Lookup for vulnerable packages by Package URL.

Purlpkg:alpm/archlinux/linux-zen@5.11.11.zen1-1
Typealpm
Namespacearchlinux
Namelinux-zen
Version5.11.11.zen1-1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version5.11.12.arch1-1
Latest_non_vulnerable_version6.2-1
Affected_by_vulnerabilities
0
url VCID-1png-mb1p-cbcw
vulnerability_id VCID-1png-mb1p-cbcw
summary kernel: use-after-free in nosy driver in nosy_ioctl() in drivers/firewire/nosy.c when a device is added twice
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3483.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3483.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-3483
reference_id
reference_type
scores
0
value 0.00167
scoring_system epss
scoring_elements 0.37724
published_at 2026-04-01T12:55:00Z
1
value 0.00167
scoring_system epss
scoring_elements 0.37438
published_at 2026-04-29T12:55:00Z
2
value 0.00167
scoring_system epss
scoring_elements 0.37873
published_at 2026-04-16T12:55:00Z
3
value 0.00167
scoring_system epss
scoring_elements 0.37854
published_at 2026-04-18T12:55:00Z
4
value 0.00167
scoring_system epss
scoring_elements 0.37791
published_at 2026-04-21T12:55:00Z
5
value 0.00167
scoring_system epss
scoring_elements 0.3755
published_at 2026-04-24T12:55:00Z
6
value 0.00167
scoring_system epss
scoring_elements 0.37527
published_at 2026-04-26T12:55:00Z
7
value 0.00167
scoring_system epss
scoring_elements 0.37905
published_at 2026-04-02T12:55:00Z
8
value 0.00167
scoring_system epss
scoring_elements 0.37931
published_at 2026-04-04T12:55:00Z
9
value 0.00167
scoring_system epss
scoring_elements 0.37809
published_at 2026-04-07T12:55:00Z
10
value 0.00167
scoring_system epss
scoring_elements 0.37859
published_at 2026-04-08T12:55:00Z
11
value 0.00167
scoring_system epss
scoring_elements 0.37872
published_at 2026-04-09T12:55:00Z
12
value 0.00167
scoring_system epss
scoring_elements 0.37888
published_at 2026-04-11T12:55:00Z
13
value 0.00167
scoring_system epss
scoring_elements 0.37852
published_at 2026-04-12T12:55:00Z
14
value 0.00167
scoring_system epss
scoring_elements 0.37827
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-3483
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3483
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1948045
reference_id 1948045
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1948045
5
reference_url https://security.archlinux.org/AVG-1764
reference_id AVG-1764
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1764
6
reference_url https://security.archlinux.org/AVG-1766
reference_id AVG-1766
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1766
7
reference_url https://security.archlinux.org/AVG-1767
reference_id AVG-1767
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1767
8
reference_url https://security.archlinux.org/AVG-1797
reference_id AVG-1797
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1797
9
reference_url https://usn.ubuntu.com/4948-1/
reference_id USN-4948-1
reference_type
scores
url https://usn.ubuntu.com/4948-1/
10
reference_url https://usn.ubuntu.com/4979-1/
reference_id USN-4979-1
reference_type
scores
url https://usn.ubuntu.com/4979-1/
11
reference_url https://usn.ubuntu.com/4982-1/
reference_id USN-4982-1
reference_type
scores
url https://usn.ubuntu.com/4982-1/
12
reference_url https://usn.ubuntu.com/4984-1/
reference_id USN-4984-1
reference_type
scores
url https://usn.ubuntu.com/4984-1/
13
reference_url https://usn.ubuntu.com/5299-1/
reference_id USN-5299-1
reference_type
scores
url https://usn.ubuntu.com/5299-1/
14
reference_url https://usn.ubuntu.com/5343-1/
reference_id USN-5343-1
reference_type
scores
url https://usn.ubuntu.com/5343-1/
fixed_packages
0
url pkg:alpm/archlinux/linux-zen@5.11.12.arch1-1
purl pkg:alpm/archlinux/linux-zen@5.11.12.arch1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@5.11.12.arch1-1
aliases CVE-2021-3483
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1png-mb1p-cbcw
1
url VCID-yz81-e5eu-1uft
