-33910
reference_id
reference_type
scores
0
value 0.00044
scoring_system epss
scoring_elements 0.13642
published_at 2026-04-04T12:55:00Z
1
value 0.00044
scoring_system epss
scoring_elements 0.13582
published_at 2026-04-02T12:55:00Z
2
value 0.00044
scoring_system epss
scoring_elements 0.13441
published_at 2026-04-21T12:55:00Z
3
value 0.00044
scoring_system epss
scoring_elements 0.13373
published_at 2026-04-16T12:55:00Z
4
value 0.00044
scoring_system epss
scoring_elements 0.1346
published_at 2026-04-13T12:55:00Z
5
value 0.00044
scoring_system epss
scoring_elements 0.13506
published_at 2026-04-12T12:55:00Z
6
value 0.00044
scoring_system epss
scoring_elements 0.13544
published_at 2026-04-11T12:55:00Z
7
value 0.00044
scoring_system epss
scoring_elements 0.13572
published_at 2026-04-09T12:55:00Z
8
value 0.00044
scoring_system epss
scoring_elements 0.13523
published_at 2026-04-08T12:55:00Z
9
value 0.00044
scoring_system epss
scoring_elements 0.13371
published_at 2026-04-18T12:55:00Z
10
value 0.00044
scoring_system epss
scoring_elements 0.13482
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-33910
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33910
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33910
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1970887
reference_id 1970887
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1970887
5
reference_url https://www.openwall.com/lists/oss-security/2021/07/20/2
reference_id 2
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:43:40Z/
url https://www.openwall.com/lists/oss-security/2021/07/20/2
6
reference_url http://www.openwall.com/lists/oss-security/2021/08/04/2
reference_id 2
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:43:40Z/
url http://www.openwall.com/lists/oss-security/2021/08/04/2
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2LSDMHAKI4LGFOCSPXNVVSEWQFAVFWR7/
reference_id 2LSDMHAKI4LGFOCSPXNVVSEWQFAVFWR7
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:43:40Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2LSDMHAKI4LGFOCSPXNVVSEWQFAVFWR7/
8
reference_url http://www.openwall.com/lists/oss-security/2021/08/17/3
reference_id 3
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:43:40Z/
url http://www.openwall.com/lists/oss-security/2021/08/17/3
9
reference_url http://www.openwall.com/lists/oss-security/2021/09/07/3
reference_id 3
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:43:40Z/
url http://www.openwall.com/lists/oss-security/2021/09/07/3
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
reference_id 42TMJVNYRY65B4QCJICBYOEIVZV3KUYI
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:43:40Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
11
reference_url https://github.com/systemd/systemd/pull/20256/commits/441e0115646d54f080e5c3bb0ba477c892861ab9
reference_id 441e0115646d54f080e5c3bb0ba477c892861ab9
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:43:40Z/
url https://github.com/systemd/systemd/pull/20256/commits/441e0115646d54f080e5c3bb0ba477c892861ab9
12
reference_url https://github.com/systemd/systemd-stable/commit/4a1c5f34bd3e1daed4490e9d97918e504d19733b
reference_id 4a1c5f34bd3e1daed4490e9d97918e504d19733b
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:43:40Z/
url https://github.com/systemd/systemd-stable/commit/4a1c5f34bd3e1daed4490e9d97918e504d19733b
13
reference_url https://github.com/systemd/systemd-stable/commit/764b74113e36ac5219a4b82a05f311b5a92136ce
reference_id 764b74113e36ac5219a4b82a05f311b5a92136ce
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:43:40Z/
url https://github.com/systemd/systemd-stable/commit/764b74113e36ac5219a4b82a05f311b5a92136ce
14
reference_url https://security.archlinux.org/ASA-202107-57
reference_id ASA-202107-57
reference_type
scores
url https://security.archlinux.org/ASA-202107-57
15
reference_url https://security.archlinux.org/AVG-2179
reference_id AVG-2179
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2179
16
reference_url https://github.com/systemd/systemd-stable/commit/b00674347337b7531c92fdb65590ab253bb57538
reference_id b00674347337b7531c92fdb65590ab253bb57538
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:43:40Z/
url https://github.com/systemd/systemd-stable/commit/b00674347337b7531c92fdb65590ab253bb57538
17
reference_url https://github.com/systemd/systemd/commit/b34a4f0e6729de292cb3b0c03c1d48f246ad896b
