Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/qemu@6.1.1-r0?arch=x86_64&distroversion=v3.15&reponame=community
Typeapk
Namespacealpine
Nameqemu
Version6.1.1-r0
Qualifiers
arch x86_64
distroversion v3.15
reponame community
Subpath
Is_vulnerablefalse
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-186h-76t5-3fdd
vulnerability_id VCID-186h-76t5-3fdd
summary Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape).
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3947.json
reference_id
reference_type
scores
0
value 6.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3947.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-3947
reference_id
reference_type
scores
0
value 0.00061
scoring_system epss
scoring_elements 0.19129
published_at 2026-04-01T12:55:00Z
1
value 0.00061
scoring_system epss
scoring_elements 0.19264
published_at 2026-04-02T12:55:00Z
2
value 0.00061
scoring_system epss
scoring_elements 0.19315
published_at 2026-04-04T12:55:00Z
3
value 0.00061
scoring_system epss
scoring_elements 0.18978
published_at 2026-04-07T12:55:00Z
4
value 0.00061
scoring_system epss
scoring_elements 0.19058
published_at 2026-04-08T12:55:00Z
5
value 0.00061
scoring_system epss
scoring_elements 0.19111
published_at 2026-04-09T12:55:00Z
6
value 0.00061
scoring_system epss
scoring_elements 0.19117
published_at 2026-04-11T12:55:00Z
7
value 0.00061
scoring_system epss
scoring_elements 0.1907
published_at 2026-04-12T12:55:00Z
8
value 0.00061
scoring_system epss
scoring_elements 0.19018
published_at 2026-04-13T12:55:00Z
9
value 0.00061
scoring_system epss
scoring_elements 0.18974
published_at 2026-04-16T12:55:00Z
10
value 0.00061
scoring_system epss
scoring_elements 0.18986
published_at 2026-04-18T12:55:00Z
11
value 0.00061
scoring_system epss
scoring_elements 0.18992
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-3947
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2021869
reference_id 2021869
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2021869
4
reference_url https://security.gentoo.org/glsa/202208-27
reference_id GLSA-202208-27
reference_type
scores
url https://security.gentoo.org/glsa/202208-27
fixed_packages
0
url pkg:apk/alpine/qemu@6.1.1-r0?arch=x86_64&distroversion=v3.15&reponame=community
purl pkg:apk/alpine/qemu@6.1.1-r0?arch=x86_64&distroversion=v3.15&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qemu@6.1.1-r0%3Farch=x86_64&distroversion=v3.15&reponame=community
aliases CVE-2021-3947
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-186h-76t5-3fdd
1
url VCID-3wee-2xay-r7bt
vulnerability_id VCID-3wee-2xay-r7bt
summary QEMU: block: fdc: null pointer dereference may lead to guest crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20196.json
reference_id
reference_type
scores
0
value 3.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20196.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-20196
reference_id
reference_type
scores
0
value 0.00039
scoring_system epss
scoring_elements 0.11722
published_at 2026-04-01T12:55:00Z
1
value 0.00039
scoring_system epss
scoring_elements 0.11841
published_at 2026-04-02T12:55:00Z
2
value 0.00039
scoring_system epss
scoring_elements 0.11884
published_at 2026-04-04T12:55:00Z
3
value 0.00039
scoring_system epss
scoring_elements 0.11671
published_at 2026-04-07T12:55:00Z
4
value 0.00039
scoring_system epss
scoring_elements 0.11756
published_at 2026-04-13T12:55:00Z
5
value 0.00039
scoring_system epss
scoring_elements 0.11809
published_at 2026-04-09T12:55:00Z
6
value 0.00039
scoring_system epss
scoring_elements 0.11821
published_at 2026-04-11T12:55:00Z
7
value 0.00039
scoring_system epss
scoring_elements 0.11782
published_at 2026-04-12T12:55:00Z
8
value 0.00039
scoring_system epss
scoring_elements 0.11621
published_at 2026-04-16T12:55:00Z
9
value 0.00039
scoring_system epss
scoring_elements 0.1162
published_at 2026-04-18T12:55:00Z
10
value 0.00039
scoring_system epss
scoring_elements 0.11741
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-20196
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20196
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1919210
reference_id 1919210
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1919210
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=984453
reference_id 984453
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=984453
6
reference_url https://access.redhat.com/errata/RHSA-2022:0325
reference_id RHSA-2022:0325
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0325
7
reference_url https://access.redhat.com/errata/RHSA-2022:0397
reference_id RHSA-2022:0397
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0397
8
reference_url https://access.redhat.com/errata/RHSA-2022:1759
reference_id RHSA-2022:1759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1759
9
reference_url https://usn.ubuntu.com/5307-1/
reference_id USN-5307-1
reference_type
scores
url https://usn.ubuntu.com/5307-1/
fixed_packages
0
url pkg:apk/alpine/qemu@6.1.1-r0?arch=x86_64&distroversion=v3.15&reponame=community
purl pkg:apk/alpine/qemu@6.1.1-r0?arch=x86_64&distroversion=v3.15&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qemu@6.1.1-r0%3Farch=x86_64&distroversion=v3.15&reponame=community
aliases CVE-2021-20196
risk_score 1.4
exploitability 0.5
weighted_severity 2.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3wee-2xay-r7bt
2
url VCID-a6v6-4dm9-nuab
vulnerability_id VCID-a6v6-4dm9-nuab