vulnerability_id VCID-yz81-e5eu-1uft
summary kernel: KVM: double fetch in nested_svm_vmrun can lead to unrestricted MSR access
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29657.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29657.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-29657
reference_id
reference_type
scores
0
value 0.00043
scoring_system epss
scoring_elements 0.13185
published_at 2026-04-01T12:55:00Z
1
value 0.00043
scoring_system epss
scoring_elements 0.13039
published_at 2026-04-29T12:55:00Z
2
value 0.00043
scoring_system epss
scoring_elements 0.13064
published_at 2026-04-16T12:55:00Z
3
value 0.00043
scoring_system epss
scoring_elements 0.13066
published_at 2026-04-18T12:55:00Z
4
value 0.00043
scoring_system epss
scoring_elements 0.13161
published_at 2026-04-21T12:55:00Z
5
value 0.00043
scoring_system epss
scoring_elements 0.13167
published_at 2026-04-24T12:55:00Z
6
value 0.00043
scoring_system epss
scoring_elements 0.13137
published_at 2026-04-26T12:55:00Z
7
value 0.00043
scoring_system epss
scoring_elements 0.13295
published_at 2026-04-02T12:55:00Z
8
value 0.00043
scoring_system epss
scoring_elements 0.13359
published_at 2026-04-04T12:55:00Z
9
value 0.00043
scoring_system epss
scoring_elements 0.13155
published_at 2026-04-07T12:55:00Z
10
value 0.00043
scoring_system epss
scoring_elements 0.13235
published_at 2026-04-08T12:55:00Z
11
value 0.00043
scoring_system epss
scoring_elements 0.13286
published_at 2026-04-09T12:55:00Z
12
value 0.00043
scoring_system epss
scoring_elements 0.13254
published_at 2026-04-11T12:55:00Z
13
value 0.00043
scoring_system epss
scoring_elements 0.13216
published_at 2026-04-12T12:55:00Z
14
value 0.00043
scoring_system epss
scoring_elements 0.13164
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-29657
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29657
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29657
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1995153
reference_id 1995153
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1995153
5
reference_url https://security.archlinux.org/AVG-1764
reference_id AVG-1764
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1764
6
reference_url https://security.archlinux.org/AVG-1766
reference_id AVG-1766
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1766
7
reference_url https://security.archlinux.org/AVG-1767
reference_id AVG-1767
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1767
8
reference_url https://security.archlinux.org/AVG-1797
reference_id AVG-1797
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1797
9
reference_url https://access.redhat.com/errata/RHSA-2021:4356
reference_id RHSA-2021:4356
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4356
10
reference_url https://usn.ubuntu.com/4948-1/
reference_id USN-4948-1
reference_type
scores
url https://usn.ubuntu.com/4948-1/
fixed_packages
0
url pkg:alpm/archlinux/linux-zen@5.11.12.arch1-1
purl pkg:alpm/archlinux/linux-zen@5.11.12.arch1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@5.11.12.arch1-1
aliases CVE-2021-29657
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yz81-e5eu-1uft
Fixing_vulnerabilities
0
url VCID-6zdt-kv9f-9qa9
vulnerability_id VCID-6zdt-kv9f-9qa9
summary kernel: memory leak in user mode driver due to lack of cleanup steps in kernel/usermode_driver.c and kernel/bpf/preload/bpf_preload_kern.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29649.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29649.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-29649
reference_id
reference_type
scores
0
value 0.00117
scoring_system epss
scoring_elements 0.30572
published_at 2026-04-01T12:55:00Z
1
value 0.00117
scoring_system epss
scoring_elements 0.30176
published_at 2026-04-29T12:55:00Z
2
value 0.00117
scoring_system epss
scoring_elements 0.30583
published_at 2026-04-18T12:55:00Z
3
value 0.00117
scoring_system epss
scoring_elements 0.30549
published_at 2026-04-21T12:55:00Z
4
value 0.00117