reference_id b34a4f0e6729de292cb3b0c03c1d48f246ad896b
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:43:40Z/
url https://github.com/systemd/systemd/commit/b34a4f0e6729de292cb3b0c03c1d48f246ad896b
18
reference_url https://github.com/systemd/systemd-stable/commit/cfd14c65374027b34dbbc4f0551456c5dc2d1f61
reference_id cfd14c65374027b34dbbc4f0551456c5dc2d1f61
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:43:40Z/
url https://github.com/systemd/systemd-stable/commit/cfd14c65374027b34dbbc4f0551456c5dc2d1f61
19
reference_url https://www.debian.org/security/2021/dsa-4942
reference_id dsa-4942
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:43:40Z/
url https://www.debian.org/security/2021/dsa-4942
20
reference_url https://security.gentoo.org/glsa/202107-48
reference_id GLSA-202107-48
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:43:40Z/
url https://security.gentoo.org/glsa/202107-48
21
reference_url https://security.netapp.com/advisory/ntap-20211104-0008/
reference_id ntap-20211104-0008
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:43:40Z/
url https://security.netapp.com/advisory/ntap-20211104-0008/
22
reference_url https://access.redhat.com/errata/RHSA-2021:2717
reference_id RHSA-2021:2717
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2717
23
reference_url https://access.redhat.com/errata/RHSA-2021:2721
reference_id RHSA-2021:2721
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2721
24
reference_url https://access.redhat.com/errata/RHSA-2021:2724
reference_id RHSA-2021:2724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2724
25
reference_url https://access.redhat.com/errata/RHSA-2021:2736
reference_id RHSA-2021:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2736
26
reference_url http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html
reference_id Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:43:40Z/
url http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html
27
reference_url https://usn.ubuntu.com/5013-1/
reference_id USN-5013-1
reference_type
scores
url https://usn.ubuntu.com/5013-1/
28
reference_url https://usn.ubuntu.com/5013-2/
reference_id USN-5013-2
reference_type
scores
url https://usn.ubuntu.com/5013-2/
fixed_packages
aliases CVE-2021-33910
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7mtw-85gb-vyfz
3
url VCID-rsry-fw45-9yev
vulnerability_id VCID-rsry-fw45-9yev
summary A flaw was found in several ansible modules, where parameters containing credentials, such as secrets, were being logged in plain-text on managed nodes, as well as being made visible on the controller node when run in verbose mode. These parameters were not protected by the no_log feature. An attacker can take advantage of this information to steal those credentials, provided when they have access to the log files containing them. The highest threat from this vulnerability is to data confidentiality. This flaw affects Red Hat Ansible Automation Platform in versions before 1.2.2 and Ansible Tower in versions before 3.8.2.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3447.json
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3447.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-3447
reference_id
reference_type
scores
0
value 0.00072
scoring_system epss
scoring_elements 0.21842
published_at 2026-04-01T12:55:00Z
1
value 0.00072
scoring_system epss
scoring_elements 0.2184
published_at 2026-04-21T12:55:00Z
2
value 0.00072
scoring_system epss
scoring_elements 0.21872
published_at 2026-04-16T12:55:00Z
3
value 0.00072
scoring_system epss
scoring_elements 0.21879
published_at 2026-04-18T12:55:00Z
4
value 0.00072
scoring_system epss
scoring_elements 0.22007
published_at 2026-04-02T12:55:00Z
5
value 0.00072
scoring_system epss
scoring_elements 0.22059
published_at 2026-04-04T12:55:00Z
6
value 0.00072
scoring_system epss
scoring_elements 0.21824
published_at 2026-04-07T12:55:00Z
7
value 0.00072
scoring_system epss
scoring_elements 0.21899
published_at 2026-04-08T12:55:00Z
8
value 0.00072
scoring_system epss
scoring_elements 0.21955
published_at 2026-04-09T12:55:00Z
9
value 0.00072
scoring_system epss
scoring_elements 0.21967
published_at 2026-04-11T12:55:00Z
10
value 0.00072
scoring_system epss
scoring_elements 0.21926
published_at 2026-04-12T12:55:00Z
11
value 0.00072
scoring_system epss
scoring_elements 0.2187
