Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/dev-lang/rust-bin@1.63.0-r1
Typeebuild
Namespacedev-lang
Namerust-bin
Version1.63.0-r1
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version1.64.0
Latest_non_vulnerable_version1.71.1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-4khp-kevq-xff5
vulnerability_id VCID-4khp-kevq-xff5
summary Multiple vulnerabilities have been discovered in Rust, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28875.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28875.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-28875
reference_id
reference_type
scores
0
value 0.00416
scoring_system epss
scoring_elements 0.61571
published_at 2026-04-01T12:55:00Z
1
value 0.00416
scoring_system epss
scoring_elements 0.6173
published_at 2026-04-21T12:55:00Z
2
value 0.00416
scoring_system epss
scoring_elements 0.61742
published_at 2026-04-16T12:55:00Z
3
value 0.00416
scoring_system epss
scoring_elements 0.61747
published_at 2026-04-18T12:55:00Z
4
value 0.00416
scoring_system epss
scoring_elements 0.61645
published_at 2026-04-02T12:55:00Z
5
value 0.00416
scoring_system epss
scoring_elements 0.61676
published_at 2026-04-04T12:55:00Z
6
value 0.00416
scoring_system epss
scoring_elements 0.61647
published_at 2026-04-07T12:55:00Z
7
value 0.00416
scoring_system epss
scoring_elements 0.61695
published_at 2026-04-08T12:55:00Z
8
value 0.00416
scoring_system epss
scoring_elements 0.61711
published_at 2026-04-09T12:55:00Z
9
value 0.00416
scoring_system epss
scoring_elements 0.61732
published_at 2026-04-11T12:55:00Z
10
value 0.00416
scoring_system epss
scoring_elements 0.6172
published_at 2026-04-12T12:55:00Z
11
value 0.00416
scoring_system epss
scoring_elements 0.617
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-28875
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28875
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28875
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1949194
reference_id 1949194
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1949194
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986803
reference_id 986803
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986803
6
reference_url https://security.archlinux.org/AVG-1803
reference_id AVG-1803
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1803
7
reference_url https://security.gentoo.org/glsa/202210-09
reference_id GLSA-202210-09
reference_type
scores
url https://security.gentoo.org/glsa/202210-09
8
reference_url https://access.redhat.com/errata/RHSA-2021:3042
reference_id RHSA-2021:3042
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3042
9
reference_url https://access.redhat.com/errata/RHSA-2021:3063
reference_id RHSA-2021:3063
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3063
fixed_packages
0
url pkg:ebuild/dev-lang/rust-bin@1.63.0-r1
purl pkg:ebuild/dev-lang/rust-bin@1.63.0-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/rust-bin@1.63.0-r1
1
url pkg:ebuild/dev-lang/rust-bin@1.64.0
purl pkg:ebuild/dev-lang/rust-bin@1.64.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/rust-bin@1.64.0
aliases CVE-2021-28875
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4khp-kevq-xff5
1
url VCID-69zd-gcvx-fuhr
vulnerability_id VCID-69zd-gcvx-fuhr
summary Multiple vulnerabilities have been discovered in Rust, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-42574.json
reference_id
reference_type
scores
0
value 8.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-42574.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-42574
reference_id
reference_type
scores
0
value 0.24988
scoring_system epss
scoring_elements 0.96175
published_at 2026-04-16T12:55:00Z
1
value 0.24988
scoring_system epss
scoring_elements 0.96167
published_at 2026-04-13T12:55:00Z
2
value 0.24988
scoring_system epss
scoring_elements 0.96165
published_at 2026-04-12T12:55:00Z
3
value 0.24988
scoring_system epss
scoring_elements 0.9618
published_at 2026-04-18T12:55:00Z
4
value 0.25471
scoring_system epss
scoring_elements 0.96232
published_at 2026-04-21T12:55:00Z
5
value 0.25471
scoring_system epss
scoring_elements 0.96181
published_at 2026-04-01T12:55:00Z
6
value 0.25471
scoring_system epss
scoring_elements 0.96189
published_at 2026-04-02T12:55:00Z
7
value 0.25471
scoring_system epss
scoring_elements 0.96197
published_at 2026-04-04T12:55:00Z
8
value 0.25471
scoring_system epss
scoring_elements 0.962
published_at 2026-04-07T12:55:00Z
9
value 0.25471
scoring_system epss
scoring_elements 0.9621
published_at 2026-04-08T12:55:00Z
10
value 0.25471
scoring_system epss
scoring_elements 0.96213
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-42574
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42574
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42574
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url http://www.openwall.com/lists/oss-security/2021/11/01/1
reference_id 1
reference_type
scores
0
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-11T15:16:49Z/
url http://www.openwall.com/lists/oss-security/2021/11/01/1
5
reference_url http://www.openwall.com/lists/oss-security/2021/11/02/10
reference_id 10
reference_type
scores
0
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-11T15:16:49Z/
url http://www.openwall.com/lists/oss-security/2021/11/02/10
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2005819
reference_id 2005819
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2005819
7
reference_url http://www.openwall.com/lists/oss-security/2021/11/01/4
reference_id 4
reference_type
scores
0
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-11T15:16:49Z/
url http://www.openwall.com/lists/oss-security/2021/11/01/4
8
reference_url http://www.openwall.com/lists/oss-security/2021/11/01/5
reference_id 5
reference_type
scores
0
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-11T15:16:49Z/
url http://www.openwall.com/lists/oss-security/2021/11/01/5
9
reference_url http://www.openwall.com/lists/oss-security/2021/11/01/6
reference_id 6
reference_type
scores
0
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-11T15:16:49Z/
url http://www.openwall.com/lists/oss-security/2021/11/01/6
10
reference_url https://www.kb.cert.org/vuls/id/999008
reference_id 999008
reference_type
scores
0
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-11T15:16:49Z/
url https://www.kb.cert.org/vuls/id/999008
11
reference_url https://security.archlinux.org/AVG-2506
reference_id AVG-2506
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2506
12
reference_url https://security.gentoo.org/glsa/202210-09
reference_id GLSA-202210-09
reference_type
scores
0
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-11T15:16:49Z/
url https://security.gentoo.org/glsa/202210-09