scoring_system epss
scoring_elements 0.30371
published_at 2026-04-24T12:55:00Z
5
value 0.00117
scoring_system epss
scoring_elements 0.30256
published_at 2026-04-26T12:55:00Z
6
value 0.00117
scoring_system epss
scoring_elements 0.30708
published_at 2026-04-02T12:55:00Z
7
value 0.00117
scoring_system epss
scoring_elements 0.30755
published_at 2026-04-04T12:55:00Z
8
value 0.00117
scoring_system epss
scoring_elements 0.30569
published_at 2026-04-07T12:55:00Z
9
value 0.00117
scoring_system epss
scoring_elements 0.30628
published_at 2026-04-08T12:55:00Z
10
value 0.00117
scoring_system epss
scoring_elements 0.30662
published_at 2026-04-09T12:55:00Z
11
value 0.00117
scoring_system epss
scoring_elements 0.30666
published_at 2026-04-11T12:55:00Z
12
value 0.00117
scoring_system epss
scoring_elements 0.30621
published_at 2026-04-12T12:55:00Z
13
value 0.00117
scoring_system epss
scoring_elements 0.30576
published_at 2026-04-13T12:55:00Z
14
value 0.00117
scoring_system epss
scoring_elements 0.30601
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-29649
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29649
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1945379
reference_id 1945379
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1945379
4
reference_url https://security.archlinux.org/AVG-1747
reference_id AVG-1747
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1747
5
reference_url https://security.archlinux.org/AVG-1748
reference_id AVG-1748
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1748
6
reference_url https://security.archlinux.org/AVG-1749
reference_id AVG-1749
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1749
7
reference_url https://security.archlinux.org/AVG-1750
reference_id AVG-1750
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1750
8
reference_url https://usn.ubuntu.com/4948-1/
reference_id USN-4948-1
reference_type
scores
url https://usn.ubuntu.com/4948-1/
fixed_packages
0
url pkg:alpm/archlinux/linux-zen@5.11.11.zen1-1
purl pkg:alpm/archlinux/linux-zen@5.11.11.zen1-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1png-mb1p-cbcw
1
vulnerability VCID-yz81-e5eu-1uft
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@5.11.11.zen1-1
aliases CVE-2021-29649
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6zdt-kv9f-9qa9
1
url VCID-hm3z-5v7u-pfay
vulnerability_id VCID-hm3z-5v7u-pfay
summary kernel: DoS due to negative fragment size calculation in drivers/net/ethernet/freescale/gianfar.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29264.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29264.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-29264
reference_id
reference_type
scores
0
value 0.00103
scoring_system epss
scoring_elements 0.28173
published_at 2026-04-01T12:55:00Z
1
value 0.00103
scoring_system epss
scoring_elements 0.27774
published_at 2026-04-29T12:55:00Z
2
value 0.00103
scoring_system epss
scoring_elements 0.28105
published_at 2026-04-16T12:55:00Z
3
value 0.00103
scoring_system epss
scoring_elements 0.28088
published_at 2026-04-18T12:55:00Z
4
value 0.00103
scoring_system epss
scoring_elements 0.28044
published_at 2026-04-21T12:55:00Z
5
value 0.00103
scoring_system epss
scoring_elements 0.27962
published_at 2026-04-24T12:55:00Z
6
value 0.00103
scoring_system epss
scoring_elements 0.2785
published_at 2026-04-26T12:55:00Z
7
value 0.00103
scoring_system epss
scoring_elements 0.28244
published_at 2026-04-02T12:55:00Z
8
value 0.00103
scoring_system epss
scoring_elements 0.28288
published_at 2026-04-04T12:55:00Z
9
value 0.00103
scoring_system epss
scoring_elements 0.28079
published_at 2026-04-07T12:55:00Z
10
value 0.00103
scoring_system epss
scoring_elements 0.28144
published_at 2026-04-08T12:55:00Z
11
value 0.00103
scoring_system epss
scoring_elements 0.28187
published_at 2026-04-09T12:55:00Z
12
value 0.00103
scoring_system epss
scoring_elements 0.28195
published_at 2026-04-11T12:55:00Z
13
value 0.00103
scoring_system epss
scoring_elements 0.28151