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-3447
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1939349
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1939349
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3447
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3447
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MS4VPUYVLGSAKOX26IT52BSMEZRZ3KS/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MS4VPUYVLGSAKOX26IT52BSMEZRZ3KS/
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JBZ75MAMVQVZROPYHMRDQKPPVASP63DG/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JBZ75MAMVQVZROPYHMRDQKPPVASP63DG/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RUTGO4RS4ZXZSPBU2CHVPT75IAFVTTL3/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RUTGO4RS4ZXZSPBU2CHVPT75IAFVTTL3/
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014721
reference_id 1014721
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014721
9
reference_url https://security.archlinux.org/AVG-1702
reference_id AVG-1702
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1702
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-3447
reference_id CVE-2021-3447
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2021-3447
11
reference_url https://access.redhat.com/errata/RHSA-2021:1079
reference_id RHSA-2021:1079
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1079
12
reference_url https://access.redhat.com/errata/RHSA-2021:1342
reference_id RHSA-2021:1342
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1342
13
reference_url https://access.redhat.com/errata/RHSA-2021:1343
reference_id RHSA-2021:1343
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1343
14
reference_url https://access.redhat.com/errata/RHSA-2021:2736
reference_id RHSA-2021:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2736
15
reference_url https://access.redhat.com/errata/RHSA-2021:2866
reference_id RHSA-2021:2866
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2866
fixed_packages
aliases CVE-2021-3447, PYSEC-2021-107
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rsry-fw45-9yev
4
url VCID-xj4j-n4mp-j3ba
vulnerability_id VCID-xj4j-n4mp-j3ba
summary kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33034.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33034.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-33034
reference_id
reference_type
scores
0
value 0.00134
scoring_system epss
scoring_elements 0.33033
published_at 2026-04-01T12:55:00Z
1
value 0.00134
scoring_system epss
scoring_elements 0.33022
published_at 2026-04-21T12:55:00Z
2
value 0.00134
scoring_system epss
scoring_elements 0.33104
published_at 2026-04-11T12:55:00Z
3
value 0.00134
scoring_system epss
scoring_elements 0.33066
published_at 2026-04-12T12:55:00Z
4
value 0.00134
scoring_system epss
scoring_elements 0.33042
published_at 2026-04-13T12:55:00Z
5
value 0.00134
scoring_system epss
scoring_elements 0.33083
published_at 2026-04-16T12:55:00Z
6
value 0.00134
scoring_system epss
scoring_elements 0.3306
published_at 2026-04-18T12:55:00Z
7
value 0.00134
scoring_system epss
scoring_elements 0.33164
published_at 2026-04-02T12:55:00Z
8
value 0.00134
scoring_system epss
scoring_elements 0.33197
published_at 2026-04-04T12:55:00Z
9
value 0.00134
scoring_system epss
scoring_elements 0.33027
published_at 2026-04-07T12:55:00Z
10
value 0.00134
scoring_system epss
scoring_elements 0.33071
published_at 2026-04-08T12:55:00Z
11
value 0.00134
scoring_system epss
scoring_elements 0.33102
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-33034
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33034
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33034
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1961305
reference_id 1961305
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1961305
5
reference_url https://security.archlinux.org/AVG-1958
reference_id AVG-1958
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1958
6
reference_url https://security.archlinux.org/AVG-1959
reference_id AVG-1959
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1959
7
reference_url https://security.archlinux.org/AVG-1960
reference_id AVG-1960
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1960
8
reference_url https://security.archlinux.org/AVG-1961
reference_id AVG-1961
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1961
9
