Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/372217?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/372217?format=api", "purl": "pkg:alpm/archlinux/virtualbox@6.1.16-4", "type": "alpm", "namespace": "archlinux", "name": "virtualbox", "version": "6.1.16-4", "qualifiers": {}, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": "6.1.18-1", "latest_non_vulnerable_version": "6.1.28-1", "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37838?format=api", "vulnerability_id": "VCID-1f3h-ez88-fudr", "summary": "Multiple vulnerabilities have been found in VirtualBox, the worst\n of which could result in privilege escalation.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2074", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.3759", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37652", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37624", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37671", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37653", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37522", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37704", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37729", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37608", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37659", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37673", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37687", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2074" }, { "reference_url": "https://security.archlinux.org/ASA-202101-37", "reference_id": "ASA-202101-37", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202101-37" }, { "reference_url": "https://security.archlinux.org/AVG-1483", "reference_id": "AVG-1483", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1483" }, { "reference_url": "https://security.gentoo.org/glsa/202101-15", "reference_id": "GLSA-202101-15", "reference_type": "", "scores": [ { "value": "8.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T18:11:44Z/" } ], "url": "https://security.gentoo.org/glsa/202101-15" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/372218?format=api", "purl": "pkg:alpm/archlinux/virtualbox@6.1.18-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/virtualbox@6.1.18-1" } ], "aliases": [ "CVE-2021-2074" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1f3h-ez88-fudr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37886?format=api", "vulnerability_id": "VCID-2a63-hzam-z7h7", "summary": "Multiple vulnerabilities have been found in VirtualBox, the worst\n of which could result in privilege escalation.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2125", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.30962", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.31028", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.30983", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.31013", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.30995", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.3099", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.31114", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.31161", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.3098", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.31037", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.31066", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.31072", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2125" }, { "reference_url": "https://security.archlinux.org/ASA-202101-37", "reference_id": "ASA-202101-37", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202101-37" }, { "reference_url": "https://security.archlinux.org/AVG-1483", "reference_id": "AVG-1483", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1483" }, { "reference_url": "https://security.gentoo.org/glsa/202101-15", "reference_id": "GLSA-202101-15", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:53:17Z/" } ], "url": "https://security.gentoo.org/glsa/202101-15" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/372218?format=api", "purl": "pkg:alpm/archlinux/virtualbox@6.1.18-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/virtualbox@6.1.18-1" } ], "aliases": [ "CVE-2021-2125" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2a63-hzam-z7h7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37898?format=api", "vulnerability_id": "VCID-2hdx-s4fs-wua5", "summary": "Multiple vulnerabilities have been found in VirtualBox, the worst\n of which could result in privilege escalation.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2128", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.37807", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.37868", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.37843", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.3789", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.3787", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.3774", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.37923", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.37948", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.37826", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.37876", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.37889", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00167", "scoring_system": "epss", "scoring_elements": "0.37904", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2128" }, { "reference_url": "https://security.archlinux.org/ASA-202101-37", "reference_id": "ASA-202101-37", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202101-37" }, { "reference_url": "https://security.archlinux.org/AVG-1483", "reference_id": "AVG-1483", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1483" }, { "reference_url": "https://security.gentoo.org/glsa/202101-15", "reference_id": "GLSA-202101-15", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:53:12Z/" } ], "url": "https://security.gentoo.org/glsa/202101-15" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/372218?format=api", "purl": "pkg:alpm/archlinux/virtualbox@6.1.18-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/virtualbox@6.1.18-1" } ], "aliases": [ "CVE-2021-2128" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2hdx-s4fs-wua5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37853?format=api", "vulnerability_id": "VCID-4txk-ybs5-ukea", "summary": "Multiple vulnerabilities have been found in VirtualBox, the worst\n of which could result in privilege escalation.