| 0 |
| url |
VCID-186h-76t5-3fdd |
| vulnerability_id |
VCID-186h-76t5-3fdd |
| summary |
Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape). |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3947 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19129 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19264 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19315 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.18978 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19058 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19111 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19117 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.1907 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19018 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.18974 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.18986 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.18992 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.18884 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3947 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-3947
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-186h-76t5-3fdd |
|
| 1 |
| url |
VCID-29bt-r6ya-jfhu |
| vulnerability_id |
VCID-29bt-r6ya-jfhu |
| summary |
Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape). |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-20263 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00133 |
| scoring_system |
epss |
| scoring_elements |
0.32842 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00133 |
| scoring_system |
epss |
| scoring_elements |
0.32971 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00133 |
| scoring_system |
epss |
| scoring_elements |
0.33005 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00133 |
| scoring_system |
epss |
| scoring_elements |
0.32828 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00133 |
| scoring_system |
epss |
| scoring_elements |
0.32875 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00133 |
| scoring_system |
epss |
| scoring_elements |
0.32904 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00133 |
| scoring_system |
epss |
| scoring_elements |
0.32907 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00133 |
| scoring_system |
epss |
| scoring_elements |
0.3287 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00133 |
| scoring_system |
epss |
| scoring_elements |
0.32844 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00133 |
| scoring_system |
epss |
| scoring_elements |
0.32886 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00133 |
| scoring_system |
epss |
| scoring_elements |
0.32864 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00133 |
| scoring_system |
epss |
| scoring_elements |
0.32679 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-20263 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-20263
|
| risk_score |
1.5 |
| exploitability |
0.5 |
| weighted_severity |
3.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-29bt-r6ya-jfhu |
|
| 2 |
| url |
VCID-4unz-8jyy-qfdc |
| vulnerability_id |
VCID-4unz-8jyy-qfdc |
| summary |
Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape). |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-4206 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0016 |
| scoring_system |
epss |
| scoring_elements |
0.36835 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.0016 |
| scoring_system |
epss |
| scoring_elements |
0.36992 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.0016 |
| scoring_system |
epss |
| scoring_elements |
0.37027 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.0016 |
| scoring_system |
epss |
| scoring_elements |
0.36855 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.0016 |
| scoring_system |
epss |
| scoring_elements |
0.36906 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00161 |
| scoring_system |
epss |
| scoring_elements |
0.36989 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00161 |
| scoring_system |
epss |
| scoring_elements |
0.36758 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00161 |
| scoring_system |
epss |
| scoring_elements |
0.37071 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00161 |
| scoring_system |
epss |
| scoring_elements |
0.37081 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00161 |
| scoring_system |
epss |
| scoring_elements |
0.37047 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00161 |
| scoring_system |
epss |
| scoring_elements |
0.3702 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00161 |
| scoring_system |
epss |
| scoring_elements |
0.37066 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-4206 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-4206
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4unz-8jyy-qfdc |
|
| 3 |
| url |
VCID-6qnt-yaa3-p3bb |
| vulnerability_id |
VCID-6qnt-yaa3-p3bb |
| summary |
Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape). |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-35506 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08517 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08545 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08598 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08516 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08589 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08612 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08609 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08588 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08575 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08464 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08451 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08601 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08614 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-35506 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-35506
|
| risk_score |
2.2 |
| exploitability |
0.5 |
| weighted_severity |
4.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6qnt-yaa3-p3bb |
|
| 4 |
| url |
VCID-7w6v-ewcn-kkdz |
| vulnerability_id |
VCID-7w6v-ewcn-kkdz |
| summary |
Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape). |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3416 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00333 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00338 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00336 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00328 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00325 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00326 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00323 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00322 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00317 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
6e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00343 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3416 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-3416
|
| risk_score |
1.4 |
| exploitability |
0.5 |
| weighted_severity |
2.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7w6v-ewcn-kkdz |
|
| 5 |
| url |
VCID-ap2r-g7ew-kqed |
| vulnerability_id |
VCID-ap2r-g7ew-kqed |
| summary |
Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape). |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3544 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09299 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.093 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09351 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09263 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09339 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09388 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09399 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.0937 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09355 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09248 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09247 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.0945 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3544 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-3544