published_at 2026-04-12T12:55:00Z
14
value 0.00103
scoring_system epss
scoring_elements 0.28094
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-29264
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29264
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29264
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1944689
reference_id 1944689
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1944689
5
reference_url https://security.archlinux.org/AVG-1747
reference_id AVG-1747
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1747
6
reference_url https://security.archlinux.org/AVG-1748
reference_id AVG-1748
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1748
7
reference_url https://security.archlinux.org/AVG-1749
reference_id AVG-1749
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1749
8
reference_url https://security.archlinux.org/AVG-1750
reference_id AVG-1750
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1750
9
reference_url https://usn.ubuntu.com/4946-1/
reference_id USN-4946-1
reference_type
scores
url https://usn.ubuntu.com/4946-1/
10
reference_url https://usn.ubuntu.com/4948-1/
reference_id USN-4948-1
reference_type
scores
url https://usn.ubuntu.com/4948-1/
11
reference_url https://usn.ubuntu.com/4949-1/
reference_id USN-4949-1
reference_type
scores
url https://usn.ubuntu.com/4949-1/
12
reference_url https://usn.ubuntu.com/4982-1/
reference_id USN-4982-1
reference_type
scores
url https://usn.ubuntu.com/4982-1/
fixed_packages
0
url pkg:alpm/archlinux/linux-zen@5.11.11.zen1-1
purl pkg:alpm/archlinux/linux-zen@5.11.11.zen1-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1png-mb1p-cbcw
1
vulnerability VCID-yz81-e5eu-1uft
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@5.11.11.zen1-1
aliases CVE-2021-29264
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hm3z-5v7u-pfay
2
url VCID-hv6m-sb3t-ekcz
vulnerability_id VCID-hv6m-sb3t-ekcz
summary kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29650.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29650.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-29650
reference_id
reference_type
scores
0
value 0.00032
scoring_system epss
scoring_elements 0.09072
published_at 2026-04-01T12:55:00Z
1
value 0.00032
scoring_system epss
scoring_elements 0.09101
published_at 2026-04-29T12:55:00Z
2
value 0.00032
scoring_system epss
scoring_elements 0.09008
published_at 2026-04-16T12:55:00Z
3
value 0.00032
scoring_system epss
scoring_elements 0.08988
published_at 2026-04-18T12:55:00Z
4
value 0.00032
scoring_system epss
scoring_elements 0.09144
published_at 2026-04-21T12:55:00Z
5
value 0.00032
scoring_system epss
scoring_elements 0.09186
published_at 2026-04-24T12:55:00Z
6
value 0.00032
scoring_system epss
scoring_elements 0.09131
published_at 2026-04-26T12:55:00Z
7
value 0.00032
scoring_system epss
scoring_elements 0.09078
published_at 2026-04-02T12:55:00Z
8
value 0.00032
scoring_system epss
scoring_elements 0.0913
published_at 2026-04-08T12:55:00Z
9
value 0.00032
scoring_system epss
scoring_elements 0.0905
published_at 2026-04-07T12:55:00Z
10
value 0.00032
scoring_system epss
scoring_elements 0.09161
published_at 2026-04-11T12:55:00Z
11
value 0.00032
scoring_system epss
scoring_elements 0.09129
published_at 2026-04-12T12:55:00Z
12
value 0.00032
scoring_system epss
scoring_elements 0.09114
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-29650
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29650
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29650
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1945388
reference_id 1945388
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1945388
5
reference_url https://security.archlinux.org/AVG-1747
reference_id AVG-1747
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1747
6
reference_url https://security.archlinux.org/AVG-1748
reference_id AVG-1748
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1748
7
reference_url https://security.archlinux.org/AVG-1749