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2112", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37026", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37083", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37055", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37101", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37084", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37007", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37183", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37212", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37043", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37094", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37106", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37117", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2112" }, { "reference_url": "https://security.archlinux.org/ASA-202101-37", "reference_id": "ASA-202101-37", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202101-37" }, { "reference_url": "https://security.archlinux.org/AVG-1483", "reference_id": "AVG-1483", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1483" }, { "reference_url": "https://security.gentoo.org/glsa/202101-15", "reference_id": "GLSA-202101-15", "reference_type": "", "scores": [ { "value": "6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:53:38Z/" } ], "url": "https://security.gentoo.org/glsa/202101-15" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/372218?format=api", "purl": "pkg:alpm/archlinux/virtualbox@6.1.18-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/virtualbox@6.1.18-1" } ], "aliases": [ "CVE-2021-2112" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4txk-ybs5-ukea" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37913?format=api", "vulnerability_id": "VCID-6e2r-qhmm-t7ca", "summary": "Multiple vulnerabilities have been found in VirtualBox, the worst\n of which could result in privilege escalation.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2131", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00305", "scoring_system": "epss", "scoring_elements": "0.53799", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00305", "scoring_system": "epss", "scoring_elements": "0.53792", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00305", "scoring_system": "epss", "scoring_elements": "0.53777", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00305", "scoring_system": "epss", "scoring_elements": "0.53814", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00305", "scoring_system": "epss", "scoring_elements": "0.53818", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00305", "scoring_system": "epss", "scoring_elements": "0.53691", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00305", "scoring_system": "epss", "scoring_elements": "0.53711", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00305", "scoring_system": "epss", "scoring_elements": "0.53738", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00305", "scoring_system": "epss", "scoring_elements": "0.53763", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00305", "scoring_system": "epss", "scoring_elements": "0.53761", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00305", "scoring_system": "epss", "scoring_elements": "0.53809", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2131" }, { "reference_url": "https://security.archlinux.org/ASA-202101-37", "reference_id": "ASA-202101-37", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202101-37" }, { "reference_url": "https://security.archlinux.org/AVG-1483", "reference_id": "AVG-1483", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1483" }, { "reference_url": "https://security.gentoo.org/glsa/202101-15", "reference_id": "GLSA-202101-15", "reference_type": "", "scores": [ { "value": "6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:53:10Z/" } ], "url": "https://security.gentoo.org/glsa/202101-15" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/372218?format=api", "purl": "pkg:alpm/archlinux/virtualbox@6.1.18-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/virtualbox@6.1.18-1" } ], "aliases": [ "CVE-2021-2131" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6e2r-qhmm-t7ca" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37863?format=api", "vulnerability_id": "VCID-7agu-g9dg-b3d6", "summary": "Multiple vulnerabilities have been found in VirtualBox, the worst\n of which could result in privilege escalation.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2120", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00158", "scoring_system": "epss", "scoring_elements": "0.36556", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00158", "scoring_system": "epss", "scoring_elements": "0.36612", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00158", "scoring_system": "epss", "scoring_elements": "0.36588", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00158", "scoring_system": "epss", "scoring_elements": "0.36634", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00158", "scoring_system": "epss", "scoring_elements": "0.36616", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00158", "scoring_system": "epss", "scoring_elements": "0.36527", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00158", "scoring_system": "epss", "scoring_elements": "0.36699", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00158", "scoring_system": "epss", "scoring_elements": "0.3673", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00158", "scoring_system": "epss", "scoring_elements": "0.36568", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00158", "scoring_system": "epss", "scoring_elements": "0.3662", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00158", "scoring_system": "epss", "scoring_elements": "0.36639", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00158", "scoring_system": "epss", "scoring_elements": "0.36646", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2120" }, { "reference_url": "https://security.archlinux.org/ASA-202101-37", "reference_id": "ASA-202101-37", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202101-37" }, { "reference_url": "https://security.archlinux.org/AVG-1483", "reference_id": "AVG-1483", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1483" }, { "reference_url": "https://security.gentoo.org/glsa/202101-15", "reference_id": "GLSA-202101-15", "reference_type": "", "scores": [ { "value": "6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:53:27Z/" } ], "url": "https://security.gentoo.org/glsa/202101-15" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/372218?format=api", "purl": "pkg:alpm/archlinux/virtualbox@6.1.18-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/virtualbox@6.1.18-1" } ], "aliases": [ "CVE-2021-2120" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7agu-g9dg-b3d6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37860?format=api", "vulnerability_id": "VCID-bgsu-2ev5-yubb", "summary": "Multiple vulnerabilities have been found in VirtualBox, the worst\n of which could result in privilege escalation.