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IH2RG5YTR6ZZOLUV3EUPZEIJR7XHJLVD/
reference_id IH2RG5YTR6ZZOLUV3EUPZEIJR7XHJLVD
reference_type
scores
0
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-11T15:16:49Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IH2RG5YTR6ZZOLUV3EUPZEIJR7XHJLVD/
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LQNTFF24ROHLVPLUOEISBN3F7QM27L4U/
reference_id LQNTFF24ROHLVPLUOEISBN3F7QM27L4U
reference_type
scores
0
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-11T15:16:49Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LQNTFF24ROHLVPLUOEISBN3F7QM27L4U/
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QUPA37D57VPTDLSXOOGF4UXUEADOC4PQ/
reference_id QUPA37D57VPTDLSXOOGF4UXUEADOC4PQ
reference_type
scores
0
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-11T15:16:49Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QUPA37D57VPTDLSXOOGF4UXUEADOC4PQ/
16
reference_url https://access.redhat.com/errata/RHSA-2021:4033
reference_id RHSA-2021:4033
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4033
17
reference_url https://access.redhat.com/errata/RHSA-2021:4034
reference_id RHSA-2021:4034
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4034
18
reference_url https://access.redhat.com/errata/RHSA-2021:4035
reference_id RHSA-2021:4035
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4035
19
reference_url https://access.redhat.com/errata/RHSA-2021:4036
reference_id RHSA-2021:4036
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4036
20
reference_url https://access.redhat.com/errata/RHSA-2021:4037
reference_id RHSA-2021:4037
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4037
21
reference_url https://access.redhat.com/errata/RHSA-2021:4038
reference_id RHSA-2021:4038
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4038
22
reference_url https://access.redhat.com/errata/RHSA-2021:4039
reference_id RHSA-2021:4039
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4039
23
reference_url https://access.redhat.com/errata/RHSA-2021:4585
reference_id RHSA-2021:4585
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4585
24
reference_url https://access.redhat.com/errata/RHSA-2021:4586
reference_id RHSA-2021:4586
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4586
25
reference_url https://access.redhat.com/errata/RHSA-2021:4587
reference_id RHSA-2021:4587
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4587
26
reference_url https://access.redhat.com/errata/RHSA-2021:4588
reference_id RHSA-2021:4588
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4588
27
reference_url https://access.redhat.com/errata/RHSA-2021:4589
reference_id RHSA-2021:4589
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4589
28
reference_url https://access.redhat.com/errata/RHSA-2021:4590
reference_id RHSA-2021:4590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4590
29
reference_url https://access.redhat.com/errata/RHSA-2021:4591
reference_id RHSA-2021:4591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4591
30
reference_url https://access.redhat.com/errata/RHSA-2021:4592
reference_id RHSA-2021:4592
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4592
31
reference_url https://access.redhat.com/errata/RHSA-2021:4593
reference_id RHSA-2021:4593
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4593
32
reference_url https://access.redhat.com/errata/RHSA-2021:4594
reference_id RHSA-2021:4594
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4594
33
reference_url https://access.redhat.com/errata/RHSA-2021:4595
reference_id RHSA-2021:4595
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4595
34
reference_url https://access.redhat.com/errata/RHSA-2021:4596
reference_id RHSA-2021:4596
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4596
35
reference_url https://access.redhat.com/errata/RHSA-2021:4598
reference_id RHSA-2021:4598
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4598
36
reference_url https://access.redhat.com/errata/RHSA-2021:4599
reference_id RHSA-2021:4599
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4599
37
reference_url https://access.redhat.com/errata/RHSA-2021:4600
reference_id RHSA-2021:4600
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4600
38
reference_url https://access.redhat.com/errata/RHSA-2021:4601
reference_id RHSA-2021:4601
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4601
39
reference_url https://access.redhat.com/errata/RHSA-2021:4602
reference_id RHSA-2021:4602
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4602
40
reference_url https://access.redhat.com/errata/RHSA-2021:4649
reference_id RHSA-2021:4649
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4649
41
reference_url https://access.redhat.com/errata/RHSA-2021:4669
reference_id RHSA-2021:4669
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4669
42
reference_url https://access.redhat.com/errata/RHSA-2021:4694
reference_id RHSA-2021:4694
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4694
43
reference_url https://access.redhat.com/errata/RHSA-2021:4723
reference_id RHSA-2021:4723
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4723
44
reference_url https://access.redhat.com/errata/RHSA-2021:4724
reference_id RHSA-2021:4724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4724
45
reference_url https://access.redhat.com/errata/RHSA-2021:4729
reference_id RHSA-2021:4729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4729
46
reference_url https://access.redhat.com/errata/RHSA-2021:4730
reference_id RHSA-2021:4730
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4730
47
reference_url https://access.redhat.com/errata/RHSA-2021:4743
reference_id RHSA-2021:4743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4743
48
reference_url https://www.starwindsoftware.com/security/sw-20220804-0002/
reference_id sw-20220804-0002
reference_type
scores
0
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-11T15:16:49Z/
url https://www.starwindsoftware.com/security/sw-20220804-0002/
49
reference_url https://www.unicode.org/reports/tr31/
reference_id tr31
reference_type
scores
0
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-11T15:16:49Z/
url https://www.unicode.org/reports/tr31/
50
reference_url https://www.unicode.org/reports/tr36/
reference_id tr36
reference_type
scores
0
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-11T15:16:49Z/
url https://www.unicode.org/reports/tr36/
51
reference_url https://www.unicode.org/reports/tr39/
reference_id tr39
reference_type
scores
0
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-11T15:16:49Z/
url https://www.unicode.org/reports/tr39/
52
reference_url https://www.unicode.org/reports/tr9/tr9-44.html#HL4
reference_id tr9-44.html#HL4
reference_type
scores
0
