Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/100231?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/100231?format=api", "purl": "pkg:rpm/redhat/redhat-virtualization-host@4.4.7-20210715.1?arch=el8_4", "type": "rpm", "namespace": "redhat", "name": "redhat-virtualization-host", "version": "4.4.7-20210715.1", "qualifiers": { "arch": "el8_4" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80136?format=api", "vulnerability_id": "VCID-142d-1ac5-5qdk", "summary": "kernel: size_t-to-int conversion vulnerability in the filesystem layer", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33909.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33909.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-33909", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02223", "scoring_system": "epss", "scoring_elements": "0.84438", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02223", "scoring_system": "epss", "scoring_elements": "0.84569", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02223", "scoring_system": "epss", "scoring_elements": "0.84516", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02223", "scoring_system": "epss", "scoring_elements": "0.84511", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02223", "scoring_system": "epss", "scoring_elements": "0.84532", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02223", "scoring_system": "epss", "scoring_elements": "0.84534", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02223", "scoring_system": "epss", "scoring_elements": "0.8456", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02223", "scoring_system": "epss", "scoring_elements": "0.84454", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02223", "scoring_system": "epss", "scoring_elements": "0.84473", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02223", "scoring_system": "epss", "scoring_elements": "0.84475", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02223", "scoring_system": "epss", "scoring_elements": "0.84497", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02223", "scoring_system": "epss", "scoring_elements": "0.84502", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02223", "scoring_system": "epss", "scoring_elements": "0.84521", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-33909" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36311", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36311" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33909", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33909" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34693", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34693" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3609", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3609" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273", "reference_id": "1970273", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970273" }, { "reference_url": "https://security.archlinux.org/ASA-202107-48", "reference_id": "ASA-202107-48", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202107-48" }, { "reference_url": "https://security.archlinux.org/ASA-202107-49", "reference_id": "ASA-202107-49", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202107-49" }, { "reference_url": "https://security.archlinux.org/ASA-202107-50", "reference_id": "ASA-202107-50", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202107-50" }, { "reference_url": "https://security.archlinux.org/ASA-202107-51", "reference_id": "ASA-202107-51", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202107-51" }, { "reference_url": "https://security.archlinux.org/AVG-2181", "reference_id": "AVG-2181", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2181" }, { "reference_url": "https://security.archlinux.org/AVG-2182", "reference_id": "AVG-2182", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2182" }, { "reference_url": "https://security.archlinux.org/AVG-2183", "reference_id": "AVG-2183", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2183" }, { "reference_url": "https://security.archlinux.org/AVG-2184", "reference_id": "AVG-2184", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2184" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2714", "reference_id": "RHSA-2021:2714", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2714" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2715", "reference_id": "RHSA-2021:2715", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2715" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2716", "reference_id": "RHSA-2021:2716", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2716" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2718", "reference_id": "RHSA-2021:2718", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2718" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2719", "reference_id": "RHSA-2021:2719", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2719" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2720", "reference_id": "RHSA-2021:2720", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2720" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2722", "reference_id": "RHSA-2021:2722", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2722" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2723", "reference_id": "RHSA-2021:2723", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2723" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2725", "reference_id": "RHSA-2021:2725", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2725" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2726", "reference_id": "RHSA-2021:2726", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2726" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2727", "reference_id": "RHSA-2021:2727", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2727" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2728", "reference_id": "RHSA-2021:2728", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2728" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2729", "reference_id": "RHSA-2021:2729", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2729" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2730", "reference_id": "RHSA-2021:2730", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2730" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2731", "reference_id": "RHSA-2021:2731", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2731" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2732", "reference_id": "RHSA-2021:2732", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2732" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2733", "reference_id": "RHSA-2021:2733", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2733" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2734", "reference_id": "RHSA-2021:2734", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2734" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2735", "reference_id": "RHSA-2021:2735", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2735" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2736", "reference_id": "RHSA-2021:2736", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2736" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2737", "reference_id": "RHSA-2021:2737", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2737" }, { "reference_url": "https://usn.ubuntu.com/5014-1/", "reference_id": "USN-5014-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5014-1/" }, { "reference_url": "https://usn.ubuntu.com/5015-1/", "reference_id": "USN-5015-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5015-1/" }, { "reference_url": "https://usn.ubuntu.com/5016-1/", "reference_id": "USN-5016-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5016-1/" }, { "reference_url": "https://usn.ubuntu.com/5017-1/", "reference_id": "USN-5017-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5017-1/" }, { "reference_url": "https://usn.ubuntu.com/5018-1/", "reference_id": "USN-5018-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5018-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-33909" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-142d-1ac5-5qdk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80305?format=api", "vulnerability_id": "VCID-5b2a-5xzp-yqb9", "summary": "kernel: race condition for removal of the HCI controller", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-32399.