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2119", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03803", "scoring_system": "epss", "scoring_elements": "0.88104", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03803", "scoring_system": "epss", "scoring_elements": "0.88083", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03803", "scoring_system": "epss", "scoring_elements": "0.88089", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03803", "scoring_system": "epss", "scoring_elements": "0.88099", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03803", "scoring_system": "epss", "scoring_elements": "0.88092", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03803", "scoring_system": "epss", "scoring_elements": "0.88093", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03803", "scoring_system": "epss", "scoring_elements": "0.88106", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03803", "scoring_system": "epss", "scoring_elements": "0.88035", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03803", "scoring_system": "epss", "scoring_elements": "0.88045", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03803", "scoring_system": "epss", "scoring_elements": "0.88058", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03803", "scoring_system": "epss", "scoring_elements": "0.88064", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2119" }, { "reference_url": "https://security.archlinux.org/ASA-202101-37", "reference_id": "ASA-202101-37", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202101-37" }, { "reference_url": "https://security.archlinux.org/AVG-1483", "reference_id": "AVG-1483", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1483" }, { "reference_url": "https://security.gentoo.org/glsa/202101-15", "reference_id": "GLSA-202101-15", "reference_type": "", "scores": [ { "value": "6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:53:29Z/" } ], "url": "https://security.gentoo.org/glsa/202101-15" }, { "reference_url": "https://security.gentoo.org/glsa/202104-08", "reference_id": "GLSA-202104-08", "reference_type": "", "scores": [ { "value": "6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:53:29Z/" } ], "url": "https://security.gentoo.org/glsa/202104-08" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/372218?format=api", "purl": "pkg:alpm/archlinux/virtualbox@6.1.18-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/virtualbox@6.1.18-1" } ], "aliases": [ "CVE-2021-2119" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bgsu-2ev5-yubb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37849?format=api", "vulnerability_id": "VCID-cm69-aycs-kfh2", "summary": "Multiple vulnerabilities have been found in VirtualBox, the worst\n of which could result in privilege escalation.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2111", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37026", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37083", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37055", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37101", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37084", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37007", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37183", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37212", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37043", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37094", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37106", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37117", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2111" }, { "reference_url": "https://security.archlinux.org/ASA-202101-37", "reference_id": "ASA-202101-37", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202101-37" }, { "reference_url": "https://security.archlinux.org/AVG-1483", "reference_id": "AVG-1483", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1483" }, { "reference_url": "https://security.gentoo.org/glsa/202101-15", "reference_id": "GLSA-202101-15", "reference_type": "", "scores": [ { "value": "6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:53:41Z/" } ], "url": "https://security.gentoo.org/glsa/202101-15" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/372218?format=api", "purl": "pkg:alpm/archlinux/virtualbox@6.1.18-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/virtualbox@6.1.18-1" } ], "aliases": [ "CVE-2021-2111" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cm69-aycs-kfh2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37890?format=api", "vulnerability_id": "VCID-ejgu-35ae-7ydr", "summary": "Multiple vulnerabilities have been found in VirtualBox, the worst\n of which could result in privilege escalation.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2126", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00154", "scoring_system": "epss", "scoring_elements": "0.36038", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00154", "scoring_system": "epss", "scoring_elements": "0.3609", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00154", "scoring_system": "epss", "scoring_elements": "0.36064", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00154", "scoring_system": "epss", "scoring_elements": "0.36105", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00154", "scoring_system": "epss", "scoring_elements": "0.36091", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00154", "scoring_system": "epss", "scoring_elements": "0.35995", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00154", "scoring_system": "epss", "scoring_elements": "0.36189", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00154", "scoring_system": "epss", "scoring_elements": "0.36219", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00154", "scoring_system": "epss", "scoring_elements": "0.36054", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00154", "scoring_system": "epss", "scoring_elements": "0.36104", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00154", "scoring_system": "epss", "scoring_elements": "0.36122", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00154", "scoring_system": "epss", "scoring_elements": "0.36129", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2126" }, { "reference_url": "https://security.archlinux.org/ASA-202101-37", "reference_id": "ASA-202101-37", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202101-37" }, { "reference_url": "https://security.archlinux.org/AVG-1483", "reference_id": "AVG-1483", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1483" }, { "reference_url": "https://security.gentoo.org/glsa/202101-15", "reference_id": "GLSA-202101-15", "reference_type": "", "scores": [ { "value": "6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:53:15Z/" } ], "url": "https://security.gentoo.org/glsa/202101-15" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/372218?format=api", "purl": "pkg:alpm/archlinux/virtualbox@6.1.18-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/virtualbox@6.1.18-1" } ], "aliases": [ "CVE-2021-2126" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ejgu-35ae-7ydr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37868?format=api", "vulnerability_id": "VCID-p2kk-dt57-r7ap", "summary": "Multiple vulnerabilities have been found in VirtualBox, the worst\n of which could result in privilege escalation.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2121", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37724", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37782", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37756", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37804", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37784", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37654", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37835", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37861", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37739", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.3779", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37803", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37817", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2121" }, { "reference_url": "https://security.archlinux.org/ASA-202101-37", "reference_id": "ASA-202101-37", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202101-37" }, { "reference_url": "https://security.archlinux.org/AVG-1483", "reference_id": "AVG-1483", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1483" }, { "reference_url": "https://security.gentoo.org/glsa/202101-15", "reference_id": "GLSA-202101-15", "reference_type": "", "scores": [ { "value": "6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:53:24Z/" } ], "url": "https://security.gentoo.org/glsa/202101-15" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/372218?format=api", "purl": "pkg:alpm/archlinux/virtualbox@6.1.18-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/virtualbox@6.1.18-1" } ], "aliases": [ "CVE-2021-2121" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p2kk-dt57-r7ap" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37842?format=api", "vulnerability_id": "VCID-q5ca-n4hk-r3fj", "summary": "Multiple vulnerabilities have been found in VirtualBox, the worst\n of which could result in privilege escalation.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2086", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40509", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40589", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.4057", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40617", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40587", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40518", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40599", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40626", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40548", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40609", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40627", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2086" }, { "reference_url": "https://security.archlinux.org/ASA-202101-37", "reference_id": "ASA-202101-37", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202101-37" }, { "reference_url": "https://security.archlinux.org/AVG-1483", "reference_id": "AVG-1483", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1483" }, { "reference_url": "https://security.gentoo.org/glsa/202101-15", "reference_id": "GLSA-202101-15", "reference_type": "", "scores": [ { "value": "6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:18Z/" } ], "url": "https://security.gentoo.org/glsa/202101-15" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/372218?format=api", "purl": "pkg:alpm/archlinux/virtualbox@6.1.18-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/virtualbox@6.1.18-1" } ], "aliases": [ "CVE-2021-2086" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q5ca-n4hk-r3fj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37875?format=api", "vulnerability_id": "VCID-qzab-crkk-zfba", "summary": "Multiple vulnerabilities have been found in VirtualBox, the worst\n of which could result in privilege escalation.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2123", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14782", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14878", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14819", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14715", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14722", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14882", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.1493", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.15007", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14812", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14901", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14951", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14916", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2123" }, { "reference_url": "https://security.archlinux.org/ASA-202101-37", "reference_id": "ASA-202101-37", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202101-37" }, { "reference_url": "https://security.archlinux.org/AVG-1483", "reference_id": "AVG-1483", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1483" }, { "reference_url": "https://security.gentoo.org/glsa/202101-15", "reference_id": "GLSA-202101-15", "reference_type": "", "scores": [ { "value": "3.