reference_id AVG-1749
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1749
8
reference_url https://security.archlinux.org/AVG-1750
reference_id AVG-1750
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1750
9
reference_url https://access.redhat.com/errata/RHSA-2021:3327
reference_id RHSA-2021:3327
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3327
10
reference_url https://access.redhat.com/errata/RHSA-2021:3328
reference_id RHSA-2021:3328
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3328
11
reference_url https://access.redhat.com/errata/RHSA-2021:4140
reference_id RHSA-2021:4140
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4140
12
reference_url https://access.redhat.com/errata/RHSA-2021:4356
reference_id RHSA-2021:4356
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4356
13
reference_url https://usn.ubuntu.com/4945-1/
reference_id USN-4945-1
reference_type
scores
url https://usn.ubuntu.com/4945-1/
14
reference_url https://usn.ubuntu.com/4945-2/
reference_id USN-4945-2
reference_type
scores
url https://usn.ubuntu.com/4945-2/
15
reference_url https://usn.ubuntu.com/4946-1/
reference_id USN-4946-1
reference_type
scores
url https://usn.ubuntu.com/4946-1/
16
reference_url https://usn.ubuntu.com/4947-1/
reference_id USN-4947-1
reference_type
scores
url https://usn.ubuntu.com/4947-1/
17
reference_url https://usn.ubuntu.com/4948-1/
reference_id USN-4948-1
reference_type
scores
url https://usn.ubuntu.com/4948-1/
18
reference_url https://usn.ubuntu.com/4949-1/
reference_id USN-4949-1
reference_type
scores
url https://usn.ubuntu.com/4949-1/
19
reference_url https://usn.ubuntu.com/5343-1/
reference_id USN-5343-1
reference_type
scores
url https://usn.ubuntu.com/5343-1/
fixed_packages
0
url pkg:alpm/archlinux/linux-zen@5.11.11.zen1-1
purl pkg:alpm/archlinux/linux-zen@5.11.11.zen1-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1png-mb1p-cbcw
1
vulnerability VCID-yz81-e5eu-1uft
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@5.11.11.zen1-1
aliases CVE-2021-29650
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hv6m-sb3t-ekcz
3
url VCID-me91-v74k-myet
vulnerability_id VCID-me91-v74k-myet
summary Linux: blkback driver may leak persistent grants
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-28688
reference_id
reference_type
scores
0
value 0.00133
scoring_system epss
scoring_elements 0.32557
published_at 2026-04-29T12:55:00Z
1
value 0.00133
scoring_system epss
scoring_elements 0.32938
published_at 2026-04-18T12:55:00Z
2
value 0.00133
scoring_system epss
scoring_elements 0.32902
published_at 2026-04-21T12:55:00Z
3
value 0.00133
scoring_system epss
scoring_elements 0.32755
published_at 2026-04-24T12:55:00Z
4
value 0.00133
scoring_system epss
scoring_elements 0.3264
published_at 2026-04-26T12:55:00Z
5
value 0.00133
scoring_system epss
scoring_elements 0.32912
published_at 2026-04-01T12:55:00Z
6
value 0.00133
scoring_system epss
scoring_elements 0.33041
published_at 2026-04-02T12:55:00Z
7
value 0.00133
scoring_system epss
scoring_elements 0.33074
published_at 2026-04-04T12:55:00Z
8
value 0.00133
scoring_system epss
scoring_elements 0.32904
published_at 2026-04-07T12:55:00Z
9
value 0.00133
scoring_system epss
scoring_elements 0.3295
published_at 2026-04-08T12:55:00Z
10
value 0.00133
scoring_system epss
scoring_elements 0.3298
published_at 2026-04-09T12:55:00Z
11
value 0.00133
scoring_system epss
scoring_elements 0.32983
published_at 2026-04-11T12:55:00Z
12
value 0.00133
scoring_system epss
scoring_elements 0.32945
published_at 2026-04-12T12:55:00Z
13
value 0.00133
scoring_system epss
scoring_elements 0.32919
published_at 2026-04-13T12:55:00Z
14
value 0.00133
scoring_system epss
scoring_elements 0.3296
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-28688
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28688
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28688
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://security.archlinux.org/AVG-1747