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-11T15:16:49Z/
url https://www.unicode.org/reports/tr9/tr9-44.html#HL4
53
reference_url https://www.scyon.nl/post/trojans-in-your-source-code
reference_id trojans-in-your-source-code
reference_type
scores
0
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-11T15:16:49Z/
url https://www.scyon.nl/post/trojans-in-your-source-code
54
reference_url https://trojansource.codes
reference_id trojansource.codes
reference_type
scores
0
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-11T15:16:49Z/
url https://trojansource.codes
55
reference_url http://www.unicode.org/versions/Unicode14.0.0/
reference_id Unicode14.0.0
reference_type
scores
0
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-11T15:16:49Z/
url http://www.unicode.org/versions/Unicode14.0.0/
fixed_packages
0
url pkg:ebuild/dev-lang/rust-bin@1.63.0-r1
purl pkg:ebuild/dev-lang/rust-bin@1.63.0-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/rust-bin@1.63.0-r1
1
url pkg:ebuild/dev-lang/rust-bin@1.64.0
purl pkg:ebuild/dev-lang/rust-bin@1.64.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/rust-bin@1.64.0
aliases CVE-2021-42574
risk_score 3.9
exploitability 0.5
weighted_severity 7.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-69zd-gcvx-fuhr
2
url VCID-7ap9-xghv-dbdy
vulnerability_id VCID-7ap9-xghv-dbdy
summary Multiple vulnerabilities have been discovered in Rust, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28876.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28876.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-28876
reference_id
reference_type
scores
0
value 0.00419
scoring_system epss
scoring_elements 0.61752
published_at 2026-04-01T12:55:00Z
1
value 0.00419
scoring_system epss
scoring_elements 0.61912
published_at 2026-04-21T12:55:00Z
2
value 0.00419
scoring_system epss
scoring_elements 0.61924
published_at 2026-04-16T12:55:00Z
3
value 0.00419
scoring_system epss
scoring_elements 0.61929
published_at 2026-04-18T12:55:00Z
4
value 0.00419
scoring_system epss
scoring_elements 0.61826
published_at 2026-04-02T12:55:00Z
5
value 0.00419
scoring_system epss
scoring_elements 0.61857
published_at 2026-04-04T12:55:00Z
6
value 0.00419
scoring_system epss
scoring_elements 0.61827
published_at 2026-04-07T12:55:00Z
7
value 0.00419
scoring_system epss
scoring_elements 0.61876
published_at 2026-04-08T12:55:00Z
8
value 0.00419
scoring_system epss
scoring_elements 0.61892
published_at 2026-04-09T12:55:00Z
9
value 0.00419
scoring_system epss
scoring_elements 0.61913
published_at 2026-04-11T12:55:00Z
10
value 0.00419
scoring_system epss
scoring_elements 0.61901
published_at 2026-04-12T12:55:00Z
11
value 0.00419
scoring_system epss
scoring_elements 0.61881
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-28876
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28876
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28876
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1949198
reference_id 1949198
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1949198
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986803
reference_id 986803
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986803
6
reference_url https://security.archlinux.org/AVG-1801
reference_id AVG-1801
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1801
7
reference_url https://security.gentoo.org/glsa/202210-09
reference_id GLSA-202210-09
reference_type
scores
url https://security.gentoo.org/glsa/202210-09
8
reference_url https://access.redhat.com/errata/RHSA-2021:3042
reference_id RHSA-2021:3042
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3042
9
reference_url https://access.redhat.com/errata/RHSA-2021:3063
reference_id RHSA-2021:3063
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3063
fixed_packages
0
url pkg:ebuild/dev-lang/rust-bin@1.63.0-r1
purl pkg:ebuild/dev-lang/rust-bin@1.63.0-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/rust-bin@1.63.0-r1
1
url pkg:ebuild/dev-lang/rust-bin@1.64.0
purl pkg:ebuild/dev-lang/rust-bin@1.64.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/rust-bin@1.64.0
aliases CVE-2021-28876
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7ap9-xghv-dbdy
3
url VCID-7mnt-kvuh-cfba
vulnerability_id VCID-7mnt-kvuh-cfba
summary Multiple vulnerabilities have been discovered in Rust, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-42694.json
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-42694.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-42694
reference_id
reference_type
scores
0
value 0.05247
scoring_system epss
scoring_elements 0.89939
published_at 2026-04-01T12:55:00Z
1
value 0.07635
scoring_system epss
scoring_elements 0.91893
published_at 2026-04-18T12:55:00Z
2
value 0.07635
scoring_system epss
scoring_elements 0.91896
published_at 2026-04-16T12:55:00Z
3
value 0.07635
scoring_system epss
scoring_elements 0.91881
published_at 2026-04-12T12:55:00Z
4
value 0.07635
scoring_system epss
scoring_elements 0.91877
published_at 2026-04-13T12:55:00Z
5
value 0.07635
scoring_system epss
scoring_elements 0.91872
published_at 2026-04-08T12:55:00Z
6
value 0.07635
scoring_system epss
scoring_elements 0.91851
published_at 2026-04-04T12:55:00Z
7
value 0.07635
scoring_system epss
scoring_elements 0.91859
published_at 2026-04-07T12:55:00Z
8
value 0.07635
scoring_system epss
scoring_elements 0.91845
published_at 2026-04-02T12:55:00Z
9
value 0.0844
scoring_system epss
scoring_elements 0.92356
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-42694
2
reference_url http://www.openwall.com/lists/oss-security/2021/11/01/1
reference_id 1
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-07-18T17:31:01Z/
url http://www.openwall.com/lists/oss-security/2021/11/01/1
3
reference_url https://cwe.mitre.org/data/definitions/1007.html
reference_id 1007.html
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-07-18T17:31:01Z/
url https://cwe.mitre.org/data/definitions/1007.html
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2015365
reference_id 2015365
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2015365
5
reference_url http://www.openwall.com/lists/oss-security/2021/11/01/6
reference_id 6
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-07-18T17:31:01Z/
url http://www.openwall.com/lists/oss-security/2021/11/01/6
6
reference_url https://www.kb.cert.org/vuls/id/999008
reference_id 999008
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-07-18T17:31:01Z/
url https://www.kb.cert.org/vuls/id/999008
7
reference_url https://security.archlinux.org/AVG-2507
reference_id AVG-2507
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2507
8
reference_url https://security.gentoo.org/glsa/202210-09
reference_id GLSA-202210-09
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-07-18T17:31:01Z/