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:53:20Z/" } ], "url": "https://security.gentoo.org/glsa/202101-15" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/372218?format=api", "purl": "pkg:alpm/archlinux/virtualbox@6.1.18-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/virtualbox@6.1.18-1" } ], "aliases": [ "CVE-2021-2123" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qzab-crkk-zfba" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37894?format=api", "vulnerability_id": "VCID-sjun-jhtp-hfce", "summary": "Multiple vulnerabilities have been found in VirtualBox, the worst\n of which could result in privilege escalation.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2127", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00196", "scoring_system": "epss", "scoring_elements": "0.41462", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00196", "scoring_system": "epss", "scoring_elements": "0.41531", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00196", "scoring_system": "epss", "scoring_elements": "0.41517", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00196", "scoring_system": "epss", "scoring_elements": "0.41562", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00196", "scoring_system": "epss", "scoring_elements": "0.41536", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00196", "scoring_system": "epss", "scoring_elements": "0.4144", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00196", "scoring_system": "epss", "scoring_elements": "0.4153", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00196", "scoring_system": "epss", "scoring_elements": "0.41558", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00196", "scoring_system": "epss", "scoring_elements": "0.41484", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00196", "scoring_system": "epss", "scoring_elements": "0.41534", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00196", "scoring_system": "epss", "scoring_elements": "0.41542", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00196", "scoring_system": "epss", "scoring_elements": "0.41564", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2127" }, { "reference_url": "https://security.archlinux.org/ASA-202101-37", "reference_id": "ASA-202101-37", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202101-37" }, { "reference_url": "https://security.archlinux.org/AVG-1483", "reference_id": "AVG-1483", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1483" }, { "reference_url": "https://security.gentoo.org/glsa/202101-15", "reference_id": "GLSA-202101-15", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:53:14Z/" } ], "url": "https://security.gentoo.org/glsa/202101-15" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/372218?format=api", "purl": "pkg:alpm/archlinux/virtualbox@6.1.18-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/virtualbox@6.1.18-1" } ], "aliases": [ "CVE-2021-2127" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sjun-jhtp-hfce" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37834?format=api", "vulnerability_id": "VCID-tehr-wkyz-8kcd", "summary": "Multiple vulnerabilities have been found in VirtualBox, the worst\n of which could result in privilege escalation.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2073", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00196", "scoring_system": "epss", "scoring_elements": "0.41462", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00196", "scoring_system": "epss", "scoring_elements": "0.41531", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00196", "scoring_system": "epss", "scoring_elements": "0.41517", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00196", "scoring_system": "epss", "scoring_elements": "0.41562", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00196", "scoring_system": "epss", "scoring_elements": "0.41536", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00196", "scoring_system": "epss", "scoring_elements": "0.4144", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00196", "scoring_system": "epss", "scoring_elements": "0.4153", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00196", "scoring_system": "epss", "scoring_elements": "0.41558", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00196", "scoring_system": "epss", "scoring_elements": "0.41484", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00196", "scoring_system": "epss", "scoring_elements": "0.41534", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00196", "scoring_system": "epss", "scoring_elements": "0.41542", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00196", "scoring_system": "epss", "scoring_elements": "0.41564", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2073" }, { "reference_url": "https://security.archlinux.org/ASA-202101-37", "reference_id": "ASA-202101-37", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202101-37" }, { "reference_url": "https://security.archlinux.org/AVG-1483", "reference_id": "AVG-1483", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1483" }, { "reference_url": "https://security.gentoo.org/glsa/202101-15", "reference_id": "GLSA-202101-15", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:35Z/" } ], "url": "https://security.gentoo.org/glsa/202101-15" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/372218?format=api", "purl": "pkg:alpm/archlinux/virtualbox@6.1.18-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/virtualbox@6.1.18-1" } ], "aliases": [ "CVE-2021-2073" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tehr-wkyz-8kcd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37905?format=api", "vulnerability_id": "VCID-w2dh-qrtu-7ue3", "summary": "Multiple vulnerabilities have been found in VirtualBox, the worst\n of which could result in privilege escalation.