reference_id AVG-1747
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1747
4
reference_url https://security.archlinux.org/AVG-1748
reference_id AVG-1748
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1748
5
reference_url https://security.archlinux.org/AVG-1749
reference_id AVG-1749
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1749
6
reference_url https://security.archlinux.org/AVG-1750
reference_id AVG-1750
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1750
7
reference_url https://usn.ubuntu.com/4946-1/
reference_id USN-4946-1
reference_type
scores
url https://usn.ubuntu.com/4946-1/
8
reference_url https://usn.ubuntu.com/4948-1/
reference_id USN-4948-1
reference_type
scores
url https://usn.ubuntu.com/4948-1/
9
reference_url https://usn.ubuntu.com/4982-1/
reference_id USN-4982-1
reference_type
scores
url https://usn.ubuntu.com/4982-1/
10
reference_url https://usn.ubuntu.com/4984-1/
reference_id USN-4984-1
reference_type
scores
url https://usn.ubuntu.com/4984-1/
11
reference_url https://usn.ubuntu.com/5343-1/
reference_id USN-5343-1
reference_type
scores
url https://usn.ubuntu.com/5343-1/
12
reference_url https://xenbits.xen.org/xsa/advisory-371.html
reference_id XSA-371
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-371.html
fixed_packages
0
url pkg:alpm/archlinux/linux-zen@5.11.11.zen1-1
purl pkg:alpm/archlinux/linux-zen@5.11.11.zen1-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1png-mb1p-cbcw
1
vulnerability VCID-yz81-e5eu-1uft
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@5.11.11.zen1-1
aliases CVE-2021-28688
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-me91-v74k-myet
4
url VCID-r6xj-9g7c-k7gf
vulnerability_id VCID-r6xj-9g7c-k7gf
summary kernel: improper input validation in tipc_nl_retrieve_key function in net/tipc/node.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29646.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29646.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-29646
reference_id
reference_type
scores
0
value 0.00105
scoring_system epss
scoring_elements 0.28599
published_at 2026-04-01T12:55:00Z
1
value 0.00105
scoring_system epss
scoring_elements 0.28193
published_at 2026-04-29T12:55:00Z
2
value 0.00105
scoring_system epss
scoring_elements 0.28548
published_at 2026-04-18T12:55:00Z
3
value 0.00105
scoring_system epss
scoring_elements 0.28499
published_at 2026-04-21T12:55:00Z
4
value 0.00105
scoring_system epss
scoring_elements 0.28383
published_at 2026-04-24T12:55:00Z
5
value 0.00105
scoring_system epss
scoring_elements 0.28272
published_at 2026-04-26T12:55:00Z
6
value 0.00105
scoring_system epss
scoring_elements 0.28683
published_at 2026-04-02T12:55:00Z
7
value 0.00105
scoring_system epss
scoring_elements 0.28732
published_at 2026-04-04T12:55:00Z
8
value 0.00105
scoring_system epss
scoring_elements 0.28538
published_at 2026-04-07T12:55:00Z
9
value 0.00105
scoring_system epss
scoring_elements 0.28603
published_at 2026-04-08T12:55:00Z
10
value 0.00105
scoring_system epss
scoring_elements 0.28643
published_at 2026-04-09T12:55:00Z
11
value 0.00105
scoring_system epss
scoring_elements 0.28645
published_at 2026-04-11T12:55:00Z
12
value 0.00105
scoring_system epss
scoring_elements 0.28601
published_at 2026-04-12T12:55:00Z
13
value 0.00105
scoring_system epss
scoring_elements 0.28552
published_at 2026-04-13T12:55:00Z
14
value 0.00105
scoring_system epss
scoring_elements 0.28572
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-29646
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29646
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29646
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1945345
reference_id 1945345
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1945345
4
reference_url https://security.archlinux.org/AVG-1747
reference_id AVG-1747
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1747
5
reference_url https://security.archlinux.org/AVG-1748
reference_id AVG-1748