url https://security.gentoo.org/glsa/202210-09
9
reference_url https://www.unicode.org/reports/tr36/
reference_id tr36
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-07-18T17:31:01Z/
url https://www.unicode.org/reports/tr36/
10
reference_url https://www.unicode.org/reports/tr39/
reference_id tr39
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-07-18T17:31:01Z/
url https://www.unicode.org/reports/tr39/
11
reference_url https://www.scyon.nl/post/trojans-in-your-source-code
reference_id trojans-in-your-source-code
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-07-18T17:31:01Z/
url https://www.scyon.nl/post/trojans-in-your-source-code
12
reference_url https://trojansource.codes
reference_id trojansource.codes
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-07-18T17:31:01Z/
url https://trojansource.codes
13
reference_url http://www.unicode.org/versions/Unicode14.0.0/
reference_id Unicode14.0.0
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-07-18T17:31:01Z/
url http://www.unicode.org/versions/Unicode14.0.0/
fixed_packages
0
url pkg:ebuild/dev-lang/rust-bin@1.63.0-r1
purl pkg:ebuild/dev-lang/rust-bin@1.63.0-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/rust-bin@1.63.0-r1
1
url pkg:ebuild/dev-lang/rust-bin@1.64.0
purl pkg:ebuild/dev-lang/rust-bin@1.64.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/rust-bin@1.64.0
aliases CVE-2021-42694
risk_score 3.8
exploitability 0.5
weighted_severity 7.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7mnt-kvuh-cfba
4
url VCID-d8yv-ngej-1kf7
vulnerability_id VCID-d8yv-ngej-1kf7
summary Multiple vulnerabilities have been discovered in Rust, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-31162.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-31162.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-31162
reference_id
reference_type
scores
0
value 0.00737
scoring_system epss
scoring_elements 0.72765
published_at 2026-04-01T12:55:00Z
1
value 0.00737
scoring_system epss
scoring_elements 0.72864
published_at 2026-04-21T12:55:00Z
2
value 0.00737
scoring_system epss
scoring_elements 0.72862
published_at 2026-04-16T12:55:00Z
3
value 0.00737
scoring_system epss
scoring_elements 0.72873
published_at 2026-04-18T12:55:00Z
4
value 0.00737
scoring_system epss
scoring_elements 0.72773
published_at 2026-04-02T12:55:00Z
5
value 0.00737
scoring_system epss
scoring_elements 0.72793
published_at 2026-04-04T12:55:00Z
6
value 0.00737
scoring_system epss
scoring_elements 0.72769
published_at 2026-04-07T12:55:00Z
7
value 0.00737
scoring_system epss
scoring_elements 0.72808
published_at 2026-04-08T12:55:00Z
8
value 0.00737
scoring_system epss
scoring_elements 0.72822
published_at 2026-04-09T12:55:00Z
9
value 0.00737
scoring_system epss
scoring_elements 0.72846
published_at 2026-04-11T12:55:00Z
10
value 0.00737
scoring_system epss
scoring_elements 0.72829
published_at 2026-04-12T12:55:00Z
11
value 0.00737
scoring_system epss
scoring_elements 0.72821
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-31162
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31162
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31162
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1950398
reference_id 1950398
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1950398
5
reference_url https://security.archlinux.org/AVG-1801
reference_id AVG-1801
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1801
6
reference_url https://security.gentoo.org/glsa/202210-09
reference_id GLSA-202210-09
reference_type
scores
url https://security.gentoo.org/glsa/202210-09
7
reference_url https://access.redhat.com/errata/RHSA-2021:3042
reference_id RHSA-2021:3042
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3042
8
reference_url https://access.redhat.com/errata/RHSA-2021:3063
reference_id RHSA-2021:3063
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3063
fixed_packages
0
url pkg:ebuild/dev-lang/rust-bin@1.63.0-r1
purl pkg:ebuild/dev-lang/rust-bin@1.63.0-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/rust-bin@1.63.0-r1
1
url pkg:ebuild/dev-lang/rust-bin@1.64.0
purl pkg:ebuild/dev-lang/rust-bin@1.64.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/rust-bin@1.64.0
aliases CVE-2021-31162
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d8yv-ngej-1kf7
5
url VCID-e29z-agvj-jkdn
vulnerability_id VCID-e29z-agvj-jkdn
summary Multiple vulnerabilities have been discovered in Rust, the worst of which could result in denial of service.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-36318
reference_id
reference_type
scores
0
value 0.00041
scoring_system epss
scoring_elements 0.12356
published_at 2026-04-01T12:55:00Z
1
value 0.00041
scoring_system epss
scoring_elements 0.12464
published_at 2026-04-02T12:55:00Z
2
value 0.00041
scoring_system epss
scoring_elements 0.12507
published_at 2026-04-04T12:55:00Z
3
value 0.00041
scoring_system epss
scoring_elements 0.12312
published_at 2026-04-07T12:55:00Z
4
value 0.00041
scoring_system epss
scoring_elements 0.12391
published_at 2026-04-08T12:55:00Z
5
value 0.00041
scoring_system epss
scoring_elements 0.12441
published_at 2026-04-09T12:55:00Z
6
value 0.00041
scoring_system epss
scoring_elements 0.12448
published_at 2026-04-11T12:55:00Z
7
value 0.00041
scoring_system epss
scoring_elements 0.1241
published_at 2026-04-12T12:55:00Z
8
value 0.00041
scoring_system epss
scoring_elements 0.1237
published_at 2026-04-13T12:55:00Z
9
value 0.00041
scoring_system epss
scoring_elements 0.12271
published_at 2026-04-16T12:55:00Z
10
value 0.00041
scoring_system epss
scoring_elements 0.1227
published_at 2026-04-18T12:55:00Z
11
value 0.00041
scoring_system epss
scoring_elements 0.12375
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-36318
1
reference_url https://security.gentoo.org/glsa/202210-09
reference_id GLSA-202210-09
reference_type
scores
url https://security.gentoo.org/glsa/202210-09
fixed_packages
0
url pkg:ebuild/dev-lang/rust-bin@1.63.0-r1
purl pkg:ebuild/dev-lang/rust-bin@1.63.0-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/rust-bin@1.63.0-r1
1
url pkg:ebuild/dev-lang/rust-bin@1.64.0
purl pkg:ebuild/dev-lang/rust-bin@1.64.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/rust-bin@1.64.0
aliases CVE-2021-36318
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e29z-agvj-jkdn
6
url VCID-f4bw-5erp-4uc6
vulnerability_id VCID-f4bw-5erp-4uc6
summary Multiple vulnerabilities have been discovered in Rust, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29922.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29922.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-29922
reference_id
reference_type
scores
0
value 0.00325
scoring_system epss
scoring_elements 0.5542
published_at 2026-04-01T12:55:00Z