summary mig-controller: incorrect namespaces handling may lead to not authorized usage of Migration Toolkit for Containers (MTC)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3948.json
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3948.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-3948
reference_id
reference_type
scores
0
value 0.00192
scoring_system epss
scoring_elements 0.41048
published_at 2026-04-01T12:55:00Z
1
value 0.00192
scoring_system epss
scoring_elements 0.4113
published_at 2026-04-02T12:55:00Z
2
value 0.00192
scoring_system epss
scoring_elements 0.4116
published_at 2026-04-04T12:55:00Z
3
value 0.00192
scoring_system epss
scoring_elements 0.41087
published_at 2026-04-07T12:55:00Z
4
value 0.00192
scoring_system epss
scoring_elements 0.41135
published_at 2026-04-08T12:55:00Z
5
value 0.00192
scoring_system epss
scoring_elements 0.41143
published_at 2026-04-09T12:55:00Z
6
value 0.00192
scoring_system epss
scoring_elements 0.41162
published_at 2026-04-11T12:55:00Z
7
value 0.00192
scoring_system epss
scoring_elements 0.41129
published_at 2026-04-12T12:55:00Z
8
value 0.00192
scoring_system epss
scoring_elements 0.41113
published_at 2026-04-13T12:55:00Z
9
value 0.00192
scoring_system epss
scoring_elements 0.41156
published_at 2026-04-16T12:55:00Z
10
value 0.00192
scoring_system epss
scoring_elements 0.41127
published_at 2026-04-18T12:55:00Z
11
value 0.00192
scoring_system epss
scoring_elements 0.41054
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-3948
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2022017
reference_id 2022017
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2022017
3
reference_url https://access.redhat.com/errata/RHSA-2021:4848
reference_id RHSA-2021:4848
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4848
4
reference_url https://access.redhat.com/errata/RHSA-2022:0202
reference_id RHSA-2022:0202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0202
fixed_packages
0
url pkg:apk/alpine/qemu@6.1.1-r0?arch=x86_64&distroversion=v3.15&reponame=community
purl pkg:apk/alpine/qemu@6.1.1-r0?arch=x86_64&distroversion=v3.15&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qemu@6.1.1-r0%3Farch=x86_64&distroversion=v3.15&reponame=community
aliases CVE-2021-3948
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a6v6-4dm9-nuab
3
url VCID-j6hs-wm45-s3ej
vulnerability_id VCID-j6hs-wm45-s3ej
summary Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape).
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20257.json
reference_id
reference_type
scores
0
value 3.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20257.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-20257
reference_id
reference_type
scores
0
value 0.00076
scoring_system epss
scoring_elements 0.22726
published_at 2026-04-01T12:55:00Z
1
value 0.00076
scoring_system epss
scoring_elements 0.229
published_at 2026-04-02T12:55:00Z
2
value 0.00076
scoring_system epss
scoring_elements 0.22944
published_at 2026-04-04T12:55:00Z
3
value 0.00076
scoring_system epss
scoring_elements 0.22737
published_at 2026-04-07T12:55:00Z
4
value 0.00076
scoring_system epss
scoring_elements 0.22812
published_at 2026-04-08T12:55:00Z
5
value 0.00076
scoring_system epss
scoring_elements 0.22864
published_at 2026-04-09T12:55:00Z
6
value 0.00076
scoring_system epss
scoring_elements 0.22885
published_at 2026-04-11T12:55:00Z
7
value 0.00076
scoring_system epss
scoring_elements 0.22848
published_at 2026-04-12T12:55:00Z
8
value 0.00076
scoring_system epss
scoring_elements 0.22792
published_at 2026-04-13T12:55:00Z
9
value 0.00076
scoring_system epss
scoring_elements 0.22806
published_at 2026-04-16T12:55:00Z
10
value 0.00076
scoring_system epss
scoring_elements 0.228
published_at 2026-04-18T12:55:00Z
11
value 0.00076
scoring_system epss
scoring_elements 0.2276
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-20257
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20257
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20257
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1930087
reference_id 1930087
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1930087
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=984450
reference_id 984450
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=984450
6
reference_url https://security.gentoo.org/glsa/202208-27
reference_id GLSA-202208-27
reference_type
scores
url https://security.gentoo.org/glsa/202208-27
7
reference_url https://access.redhat.com/errata/RHSA-2021:5238
reference_id RHSA-2021:5238
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5238
8
reference_url https://access.redhat.com/errata/RHSA-2022:0081
reference_id RHSA-2022:0081
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0081
9
reference_url https://usn.ubuntu.com/5010-1/
reference_id USN-5010-1
reference_type
scores
url https://usn.ubuntu.com/5010-1/
fixed_packages
0
url pkg:apk/alpine/qemu@6.1.1-r0?arch=x86_64&distroversion=v3.15&reponame=community
purl pkg:apk/alpine/qemu@6.1.1-r0?arch=x86_64&distroversion=v3.15&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qemu@6.1.1-r0%3Farch=x86_64&distroversion=v3.15&reponame=community
aliases CVE-2021-20257
risk_score 1.4
exploitability 0.5
weighted_severity 2.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j6hs-wm45-s3ej
4
url VCID-qn73-3gkb-rkbm
vulnerability_id VCID-qn73-3gkb-rkbm
summary Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape).