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1748
6
reference_url https://security.archlinux.org/AVG-1749
reference_id AVG-1749
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1749
7
reference_url https://security.archlinux.org/AVG-1750
reference_id AVG-1750
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1750
8
reference_url https://access.redhat.com/errata/RHSA-2021:4140
reference_id RHSA-2021:4140
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4140
9
reference_url https://access.redhat.com/errata/RHSA-2021:4356
reference_id RHSA-2021:4356
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4356
10
reference_url https://usn.ubuntu.com/4947-1/
reference_id USN-4947-1
reference_type
scores
url https://usn.ubuntu.com/4947-1/
11
reference_url https://usn.ubuntu.com/4948-1/
reference_id USN-4948-1
reference_type
scores
url https://usn.ubuntu.com/4948-1/
12
reference_url https://usn.ubuntu.com/4949-1/
reference_id USN-4949-1
reference_type
scores
url https://usn.ubuntu.com/4949-1/
fixed_packages
0
url pkg:alpm/archlinux/linux-zen@5.11.11.zen1-1
purl pkg:alpm/archlinux/linux-zen@5.11.11.zen1-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1png-mb1p-cbcw
1
vulnerability VCID-yz81-e5eu-1uft
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@5.11.11.zen1-1
aliases CVE-2021-29646
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r6xj-9g7c-k7gf
5
url VCID-xm2m-3g4f-gfan
vulnerability_id VCID-xm2m-3g4f-gfan
summary kernel: information disclosure due to uninitialized data structure in qrtr_recvmsg function in net/qrtr/qrtr.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29647.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29647.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-29647
reference_id
reference_type
scores
0
value 0.00094
scoring_system epss
scoring_elements 0.26372
published_at 2026-04-01T12:55:00Z
1
value 0.00094
scoring_system epss
scoring_elements 0.26078
published_at 2026-04-29T12:55:00Z
2
value 0.00094
scoring_system epss
scoring_elements 0.26267
published_at 2026-04-16T12:55:00Z
3
value 0.00094
scoring_system epss
scoring_elements 0.26242
published_at 2026-04-18T12:55:00Z
4
value 0.00094
scoring_system epss
scoring_elements 0.26207
published_at 2026-04-21T12:55:00Z
5
value 0.00094
scoring_system epss
scoring_elements 0.26132
published_at 2026-04-24T12:55:00Z
6
value 0.00094
scoring_system epss
scoring_elements 0.26129
published_at 2026-04-26T12:55:00Z
7
value 0.00094
scoring_system epss
scoring_elements 0.26423
published_at 2026-04-02T12:55:00Z
8
value 0.00094
scoring_system epss
scoring_elements 0.26467
published_at 2026-04-04T12:55:00Z
9
value 0.00094
scoring_system epss
scoring_elements 0.26241
published_at 2026-04-07T12:55:00Z
10
value 0.00094
scoring_system epss
scoring_elements 0.26309
published_at 2026-04-08T12:55:00Z
11
value 0.00094
scoring_system epss
scoring_elements 0.26357
published_at 2026-04-09T12:55:00Z
12
value 0.00094
scoring_system epss
scoring_elements 0.26365
published_at 2026-04-11T12:55:00Z
13
value 0.00094
scoring_system epss
scoring_elements 0.2632
published_at 2026-04-12T12:55:00Z
14
value 0.00094
scoring_system epss
scoring_elements 0.26261
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-29647
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29647
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29647
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1945361
reference_id 1945361
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1945361
5
reference_url https://security.archlinux.org/AVG-1747
reference_id AVG-1747
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1747
6
reference_url https://security.archlinux.org/AVG-1748
reference_id AVG-1748
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1748
7
reference_url https://security.archlinux.org/AVG-1749
reference_id AVG-1749
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1749
8
reference_url https://security.archlinux.org/AVG-1750
reference_id AVG-1750