1
value 0.00325
scoring_system epss
scoring_elements 0.55577
published_at 2026-04-21T12:55:00Z
2
value 0.00325
scoring_system epss
scoring_elements 0.55595
published_at 2026-04-16T12:55:00Z
3
value 0.00325
scoring_system epss
scoring_elements 0.55598
published_at 2026-04-18T12:55:00Z
4
value 0.00325
scoring_system epss
scoring_elements 0.55531
published_at 2026-04-02T12:55:00Z
5
value 0.00325
scoring_system epss
scoring_elements 0.55557
published_at 2026-04-04T12:55:00Z
6
value 0.00325
scoring_system epss
scoring_elements 0.55533
published_at 2026-04-07T12:55:00Z
7
value 0.00325
scoring_system epss
scoring_elements 0.55585
published_at 2026-04-08T12:55:00Z
8
value 0.00325
scoring_system epss
scoring_elements 0.55587
published_at 2026-04-09T12:55:00Z
9
value 0.00325
scoring_system epss
scoring_elements 0.55596
published_at 2026-04-11T12:55:00Z
10
value 0.00325
scoring_system epss
scoring_elements 0.55576
published_at 2026-04-12T12:55:00Z
11
value 0.00325
scoring_system epss
scoring_elements 0.55558
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-29922
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29922
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29922
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1991962
reference_id 1991962
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1991962
5
reference_url https://security.archlinux.org/AVG-2263
reference_id AVG-2263
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2263
6
reference_url https://security.gentoo.org/glsa/202210-09
reference_id GLSA-202210-09
reference_type
scores
url https://security.gentoo.org/glsa/202210-09
7
reference_url https://access.redhat.com/errata/RHSA-2021:4270
reference_id RHSA-2021:4270
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4270
fixed_packages
0
url pkg:ebuild/dev-lang/rust-bin@1.63.0-r1
purl pkg:ebuild/dev-lang/rust-bin@1.63.0-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/rust-bin@1.63.0-r1
1
url pkg:ebuild/dev-lang/rust-bin@1.64.0
purl pkg:ebuild/dev-lang/rust-bin@1.64.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/rust-bin@1.64.0
aliases CVE-2021-29922
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f4bw-5erp-4uc6
7
url VCID-fu46-5dhv-ckdt
vulnerability_id VCID-fu46-5dhv-ckdt
summary Multiple vulnerabilities have been discovered in Rust, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28877.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28877.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-28877
reference_id
reference_type
scores
0
value 0.00274
scoring_system epss
scoring_elements 0.50792
published_at 2026-04-01T12:55:00Z
1
value 0.00274
scoring_system epss
scoring_elements 0.50914
published_at 2026-04-21T12:55:00Z
2
value 0.00274
scoring_system epss
scoring_elements 0.5089
published_at 2026-04-13T12:55:00Z
3
value 0.00274
scoring_system epss
scoring_elements 0.50934
published_at 2026-04-18T12:55:00Z
4
value 0.00274
scoring_system epss
scoring_elements 0.50847
published_at 2026-04-02T12:55:00Z
5
value 0.00274
scoring_system epss
scoring_elements 0.50873
published_at 2026-04-04T12:55:00Z
6
value 0.00274
scoring_system epss
scoring_elements 0.50831
published_at 2026-04-07T12:55:00Z
7
value 0.00274
scoring_system epss
scoring_elements 0.50888
published_at 2026-04-08T12:55:00Z
8
value 0.00274
scoring_system epss
scoring_elements 0.50886
published_at 2026-04-09T12:55:00Z
9
value 0.00274
scoring_system epss
scoring_elements 0.50928
published_at 2026-04-16T12:55:00Z
10
value 0.00274
scoring_system epss
scoring_elements 0.50907
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-28877
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28877
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28877
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1949204
reference_id 1949204
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1949204
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986803
reference_id 986803
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986803
6
reference_url https://security.archlinux.org/AVG-1802
reference_id AVG-1802
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1802
7
reference_url https://security.gentoo.org/glsa/202210-09
reference_id GLSA-202210-09
reference_type
scores
url https://security.gentoo.org/glsa/202210-09
8
reference_url https://access.redhat.com/errata/RHSA-2021:3042
reference_id RHSA-2021:3042
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3042
9
reference_url https://access.redhat.com/errata/RHSA-2021:3063
reference_id RHSA-2021:3063
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3063
fixed_packages
0
url pkg:ebuild/dev-lang/rust-bin@1.63.0-r1
purl pkg:ebuild/dev-lang/rust-bin@1.63.0-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/rust-bin@1.63.0-r1
1
url pkg:ebuild/dev-lang/rust-bin@1.64.0
purl pkg:ebuild/dev-lang/rust-bin@1.64.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/rust-bin@1.64.0
aliases CVE-2021-28877
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fu46-5dhv-ckdt
8
url VCID-hh53-d664-akdu
vulnerability_id VCID-hh53-d664-akdu
summary Multiple vulnerabilities have been discovered in Rust, the worst of which could result in denial of service.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-36317
reference_id
reference_type
scores
0
value 0.00037
scoring_system epss
scoring_elements 0.10808
published_at 2026-04-01T12:55:00Z
1
value 0.00037
scoring_system epss
scoring_elements 0.10943
published_at 2026-04-02T12:55:00Z
2
value 0.00037
scoring_system epss
scoring_elements 0.11006
published_at 2026-04-04T12:55:00Z
3
value 0.00037
scoring_system epss
scoring_elements 0.10831
published_at 2026-04-07T12:55:00Z
4
value 0.00037
scoring_system epss
scoring_elements 0.10906
published_at 2026-04-08T12:55:00Z
5
value 0.00037
scoring_system epss
scoring_elements 0.10959
published_at 2026-04-09T12:55:00Z
6
value 0.00037
scoring_system epss
scoring_elements 0.1096
published_at 2026-04-11T12:55:00Z
7
value 0.00037
scoring_system epss
scoring_elements 0.10928
published_at 2026-04-12T12:55:00Z
8
value 0.00037
scoring_system epss
scoring_elements 0.10904
published_at 2026-04-13T12:55:00Z
9
value 0.00037
scoring_system epss
scoring_elements 0.10769
published_at 2026-04-16T12:55:00Z
10
value 0.00037
scoring_system epss
scoring_elements 0.10782
published_at 2026-04-18T12:55:00Z
11
value 0.00037
scoring_system epss
scoring_elements 0.10903
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-36317
1
reference_url https://security.gentoo.org/glsa/202210-09
reference_id GLSA-202210-09
reference_type
scores
url https://security.gentoo.org/glsa/202210-09
fixed_packages
0
url pkg:ebuild/dev-lang/rust-bin@1.63.0-r1
purl pkg:ebuild/dev-lang/rust-bin@1.63.0-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/rust-bin@1.63.0-r1