reference_url https://access.redhat.com/errata/RHSA-2021:2563
reference_id RHSA-2021:2563
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2563
10
reference_url https://access.redhat.com/errata/RHSA-2021:2570
reference_id RHSA-2021:2570
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2570
11
reference_url https://access.redhat.com/errata/RHSA-2021:2599
reference_id RHSA-2021:2599
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2599
12
reference_url https://access.redhat.com/errata/RHSA-2021:2666
reference_id RHSA-2021:2666
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2666
13
reference_url https://access.redhat.com/errata/RHSA-2021:2668
reference_id RHSA-2021:2668
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2668
14
reference_url https://access.redhat.com/errata/RHSA-2021:2718
reference_id RHSA-2021:2718
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2718
15
reference_url https://access.redhat.com/errata/RHSA-2021:2719
reference_id RHSA-2021:2719
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2719
16
reference_url https://access.redhat.com/errata/RHSA-2021:2720
reference_id RHSA-2021:2720
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2720
17
reference_url https://access.redhat.com/errata/RHSA-2021:2725
reference_id RHSA-2021:2725
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2725
18
reference_url https://access.redhat.com/errata/RHSA-2021:2726
reference_id RHSA-2021:2726
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2726
19
reference_url https://access.redhat.com/errata/RHSA-2021:2727
reference_id RHSA-2021:2727
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2727
20
reference_url https://access.redhat.com/errata/RHSA-2021:2728
reference_id RHSA-2021:2728
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2728
21
reference_url https://access.redhat.com/errata/RHSA-2021:2729
reference_id RHSA-2021:2729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2729
22
reference_url https://access.redhat.com/errata/RHSA-2021:2730
reference_id RHSA-2021:2730
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2730
23
reference_url https://access.redhat.com/errata/RHSA-2021:2731
reference_id RHSA-2021:2731
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2731
24
reference_url https://access.redhat.com/errata/RHSA-2021:2732
reference_id RHSA-2021:2732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2732
25
reference_url https://access.redhat.com/errata/RHSA-2021:2733
reference_id RHSA-2021:2733
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2733
26
reference_url https://access.redhat.com/errata/RHSA-2021:2734
reference_id RHSA-2021:2734
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2734
27
reference_url https://access.redhat.com/errata/RHSA-2021:2736
reference_id RHSA-2021:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2736
28
reference_url https://access.redhat.com/errata/RHSA-2021:2737
reference_id RHSA-2021:2737
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2737
29
reference_url https://usn.ubuntu.com/4997-1/
reference_id USN-4997-1
reference_type
scores
url https://usn.ubuntu.com/4997-1/
30
reference_url https://usn.ubuntu.com/4997-2/
reference_id USN-4997-2
reference_type
scores
url https://usn.ubuntu.com/4997-2/
31
reference_url https://usn.ubuntu.com/5000-1/
reference_id USN-5000-1
reference_type
scores
url https://usn.ubuntu.com/5000-1/
32
reference_url https://usn.ubuntu.com/5000-2/
reference_id USN-5000-2
reference_type
scores
url https://usn.ubuntu.com/5000-2/
33
reference_url https://usn.ubuntu.com/5001-1/
reference_id USN-5001-1
reference_type
scores
url https://usn.ubuntu.com/5001-1/
34
reference_url https://usn.ubuntu.com/5016-1/
reference_id USN-5016-1
reference_type
scores
url https://usn.ubuntu.com/5016-1/
35
reference_url https://usn.ubuntu.com/5018-1/
reference_id USN-5018-1
reference_type
scores
url https://usn.ubuntu.com/5018-1/
36
reference_url https://usn.ubuntu.com/5299-1/
reference_id USN-5299-1
reference_type
scores
url https://usn.ubuntu.com/5299-1/
37
reference_url https://usn.ubuntu.com/5343-1/
reference_id USN-5343-1
reference_type
scores
url https://usn.ubuntu.com/5343-1/
fixed_packages
aliases CVE-2021-33034
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xj4j-n4mp-j3ba
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/redhat-virtualization-host@4.4.7-20210715.1%3Farch=el8_4