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2129", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00135", "scoring_system": "epss", "scoring_elements": "0.33158", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00135", "scoring_system": "epss", "scoring_elements": "0.332", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00135", "scoring_system": "epss", "scoring_elements": "0.33177", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00135", "scoring_system": "epss", "scoring_elements": "0.33217", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00135", "scoring_system": "epss", "scoring_elements": "0.33195", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00135", "scoring_system": "epss", "scoring_elements": "0.33169", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00135", "scoring_system": "epss", "scoring_elements": "0.33296", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00135", "scoring_system": "epss", "scoring_elements": "0.33328", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00135", "scoring_system": "epss", "scoring_elements": "0.33161", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00135", "scoring_system": "epss", "scoring_elements": "0.33204", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00135", "scoring_system": "epss", "scoring_elements": "0.33238", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00135", "scoring_system": "epss", "scoring_elements": "0.33241", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2129" }, { "reference_url": "https://security.archlinux.org/ASA-202101-37", "reference_id": "ASA-202101-37", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202101-37" }, { "reference_url": "https://security.archlinux.org/AVG-1483", "reference_id": "AVG-1483", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1483" }, { "reference_url": "https://security.gentoo.org/glsa/202101-15", "reference_id": "GLSA-202101-15", "reference_type": "", "scores": [ { "value": "7.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T18:11:40Z/" } ], "url": "https://security.gentoo.org/glsa/202101-15" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/372218?format=api", "purl": "pkg:alpm/archlinux/virtualbox@6.1.18-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/virtualbox@6.1.18-1" } ], "aliases": [ "CVE-2021-2129" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w2dh-qrtu-7ue3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37909?format=api", "vulnerability_id": "VCID-xy4k-b4dy-n7gb", "summary": "Multiple vulnerabilities have been found in VirtualBox, the worst\n of which could result in privilege escalation.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2130", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00174", "scoring_system": "epss", "scoring_elements": "0.38688", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00174", "scoring_system": "epss", "scoring_elements": "0.38773", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00174", "scoring_system": "epss", "scoring_elements": "0.38745", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00174", "scoring_system": "epss", "scoring_elements": "0.38791", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00174", "scoring_system": "epss", "scoring_elements": "0.38769", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00174", "scoring_system": "epss", "scoring_elements": "0.38657", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00174", "scoring_system": "epss", "scoring_elements": "0.38787", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00174", "scoring_system": "epss", "scoring_elements": "0.38808", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00174", "scoring_system": "epss", "scoring_elements": "0.38737", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00174", "scoring_system": "epss", "scoring_elements": "0.38786", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00174", "scoring_system": "epss", "scoring_elements": "0.38797", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00174", "scoring_system": "epss", "scoring_elements": "0.38809", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2130" }, { "reference_url": "https://security.archlinux.org/ASA-202101-37", "reference_id": "ASA-202101-37", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202101-37" }, { "reference_url": "https://security.archlinux.org/AVG-1483", "reference_id": "AVG-1483", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1483" }, { "reference_url": "https://security.gentoo.org/glsa/202101-15", "reference_id": "GLSA-202101-15", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:53:11Z/" } ], "url": "https://security.gentoo.org/glsa/202101-15" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/372218?format=api", "purl": "pkg:alpm/archlinux/virtualbox@6.1.18-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/virtualbox@6.1.18-1" } ], "aliases": [ "CVE-2021-2130" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xy4k-b4dy-n7gb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37879?format=api", "vulnerability_id": "VCID-zh97-w3pz-53cc", "summary": "Multiple vulnerabilities have been found in VirtualBox, the worst\n of which could result in privilege escalation.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2124", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40509", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40589", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.4057", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40617", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40587", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40518", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40599", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40626", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40548", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40609", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40627", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2124" }, { "reference_url": "https://security.archlinux.org/ASA-202101-37", "reference_id": "ASA-202101-37", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202101-37" }, { "reference_url": "https://security.archlinux.org/AVG-1483", "reference_id": "AVG-1483", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1483" }, { "reference_url": "https://security.gentoo.org/glsa/202101-15", "reference_id": "GLSA-202101-15", "reference_type": "", "scores": [ { "value": "6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:53:19Z/" } ], "url": "https://security.gentoo.org/glsa/202101-15" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/372218?format=api", "purl": "pkg:alpm/archlinux/virtualbox@6.1.18-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/virtualbox@6.1.18-1" } ], "aliases": [ "CVE-2021-2124" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zh97-w3pz-53cc" } ], "fixing_vulnerabilities": [], "risk_score": "4.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/virtualbox@6.1.16-4" }