1
url pkg:ebuild/dev-lang/rust-bin@1.64.0
purl pkg:ebuild/dev-lang/rust-bin@1.64.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/rust-bin@1.64.0
aliases CVE-2021-36317
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hh53-d664-akdu
9
url VCID-j9kg-rd4y-y7by
vulnerability_id VCID-j9kg-rd4y-y7by
summary Multiple vulnerabilities have been discovered in Rust, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21658.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21658.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21658
reference_id
reference_type
scores
0
value 0.00893
scoring_system epss
scoring_elements 0.7552
published_at 2026-04-02T12:55:00Z
1
value 0.00893
scoring_system epss
scoring_elements 0.7555
published_at 2026-04-04T12:55:00Z
2
value 0.00893
scoring_system epss
scoring_elements 0.75582
published_at 2026-04-13T12:55:00Z
3
value 0.00893
scoring_system epss
scoring_elements 0.75589
published_at 2026-04-12T12:55:00Z
4
value 0.00893
scoring_system epss
scoring_elements 0.75608
published_at 2026-04-11T12:55:00Z
5
value 0.00893
scoring_system epss
scoring_elements 0.75583
published_at 2026-04-09T12:55:00Z
6
value 0.00893
scoring_system epss
scoring_elements 0.75572
published_at 2026-04-08T12:55:00Z
7
value 0.00893
scoring_system epss
scoring_elements 0.7553
published_at 2026-04-07T12:55:00Z
8
value 0.00906
scoring_system epss
scoring_elements 0.75778
published_at 2026-04-21T12:55:00Z
9
value 0.00906
scoring_system epss
scoring_elements 0.75793
published_at 2026-04-18T12:55:00Z
10
value 0.00906
scoring_system epss
scoring_elements 0.75789
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21658
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21658
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2041504
reference_id 2041504
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2041504
5
reference_url https://github.com/rust-lang/rust/pull/93110/commits/32ed6e599bb4722efefd78bbc9cd7ec4613cb946
reference_id 32ed6e599bb4722efefd78bbc9cd7ec4613cb946
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:52:12Z/
url https://github.com/rust-lang/rust/pull/93110/commits/32ed6e599bb4722efefd78bbc9cd7ec4613cb946
6
reference_url https://github.com/rust-lang/rust/pull/93110/commits/406cc071d6cfdfdb678bf3d83d766851de95abaf
reference_id 406cc071d6cfdfdb678bf3d83d766851de95abaf
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:52:12Z/
url https://github.com/rust-lang/rust/pull/93110/commits/406cc071d6cfdfdb678bf3d83d766851de95abaf
7
reference_url https://github.com/rust-lang/rust/pull/93110/commits/4f0ad1c92ca08da6e8dc17838070975762f59714
reference_id 4f0ad1c92ca08da6e8dc17838070975762f59714
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:52:12Z/
url https://github.com/rust-lang/rust/pull/93110/commits/4f0ad1c92ca08da6e8dc17838070975762f59714
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7JKZDTBMGAWIFJSNWKBMPO5EAKRR4BEW/
reference_id 7JKZDTBMGAWIFJSNWKBMPO5EAKRR4BEW
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:52:12Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7JKZDTBMGAWIFJSNWKBMPO5EAKRR4BEW/
9
reference_url https://github.com/rust-lang/rust/pull/93110
reference_id 93110
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:52:12Z/
url https://github.com/rust-lang/rust/pull/93110
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BK32QZLHDC2OVLPKTUHNT2G3VHWHD4LX/
reference_id BK32QZLHDC2OVLPKTUHNT2G3VHWHD4LX
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:52:12Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BK32QZLHDC2OVLPKTUHNT2G3VHWHD4LX/
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C63NH72Q7UHJM5V3IVYRI7LVBGGFQMSQ/
reference_id C63NH72Q7UHJM5V3IVYRI7LVBGGFQMSQ
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:52:12Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C63NH72Q7UHJM5V3IVYRI7LVBGGFQMSQ/
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKGTACKMKAPRDPWPTU26GYWBELIRFF5N/
reference_id CKGTACKMKAPRDPWPTU26GYWBELIRFF5N
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:52:12Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKGTACKMKAPRDPWPTU26GYWBELIRFF5N/
13
reference_url https://blog.rust-lang.org/2022/01/20/cve-2022-21658.html
reference_id cve-2022-21658.html
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:52:12Z/
url https://blog.rust-lang.org/2022/01/20/cve-2022-21658.html
14
reference_url https://github.com/rust-lang/rust/security/advisories/GHSA-r9cc-f5pr-p3j2
reference_id GHSA-r9cc-f5pr-p3j2
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:52:12Z/
url https://github.com/rust-lang/rust/security/advisories/GHSA-r9cc-f5pr-p3j2
15
reference_url https://security.gentoo.org/glsa/202210-09
reference_id GLSA-202210-09
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:52:12Z/
url https://security.gentoo.org/glsa/202210-09
16
reference_url https://support.apple.com/kb/HT213182
reference_id HT213182
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:52:12Z/
url https://support.apple.com/kb/HT213182
17
reference_url https://support.apple.com/kb/HT213183
reference_id HT213183
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:52:12Z/
url https://support.apple.com/kb/HT213183
18
reference_url https://support.apple.com/kb/HT213186
reference_id HT213186
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:52:12Z/
url https://support.apple.com/kb/HT213186
19
reference_url https://support.apple.com/kb/HT213193
reference_id HT213193
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:52:12Z/
url https://support.apple.com/kb/HT213193
20
reference_url https://access.redhat.com/errata/RHSA-2022:1894
reference_id RHSA-2022:1894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1894
fixed_packages
0
url pkg:ebuild/dev-lang/rust-bin@1.63.0-r1
purl pkg:ebuild/dev-lang/rust-bin@1.63.0-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/rust-bin@1.63.0-r1
1
url pkg:ebuild/dev-lang/rust-bin@1.64.0
purl pkg:ebuild/dev-lang/rust-bin@1.64.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/rust-bin@1.64.0
aliases CVE-2022-21658
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j9kg-rd4y-y7by
10
url VCID-pbjz-th4w-tqgb
vulnerability_id VCID-pbjz-th4w-tqgb
summary Multiple vulnerabilities have been discovered in Rust, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28879.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28879.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-28879
reference_id
reference_type
scores
0
value 0.011
scoring_system epss
scoring_elements 0.77984
published_at 2026-04-01T12:55:00Z
1
value 0.011
scoring_system epss
scoring_elements 0.78069
published_at 2026-04-21T12:55:00Z
2
value 0.011
scoring_system epss
scoring_elements 0.78077
published_at 2026-04-16T12:55:00Z
3