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-32399.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-32399", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19799", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19648", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.1977", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19744", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19746", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19759", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19654", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19945", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.20003", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.1973", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.1981", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19862", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19872", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19827", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-32399" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32399", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32399" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807", "reference_id": "1970807", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970807" }, { "reference_url": "https://security.archlinux.org/AVG-1958", "reference_id": "AVG-1958", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1958" }, { "reference_url": "https://security.archlinux.org/AVG-1959", "reference_id": "AVG-1959", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1959" }, { "reference_url": "https://security.archlinux.org/AVG-1960", "reference_id": "AVG-1960", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1960" }, { "reference_url": "https://security.archlinux.org/AVG-1961", "reference_id": "AVG-1961", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1961" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2714", "reference_id": "RHSA-2021:2714", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2714" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2715", "reference_id": "RHSA-2021:2715", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2715" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2716", "reference_id": "RHSA-2021:2716", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2716" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2736", "reference_id": "RHSA-2021:2736", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2736" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3173", "reference_id": "RHSA-2021:3173", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3173" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3181", "reference_id": "RHSA-2021:3181", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3181" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3320", "reference_id": "RHSA-2021:3320", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3320" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3321", "reference_id": "RHSA-2021:3321", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3321" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3327", "reference_id": "RHSA-2021:3327", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3327" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3328", "reference_id": "RHSA-2021:3328", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3328" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3363", "reference_id": "RHSA-2021:3363", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3363" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3375", "reference_id": "RHSA-2021:3375", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3375" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3380", "reference_id": "RHSA-2021:3380", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3380" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3381", "reference_id": "RHSA-2021:3381", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3381" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3392", "reference_id": "RHSA-2021:3392", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3392" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3399", "reference_id": "RHSA-2021:3399", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3399" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3477", "reference_id": "RHSA-2021:3477", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3477" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3522", "reference_id": "RHSA-2021:3522", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3522" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3523", "reference_id": "RHSA-2021:3523", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3523" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3725", "reference_id": "RHSA-2021:3725", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3725" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0157", "reference_id": "RHSA-2022:0157", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0157" }, { "reference_url": "https://usn.ubuntu.com/4997-1/", "reference_id": "USN-4997-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4997-1/" }, { "reference_url": "https://usn.ubuntu.com/4997-2/", "reference_id": "USN-4997-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4997-2/" }, { "reference_url": "https://usn.ubuntu.com/5000-1/", "reference_id": "USN-5000-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5000-1/" }, { "reference_url": "https://usn.ubuntu.com/5000-2/", "reference_id": "USN-5000-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5000-2/" }, { "reference_url": "https://usn.ubuntu.com/5001-1/", "reference_id": "USN-5001-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5001-1/" }, { "reference_url": "https://usn.ubuntu.com/5016-1/", "reference_id": "USN-5016-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5016-1/" }, { "reference_url": "https://usn.ubuntu.com/5018-1/", "reference_id": "USN-5018-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5018-1/" }, { "reference_url": "https://usn.ubuntu.com/5343-1/", "reference_id": "USN-5343-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5343-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-32399" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5b2a-5xzp-yqb9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46533?format=api", "vulnerability_id": "VCID-7mtw-85gb-vyfz", "summary": "Multiple vulnerabilities have been found in systemd, the worst of\n which could result in a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33910.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33910.