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3930.json
reference_id
reference_type
scores
0
value 3.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3930.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-3930
reference_id
reference_type
scores
0
value 0.00054
scoring_system epss
scoring_elements 0.17001
published_at 2026-04-01T12:55:00Z
1
value 0.00054
scoring_system epss
scoring_elements 0.17172
published_at 2026-04-02T12:55:00Z
2
value 0.00054
scoring_system epss
scoring_elements 0.17224
published_at 2026-04-04T12:55:00Z
3
value 0.00054
scoring_system epss
scoring_elements 0.16955
published_at 2026-04-07T12:55:00Z
4
value 0.00054
scoring_system epss
scoring_elements 0.17044
published_at 2026-04-08T12:55:00Z
5
value 0.00054
scoring_system epss
scoring_elements 0.17103
published_at 2026-04-09T12:55:00Z
6
value 0.00054
scoring_system epss
scoring_elements 0.17078
published_at 2026-04-11T12:55:00Z
7
value 0.00054
scoring_system epss
scoring_elements 0.17032
published_at 2026-04-12T12:55:00Z
8
value 0.00054
scoring_system epss
scoring_elements 0.16971
published_at 2026-04-13T12:55:00Z
9
value 0.00054
scoring_system epss
scoring_elements 0.16908
published_at 2026-04-16T12:55:00Z
10
value 0.00054
scoring_system epss
scoring_elements 0.1691
published_at 2026-04-18T12:55:00Z
11
value 0.00054
scoring_system epss
scoring_elements 0.16947
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-3930
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3930
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2020588
reference_id 2020588
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2020588
5
reference_url https://security.gentoo.org/glsa/202208-27
reference_id GLSA-202208-27
reference_type
scores
url https://security.gentoo.org/glsa/202208-27
6
reference_url https://access.redhat.com/errata/RHSA-2021:5065
reference_id RHSA-2021:5065
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5065
7
reference_url https://access.redhat.com/errata/RHSA-2021:5238
reference_id RHSA-2021:5238
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5238
8
reference_url https://access.redhat.com/errata/RHSA-2022:0081
reference_id RHSA-2022:0081
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0081
9
reference_url https://usn.ubuntu.com/5307-1/
reference_id USN-5307-1
reference_type
scores
url https://usn.ubuntu.com/5307-1/
10
reference_url https://usn.ubuntu.com/5772-1/
reference_id USN-5772-1
reference_type
scores
url https://usn.ubuntu.com/5772-1/
fixed_packages
0
url pkg:apk/alpine/qemu@6.1.1-r0?arch=x86_64&distroversion=v3.15&reponame=community
purl pkg:apk/alpine/qemu@6.1.1-r0?arch=x86_64&distroversion=v3.15&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qemu@6.1.1-r0%3Farch=x86_64&distroversion=v3.15&reponame=community
aliases CVE-2021-3930
risk_score 1.4
exploitability 0.5
weighted_severity 2.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qn73-3gkb-rkbm
5
url VCID-vrwy-exwv-vyhr
vulnerability_id VCID-vrwy-exwv-vyhr
summary Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape).