value 0.011
scoring_system epss
scoring_elements 0.78075
published_at 2026-04-18T12:55:00Z
4
value 0.011
scoring_system epss
scoring_elements 0.77992
published_at 2026-04-02T12:55:00Z
5
value 0.011
scoring_system epss
scoring_elements 0.78022
published_at 2026-04-04T12:55:00Z
6
value 0.011
scoring_system epss
scoring_elements 0.78004
published_at 2026-04-07T12:55:00Z
7
value 0.011
scoring_system epss
scoring_elements 0.7803
published_at 2026-04-08T12:55:00Z
8
value 0.011
scoring_system epss
scoring_elements 0.78035
published_at 2026-04-09T12:55:00Z
9
value 0.011
scoring_system epss
scoring_elements 0.78061
published_at 2026-04-11T12:55:00Z
10
value 0.011
scoring_system epss
scoring_elements 0.78044
published_at 2026-04-12T12:55:00Z
11
value 0.011
scoring_system epss
scoring_elements 0.78041
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-28879
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28879
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1949211
reference_id 1949211
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1949211
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986803
reference_id 986803
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986803
6
reference_url https://security.archlinux.org/AVG-1801
reference_id AVG-1801
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1801
7
reference_url https://security.gentoo.org/glsa/202210-09
reference_id GLSA-202210-09
reference_type
scores
url https://security.gentoo.org/glsa/202210-09
8
reference_url https://access.redhat.com/errata/RHSA-2021:3042
reference_id RHSA-2021:3042
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3042
9
reference_url https://access.redhat.com/errata/RHSA-2021:3063
reference_id RHSA-2021:3063
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3063
fixed_packages
0
url pkg:ebuild/dev-lang/rust-bin@1.63.0-r1
purl pkg:ebuild/dev-lang/rust-bin@1.63.0-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/rust-bin@1.63.0-r1
1
url pkg:ebuild/dev-lang/rust-bin@1.64.0
purl pkg:ebuild/dev-lang/rust-bin@1.64.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/rust-bin@1.64.0
aliases CVE-2021-28879
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pbjz-th4w-tqgb
11
url VCID-pvm9-wtbx-1ubx
vulnerability_id VCID-pvm9-wtbx-1ubx
summary Multiple vulnerabilities have been discovered in Rust, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28878.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28878.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-28878
reference_id
reference_type
scores
0
value 0.01012
scoring_system epss
scoring_elements 0.77065
published_at 2026-04-01T12:55:00Z
1
value 0.01012
scoring_system epss
scoring_elements 0.77161
published_at 2026-04-21T12:55:00Z
2
value 0.01012
scoring_system epss
scoring_elements 0.77167
published_at 2026-04-16T12:55:00Z
3
value 0.01012
scoring_system epss
scoring_elements 0.77169
published_at 2026-04-18T12:55:00Z
4
value 0.01012
scoring_system epss
scoring_elements 0.77071
published_at 2026-04-02T12:55:00Z
5
value 0.01012
scoring_system epss
scoring_elements 0.771
published_at 2026-04-04T12:55:00Z
6
value 0.01012
scoring_system epss
scoring_elements 0.77082
published_at 2026-04-07T12:55:00Z
7
value 0.01012
scoring_system epss
scoring_elements 0.77115
published_at 2026-04-08T12:55:00Z
8
value 0.01012
scoring_system epss
scoring_elements 0.77124
published_at 2026-04-09T12:55:00Z
9
value 0.01012
scoring_system epss
scoring_elements 0.77152
published_at 2026-04-11T12:55:00Z
10
value 0.01012
scoring_system epss
scoring_elements 0.77131
published_at 2026-04-12T12:55:00Z
11
value 0.01012
scoring_system epss
scoring_elements 0.77126
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-28878
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28878
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28878
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1949207
reference_id 1949207
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1949207
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986803
reference_id 986803
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986803
6
reference_url https://security.archlinux.org/AVG-1801
reference_id AVG-1801
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1801
7
reference_url https://security.gentoo.org/glsa/202210-09
reference_id GLSA-202210-09
reference_type
scores
url https://security.gentoo.org/glsa/202210-09
8
reference_url https://access.redhat.com/errata/RHSA-2021:3042
reference_id RHSA-2021:3042
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3042
9
reference_url https://access.redhat.com/errata/RHSA-2021:3063
reference_id RHSA-2021:3063
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3063
fixed_packages
0
url pkg:ebuild/dev-lang/rust-bin@1.63.0-r1
purl pkg:ebuild/dev-lang/rust-bin@1.63.0-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/rust-bin@1.63.0-r1
1
url pkg:ebuild/dev-lang/rust-bin@1.64.0
purl pkg:ebuild/dev-lang/rust-bin@1.64.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/rust-bin@1.64.0
aliases CVE-2021-28878
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pvm9-wtbx-1ubx
12
url VCID-r9ky-9nbm-yucw
vulnerability_id VCID-r9ky-9nbm-yucw
summary Multiple vulnerabilities have been discovered in Rust, the worst of which could result in denial of service.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-36113
reference_id
reference_type
scores
0
value 0.08941
scoring_system epss
scoring_elements 0.9256
published_at 2026-04-02T12:55:00Z
1
value 0.08941
scoring_system epss
scoring_elements 0.92607
published_at 2026-04-21T12:55:00Z
2
value 0.08941
scoring_system epss
scoring_elements 0.92604
published_at 2026-04-18T12:55:00Z
3
value 0.08941
scoring_system epss
scoring_elements 0.92605
published_at 2026-04-16T12:55:00Z
4
value 0.08941
scoring_system epss
scoring_elements 0.92592
published_at 2026-04-12T12:55:00Z
5
value 0.08941
scoring_system epss
scoring_elements 0.92591
published_at 2026-04-13T12:55:00Z
6
value 0.08941
scoring_system epss
scoring_elements 0.92586
published_at 2026-04-09T12:55:00Z
7
value 0.08941
scoring_system epss
scoring_elements 0.92581
published_at 2026-04-08T12:55:00Z
8
value 0.08941
scoring_system epss
scoring_elements 0.9257
published_at 2026-04-07T12:55:00Z
9
value 0.08941
scoring_system epss
scoring_elements 0.92567
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-36113
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36113
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36113
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://github.com/rust-lang/cargo
reference_id
reference_type
scores
0
value 3.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/rust-lang/cargo
4
reference_url https://github.com/rust-lang/cargo/commit/15f1e4b0bf4b4fc20369e0a85d9b77957c4dd52a