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-33910", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13642", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13582", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13441", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13447", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13371", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13373", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.1346", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13506", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13544", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13572", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13523", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13482", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13418", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-33910" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33910", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33910" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970887", "reference_id": "1970887", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970887" }, { "reference_url": "https://www.openwall.com/lists/oss-security/2021/07/20/2", "reference_id": "2", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:43:40Z/" } ], "url": "https://www.openwall.com/lists/oss-security/2021/07/20/2" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2021/08/04/2", "reference_id": "2", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:43:40Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2021/08/04/2" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2LSDMHAKI4LGFOCSPXNVVSEWQFAVFWR7/", "reference_id": "2LSDMHAKI4LGFOCSPXNVVSEWQFAVFWR7", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:43:40Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2LSDMHAKI4LGFOCSPXNVVSEWQFAVFWR7/" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2021/08/17/3", "reference_id": "3", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:43:40Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2021/08/17/3" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2021/09/07/3", "reference_id": "3", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:43:40Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2021/09/07/3" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/", "reference_id": "42TMJVNYRY65B4QCJICBYOEIVZV3KUYI", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:43:40Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/" }, { "reference_url": "https://github.com/systemd/systemd/pull/20256/commits/441e0115646d54f080e5c3bb0ba477c892861ab9", "reference_id": "441e0115646d54f080e5c3bb0ba477c892861ab9", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:43:40Z/" } ], "url": "https://github.com/systemd/systemd/pull/20256/commits/441e0115646d54f080e5c3bb0ba477c892861ab9" }, { "reference_url": "https://github.com/systemd/systemd-stable/commit/4a1c5f34bd3e1daed4490e9d97918e504d19733b", "reference_id": "4a1c5f34bd3e1daed4490e9d97918e504d19733b", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:43:40Z/" } ], "url": "https://github.com/systemd/systemd-stable/commit/4a1c5f34bd3e1daed4490e9d97918e504d19733b" }, { "reference_url": "https://github.com/systemd/systemd-stable/commit/764b74113e36ac5219a4b82a05f311b5a92136ce", "reference_id": "764b74113e36ac5219a4b82a05f311b5a92136ce", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:43:40Z/" } ], "url": "https://github.com/systemd/systemd-stable/commit/764b74113e36ac5219a4b82a05f311b5a92136ce" }, { "reference_url": "https://security.archlinux.org/ASA-202107-57", "reference_id": "ASA-202107-57", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202107-57" }, { "reference_url": "https://security.archlinux.org/AVG-2179", "reference_id": "AVG-2179", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2179" }, { "reference_url": "https://github.com/systemd/systemd-stable/commit/b00674347337b7531c92fdb65590ab253bb57538", "reference_id": "b00674347337b7531c92fdb65590ab253bb57538", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:43:40Z/" } ], "url": "https://github.com/systemd/systemd-stable/commit/b00674347337b7531c92fdb65590ab253bb57538" }, { "reference_url": "https://github.com/systemd/systemd/commit/b34a4f0e6729de292cb3b0c03c1d48f246ad896b", "reference_id": "b34a4f0e6729de292cb3b0c03c1d48f246ad896b", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:43:40Z/" } ], "url": "https://github.com/systemd/systemd/commit/b34a4f0e6729de292cb3b0c03c1d48f246ad896b" }, { "reference_url": "https://github.com/systemd/systemd-stable/commit/cfd14c65374027b34dbbc4f0551456c5dc2d1f61", "reference_id": "cfd14c65374027b34dbbc4f0551456c5dc2d1f61", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:43:40Z/" } ], "url": "https://github.com/systemd/systemd-stable/commit/cfd14c65374027b34dbbc4f0551456c5dc2d1f61" }, { "reference_url": "https://www.debian.org/security/2021/dsa-4942", "reference_id": "dsa-4942", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:43:40Z/" } ], "url": "https://www.debian.org/security/2021/dsa-4942" }, { "reference_url": "https://security.gentoo.org/glsa/202107-48", "reference_id": "GLSA-202107-48", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:43:40Z/" } ], "url": "https://security.gentoo.org/glsa/202107-48" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20211104-0008/", "reference_id": "ntap-20211104-0008", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:43:40Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20211104-0008/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2717", "reference_id": "RHSA-2021:2717", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2717" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2721", "reference_id": "RHSA-2021:2721", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2721" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2724", "reference_id": "RHSA-2021:2724", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2724" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2736", "reference_id": "RHSA-2021:2736", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2736" }, { "reference_url": "http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html", "reference_id": "Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:43:40Z/" } ], "url": "http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html" }, { "reference_url": "https://usn.ubuntu.com/5013-1/", "reference_id": "USN-5013-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5013-1/" }, { "reference_url": "https://usn.ubuntu.com/5013-2/", "reference_id": "USN-5013-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5013-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-33910" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7mtw-85gb-vyfz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/6304?format=api", "vulnerability_id": "VCID-rsry-fw45-9yev", "summary": "A flaw was found in several ansible modules, where parameters containing credentials, such as secrets, were being logged in plain-text on managed nodes, as well as being made visible on the controller node when run in verbose mode. These parameters were not protected by the no_log feature. An attacker can take advantage of this information to steal those credentials, provided when they have access to the log files containing them. The highest threat from this vulnerability is to data confidentiality. This flaw affects Red Hat Ansible Automation Platform in versions before 1.2.2 and Ansible Tower in versions before 3.8.2.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3447.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3447.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3447", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.21842", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.21686", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.2184", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.21693", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.22007", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.22059", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.21824", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.21899", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.21955", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.21967", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.21926", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.2187", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.21872", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.21879", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3447" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1939349", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1939349" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3447", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3447" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MS4VPUYVLGSAKOX26IT52BSMEZRZ3KS/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MS4VPUYVLGSAKOX26IT52BSMEZRZ3KS/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JBZ75MAMVQVZROPYHMRDQKPPVASP63DG/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JBZ75MAMVQVZROPYHMRDQKPPVASP63DG/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RUTGO4RS4ZXZSPBU2CHVPT75IAFVTTL3/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RUTGO4RS4ZXZSPBU2CHVPT75IAFVTTL3/" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014721", "reference_id": "1014721", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014721" }, { "reference_url": "https://security.archlinux.org/AVG-1702", "reference_id": "AVG-1702", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1702" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3447", "reference_id": "CVE-2021-3447", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3447" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1079", "reference_id": "RHSA-2021:1079", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1079" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1342", "reference_id": "RHSA-2021:1342", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1342" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1343", "reference_id": "RHSA-2021:1343", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1343" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2736", "reference_id": "RHSA-2021:2736", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2736" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2866", "reference_id": "RHSA-2021:2866", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2866" } ], "fixed_packages": [], "aliases": [ "CVE-2021-3447", "PYSEC-2021-107" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rsry-fw45-9yev" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80494?format=api", "vulnerability_id": "VCID-xj4j-n4mp-j3ba", "summary": "kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33034.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33034.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-33034", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.33033", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32856", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.33042", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.33083", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.3306", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.33022", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.32874", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.33164", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.33197", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.33027", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.33071", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.33102", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.33104", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.33066", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-33034" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33034", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33034" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305", "reference_id": "1961305", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961305" }, { "reference_url": "https://security.archlinux.org/AVG-1958", "reference_id": "AVG-1958", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1958" }, { "reference_url": "https://security.archlinux.org/AVG-1959", "reference_id": "AVG-1959", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1959" }, { "reference_url": "https://security.archlinux.org/AVG-1960", "reference_id": "AVG-1960", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1960" }, { "reference_url": "https://security.archlinux.org/AVG-1961", "reference_id": "AVG-1961", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1961" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2563", "reference_id": "RHSA-2021:2563", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2563" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2570", "reference_id": "RHSA-2021:2570", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2570" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2599", "reference_id": "RHSA-2021:2599", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2599" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2666", "reference_id": "RHSA-2021:2666", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2666" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2668", "reference_id": "RHSA-2021:2668", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2668" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2718", "reference_id": "RHSA-2021:2718", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2718" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2719", "reference_id": "RHSA-2021:2719", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2719" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2720", "reference_id": "RHSA-2021:2720", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2720" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2725", "reference_id": "RHSA-2021:2725", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2725" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2726", "reference_id": "RHSA-2021:2726", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2726" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2727", "reference_id": "RHSA-2021:2727", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2727" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2728", "reference_id": "RHSA-2021:2728", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2728" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2729", "reference_id": "RHSA-2021:2729", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2729" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2730", "reference_id": "RHSA-2021:2730", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2730" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2731", "reference_id": "RHSA-2021:2731", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2731" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2732", "reference_id": "RHSA-2021:2732", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2732" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2733", "reference_id": "RHSA-2021:2733", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2733" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2734", "reference_id": "RHSA-2021:2734", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2734" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2736", "reference_id": "RHSA-2021:2736", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2736" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2737", "reference_id": "RHSA-2021:2737", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2737" }, { "reference_url": "https://usn.ubuntu.com/4997-1/", "reference_id": "USN-4997-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4997-1/" }, { "reference_url": "https://usn.ubuntu.com/4997-2/", "reference_id": "USN-4997-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4997-2/" }, { "reference_url": "https://usn.ubuntu.com/5000-1/", "reference_id": "USN-5000-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5000-1/" }, { "reference_url": "https://usn.ubuntu.com/5000-2/", "reference_id": "USN-5000-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5000-2/" }, { "reference_url": "https://usn.ubuntu.com/5001-1/", "reference_id": "USN-5001-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5001-1/" }, { "reference_url": "https://usn.ubuntu.com/5016-1/", "reference_id": "USN-5016-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5016-1/" }, { "reference_url": "https://usn.ubuntu.com/5018-1/", "reference_id": "USN-5018-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5018-1/" }, { "reference_url": "https://usn.ubuntu.com/5299-1/", "reference_id": "USN-5299-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5299-1/" }, { "reference_url": "https://usn.ubuntu.com/5343-1/", "reference_id": "USN-5343-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5343-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-33034" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xj4j-n4mp-j3ba" } ], "fixing_vulnerabilities": [], "risk_score": "4.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/redhat-virtualization-host@4.4.7-20210715.1%3Farch=el8_4" }