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20203.json
reference_id
reference_type
scores
0
value 3.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20203.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-20203
reference_id
reference_type
scores
0
value 0.00031
scoring_system epss
scoring_elements 0.08695
published_at 2026-04-01T12:55:00Z
1
value 0.00031
scoring_system epss
scoring_elements 0.08723
published_at 2026-04-02T12:55:00Z
2
value 0.00031
scoring_system epss
scoring_elements 0.08771
published_at 2026-04-04T12:55:00Z
3
value 0.00031
scoring_system epss
scoring_elements 0.08697
published_at 2026-04-07T12:55:00Z
4
value 0.00031
scoring_system epss
scoring_elements 0.08773
published_at 2026-04-08T12:55:00Z
5
value 0.00031
scoring_system epss
scoring_elements 0.08799
published_at 2026-04-09T12:55:00Z
6
value 0.00031
scoring_system epss
scoring_elements 0.08801
published_at 2026-04-11T12:55:00Z
7
value 0.00031
scoring_system epss
scoring_elements 0.08768
published_at 2026-04-12T12:55:00Z
8
value 0.00031
scoring_system epss
scoring_elements 0.08752
published_at 2026-04-13T12:55:00Z
9
value 0.00031
scoring_system epss
scoring_elements 0.08641
published_at 2026-04-16T12:55:00Z
10
value 0.00031
scoring_system epss
scoring_elements 0.08631
published_at 2026-04-18T12:55:00Z
11
value 0.00031
scoring_system epss
scoring_elements 0.08784
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-20203
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20203
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20203
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922441
reference_id 1922441
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922441
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=984452
reference_id 984452
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=984452
6
reference_url https://security.gentoo.org/glsa/202208-27
reference_id GLSA-202208-27
reference_type
scores
url https://security.gentoo.org/glsa/202208-27
7
reference_url https://usn.ubuntu.com/5307-1/
reference_id USN-5307-1
reference_type
scores
url https://usn.ubuntu.com/5307-1/
fixed_packages
0
url pkg:apk/alpine/qemu@6.1.1-r0?arch=x86_64&distroversion=v3.15&reponame=community
purl pkg:apk/alpine/qemu@6.1.1-r0?arch=x86_64&distroversion=v3.15&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qemu@6.1.1-r0%3Farch=x86_64&distroversion=v3.15&reponame=community
aliases CVE-2021-20203
risk_score 1.4
exploitability 0.5
weighted_severity 2.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vrwy-exwv-vyhr
6
url VCID-ycrs-vy13-wbff
vulnerability_id VCID-ycrs-vy13-wbff
summary Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape).
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3713.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3713.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-3713
reference_id
reference_type
scores
0
value 0.00033
scoring_system epss
scoring_elements 0.09598
published_at 2026-04-01T12:55:00Z
1
value 0.00033
scoring_system epss
scoring_elements 0.09663
published_at 2026-04-02T12:55:00Z
2
value 0.00033
scoring_system epss
scoring_elements 0.09714
published_at 2026-04-21T12:55:00Z
3
value 0.00033
scoring_system epss
scoring_elements 0.09622
published_at 2026-04-07T12:55:00Z
4
value 0.00033
scoring_system epss
scoring_elements 0.09692
published_at 2026-04-08T12:55:00Z
5
value 0.00033
scoring_system epss
scoring_elements 0.09741
published_at 2026-04-09T12:55:00Z
6
value 0.00033
scoring_system epss
scoring_elements 0.09753
published_at 2026-04-11T12:55:00Z
7
value 0.00033
scoring_system epss
scoring_elements 0.09721
published_at 2026-04-12T12:55:00Z
8
value 0.00033
scoring_system epss
scoring_elements 0.09705
published_at 2026-04-13T12:55:00Z
9
value 0.00033
scoring_system epss
scoring_elements 0.09595
published_at 2026-04-16T12:55:00Z
10
value 0.00033
scoring_system epss
scoring_elements 0.09567
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-3713
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3544
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3544
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3545
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3546
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3638
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3682
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3682
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3713
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3713
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3748
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1994640
reference_id 1994640
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1994640
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=992727
reference_id 992727
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=992727
12
reference_url https://security.gentoo.org/glsa/202208-27
reference_id GLSA-202208-27
reference_type
scores
url https://security.gentoo.org/glsa/202208-27
13
reference_url https://usn.ubuntu.com/5307-1/
reference_id USN-5307-1
reference_type
scores
url https://usn.ubuntu.com/5307-1/
fixed_packages
0
url pkg:apk/alpine/qemu@6.1.1-r0?arch=x86_64&distroversion=v3.15&reponame=community
purl pkg:apk/alpine/qemu@6.1.1-r0?arch=x86_64&distroversion=v3.15&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qemu@6.1.1-r0%3Farch=x86_64&distroversion=v3.15&reponame=community
aliases CVE-2021-3713
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ycrs-vy13-wbff
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/qemu@6.1.1-r0%3Farch=x86_64&distroversion=v3.15&reponame=community