reference_id
reference_type
scores
0
value 3.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/rust-lang/cargo/commit/15f1e4b0bf4b4fc20369e0a85d9b77957c4dd52a
5
reference_url https://github.com/rust-lang/cargo/commit/97b80919e404b0768ea31ae329c3b4da54bed05a
reference_id
reference_type
scores
0
value 3.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L
1
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L
2
value LOW
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:00:37Z/
url https://github.com/rust-lang/cargo/commit/97b80919e404b0768ea31ae329c3b4da54bed05a
6
reference_url https://github.com/rust-lang/cargo/commit/dafe4a7ea016739680ec7998aebe1bc6de131a5b
reference_id
reference_type
scores
0
value 3.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/rust-lang/cargo/commit/dafe4a7ea016739680ec7998aebe1bc6de131a5b
7
reference_url https://github.com/rust-lang/cargo/security/advisories/GHSA-rfj2-q3h3-hm5j
reference_id
reference_type
scores
0
value 3.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L
1
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L
2
value LOW
scoring_system cvssv3.1_qr
scoring_elements
3
value LOW
scoring_system generic_textual
scoring_elements
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:00:37Z/
url https://github.com/rust-lang/cargo/security/advisories/GHSA-rfj2-q3h3-hm5j
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-36113
reference_id
reference_type
scores
0
value 3.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L
1
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-36113
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021142
reference_id 1021142
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021142
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021143
reference_id 1021143
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021143
11
reference_url https://github.com/advisories/GHSA-rfj2-q3h3-hm5j
reference_id GHSA-rfj2-q3h3-hm5j
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-rfj2-q3h3-hm5j
12
reference_url https://security.gentoo.org/glsa/202210-09
reference_id GLSA-202210-09
reference_type
scores
0
value 3.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L
1
value LOW
scoring_system generic_textual
scoring_elements
url https://security.gentoo.org/glsa/202210-09
fixed_packages
0
url pkg:ebuild/dev-lang/rust-bin@1.63.0-r1
purl pkg:ebuild/dev-lang/rust-bin@1.63.0-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/rust-bin@1.63.0-r1
1
url pkg:ebuild/dev-lang/rust-bin@1.64.0
purl pkg:ebuild/dev-lang/rust-bin@1.64.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/rust-bin@1.64.0
aliases CVE-2022-36113, GHSA-rfj2-q3h3-hm5j
risk_score 2.0
exploitability 0.5
weighted_severity 4.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r9ky-9nbm-yucw
13
url VCID-ssct-y25y-3qbw
vulnerability_id VCID-ssct-y25y-3qbw
summary Multiple vulnerabilities have been discovered in Rust, the worst of which could result in denial of service.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-36114
reference_id
reference_type
scores
0
value 0.0048
scoring_system epss
scoring_elements 0.65047
published_at 2026-04-02T12:55:00Z
1
value 0.0048
scoring_system epss
scoring_elements 0.65109
published_at 2026-04-21T12:55:00Z
2
value 0.0048
scoring_system epss
scoring_elements 0.65125
published_at 2026-04-18T12:55:00Z
3
value 0.0048
scoring_system epss
scoring_elements 0.65116
published_at 2026-04-16T12:55:00Z
4
value 0.0048
scoring_system epss
scoring_elements 0.6508
published_at 2026-04-13T12:55:00Z
5
value 0.0048
scoring_system epss
scoring_elements 0.65108
published_at 2026-04-12T12:55:00Z
6
value 0.0048
scoring_system epss
scoring_elements 0.65118
published_at 2026-04-11T12:55:00Z
7
value 0.0048
scoring_system epss
scoring_elements 0.65099
published_at 2026-04-09T12:55:00Z
8
value 0.0048
scoring_system epss
scoring_elements 0.65086
published_at 2026-04-08T12:55:00Z
9
value 0.0048
scoring_system epss
scoring_elements 0.65036
published_at 2026-04-07T12:55:00Z
10
value 0.0048
scoring_system epss
scoring_elements 0.65074
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-36114
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36114
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36114
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://github.com/rust-lang/cargo
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rust-lang/cargo
4
reference_url https://github.com/rust-lang/cargo/commit/2b68d3c07a4a056264dc006ecb9f1354a0679cd3
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rust-lang/cargo/commit/2b68d3c07a4a056264dc006ecb9f1354a0679cd3
5
reference_url https://github.com/rust-lang/cargo/commit/d1f9553c825f6d7481453be8d58d0e7f117988a7
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H
1
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:00:35Z/
url https://github.com/rust-lang/cargo/commit/d1f9553c825f6d7481453be8d58d0e7f117988a7
6
reference_url https://github.com/rust-lang/cargo/commit/d87d57dbbda61754f4fab0f329a7ac520e062c46
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rust-lang/cargo/commit/d87d57dbbda61754f4fab0f329a7ac520e062c46
7
reference_url https://github.com/rust-lang/cargo/security/advisories/GHSA-2hvr-h6gw-qrxp
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H
1
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H
2
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:00:35Z/
url https://github.com/rust-lang/cargo/security/advisories/GHSA-2hvr-h6gw-qrxp
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-36114
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-36114
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021142
reference_id 1021142
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021142
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021143
reference_id 1021143
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021143
11
reference_url https://github.com/advisories/GHSA-2hvr-h6gw-qrxp
reference_id GHSA-2hvr-h6gw-qrxp
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-2hvr-h6gw-qrxp
12
reference_url https://security.gentoo.org/glsa/202210-09
reference_id GLSA-202210-09
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.gentoo.org/glsa/202210-09
fixed_packages
0
url pkg:ebuild/dev-lang/rust-bin@1.63.0-r1
purl pkg:ebuild/dev-lang/rust-bin@1.63.0-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/rust-bin@1.63.0-r1
1
url pkg:ebuild/dev-lang/rust-bin@1.64.0
purl pkg:ebuild/dev-lang/rust-bin@1.64.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/rust-bin@1.64.0
aliases CVE-2022-36114, GHSA-2hvr-h6gw-qrxp
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ssct-y25y-3qbw
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/rust-bin@1.63.0-r1