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1750
9
reference_url https://usn.ubuntu.com/4948-1/
reference_id USN-4948-1
reference_type
scores
url https://usn.ubuntu.com/4948-1/
10
reference_url https://usn.ubuntu.com/4979-1/
reference_id USN-4979-1
reference_type
scores
url https://usn.ubuntu.com/4979-1/
11
reference_url https://usn.ubuntu.com/4982-1/
reference_id USN-4982-1
reference_type
scores
url https://usn.ubuntu.com/4982-1/
12
reference_url https://usn.ubuntu.com/4984-1/
reference_id USN-4984-1
reference_type
scores
url https://usn.ubuntu.com/4984-1/
fixed_packages
0
url pkg:alpm/archlinux/linux-zen@5.11.11.zen1-1
purl pkg:alpm/archlinux/linux-zen@5.11.11.zen1-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1png-mb1p-cbcw
1
vulnerability VCID-yz81-e5eu-1uft
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@5.11.11.zen1-1
aliases CVE-2021-29647
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xm2m-3g4f-gfan
6
url VCID-zupm-5nps-ukbt
vulnerability_id VCID-zupm-5nps-ukbt
summary kernel: DoS due to BPF subsystem does not properly consider that resolved_ids and resolved_sizes are intentionally uninitialized in the vmlinux BPF
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29648.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29648.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-29648
reference_id
reference_type
scores
0
value 0.00109
scoring_system epss
scoring_elements 0.29176
published_at 2026-04-01T12:55:00Z
1
value 0.00109
scoring_system epss
scoring_elements 0.28778
published_at 2026-04-29T12:55:00Z
2
value 0.00109
scoring_system epss
scoring_elements 0.29129
published_at 2026-04-18T12:55:00Z
3
value 0.00109
scoring_system epss
scoring_elements 0.2908
published_at 2026-04-21T12:55:00Z
4
value 0.00109
scoring_system epss
scoring_elements 0.2896
published_at 2026-04-24T12:55:00Z
5
value 0.00109
scoring_system epss
scoring_elements 0.28849
published_at 2026-04-26T12:55:00Z
6
value 0.00109
scoring_system epss
scoring_elements 0.29251
published_at 2026-04-02T12:55:00Z
7
value 0.00109
scoring_system epss
scoring_elements 0.29302
published_at 2026-04-04T12:55:00Z
8
value 0.00109
scoring_system epss
scoring_elements 0.29115
published_at 2026-04-07T12:55:00Z
9
value 0.00109
scoring_system epss
scoring_elements 0.29179
published_at 2026-04-08T12:55:00Z
10
value 0.00109
scoring_system epss
scoring_elements 0.29219
published_at 2026-04-09T12:55:00Z
11
value 0.00109
scoring_system epss
scoring_elements 0.29224
published_at 2026-04-11T12:55:00Z
12
value 0.00109
scoring_system epss
scoring_elements 0.29178
published_at 2026-04-12T12:55:00Z
13
value 0.00109
scoring_system epss
scoring_elements 0.29126
published_at 2026-04-13T12:55:00Z
14
value 0.00109
scoring_system epss
scoring_elements 0.29152
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-29648
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1945373
reference_id 1945373
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1945373
3
reference_url https://security.archlinux.org/AVG-1741
reference_id AVG-1741
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1741
4
reference_url https://security.archlinux.org/AVG-1747
reference_id AVG-1747
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1747
5
reference_url https://security.archlinux.org/AVG-1748
reference_id AVG-1748
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1748
6
reference_url https://security.archlinux.org/AVG-1749
reference_id AVG-1749
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1749
fixed_packages
0
url pkg:alpm/archlinux/linux-zen@5.11.11.zen1-1
purl pkg:alpm/archlinux/linux-zen@5.11.11.zen1-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1png-mb1p-cbcw
1
vulnerability VCID-yz81-e5eu-1uft
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@5.11.11.zen1-1
aliases CVE-2021-29648
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zupm-5nps-ukbt
Risk_score3.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@5.11.11.zen1-1