|
| risk_score |
1.4 |
| exploitability |
0.5 |
| weighted_severity |
2.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ap2r-g7ew-kqed |
|
| 6 |
| url |
VCID-bcps-uatt-wkd7 |
| vulnerability_id |
VCID-bcps-uatt-wkd7 |
| summary |
Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape). |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3527 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07873 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.0797 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.08017 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07976 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.08035 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.08054 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.08038 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.08019 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.08002 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07915 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07897 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.08058 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.08013 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3527 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-3527
|
| risk_score |
1.4 |
| exploitability |
0.5 |
| weighted_severity |
2.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bcps-uatt-wkd7 |
|
| 7 |
| url |
VCID-br4x-bpvj-puhr |
| vulnerability_id |
VCID-br4x-bpvj-puhr |
| summary |
Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape). |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3608 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.11095 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.11238 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.11302 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.11117 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.11197 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.11253 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.11263 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.11174 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.11149 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.11015 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.11025 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.11155 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.11094 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3608 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-3608
|
| risk_score |
1.4 |
| exploitability |
0.5 |
| weighted_severity |
2.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-br4x-bpvj-puhr |
|
| 8 |
| url |
VCID-cenj-mz55-jbg6 |
| vulnerability_id |
VCID-cenj-mz55-jbg6 |
| summary |
Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape). |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3929 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.04882 |
| scoring_system |
epss |
| scoring_elements |
0.89536 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.04882 |
| scoring_system |
epss |
| scoring_elements |
0.8954 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.04882 |
| scoring_system |
epss |
| scoring_elements |
0.89553 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.04882 |
| scoring_system |
epss |
| scoring_elements |
0.89554 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.04882 |
| scoring_system |
epss |
| scoring_elements |
0.89571 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.04882 |
| scoring_system |
epss |
| scoring_elements |
0.89576 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.04882 |
| scoring_system |
epss |
| scoring_elements |
0.89583 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.04882 |
| scoring_system |
epss |
| scoring_elements |
0.89582 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.04882 |
| scoring_system |
epss |
| scoring_elements |
0.8959 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.04882 |
| scoring_system |
epss |
| scoring_elements |
0.89591 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.04882 |
| scoring_system |
epss |
| scoring_elements |
0.89587 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.04882 |
| scoring_system |
epss |
| scoring_elements |
0.89602 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3929 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-3929
|
| risk_score |
3.7 |
| exploitability |
0.5 |
| weighted_severity |
7.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cenj-mz55-jbg6 |
|
| 9 |
| url |
VCID-eb18-wa2w-q7bn |
| vulnerability_id |
VCID-eb18-wa2w-q7bn |
| summary |
Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape). |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3682 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00418 |
| scoring_system |
epss |
| scoring_elements |
0.61708 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00418 |
| scoring_system |
epss |
| scoring_elements |
0.61782 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00418 |
| scoring_system |
epss |
| scoring_elements |
0.61813 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00418 |
| scoring_system |
epss |
| scoring_elements |
0.61831 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00418 |
| scoring_system |
epss |
| scoring_elements |
0.61847 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00418 |
| scoring_system |
epss |
| scoring_elements |
0.61868 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00418 |
| scoring_system |
epss |
| scoring_elements |
0.61857 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00418 |
| scoring_system |
epss |
| scoring_elements |
0.61837 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00418 |
| scoring_system |
epss |
| scoring_elements |
0.6188 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00418 |
| scoring_system |
epss |
| scoring_elements |
0.61885 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00418 |
| scoring_system |
epss |
| scoring_elements |
0.61869 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00418 |
| scoring_system |
epss |
| scoring_elements |
0.61864 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3682 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-3682
|
| risk_score |
3.9 |
| exploitability |
0.5 |
| weighted_severity |
7.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-eb18-wa2w-q7bn |
|
| 10 |
| url |
VCID-een8-8kc5-qfcx |
| vulnerability_id |
VCID-een8-8kc5-qfcx |
| summary |
Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape). |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3546 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13329 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13431 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13496 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.1329 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13373 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13423 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13395 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.1336 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13313 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13218 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13217 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13297 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13304 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3546 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-3546
|
| risk_score |
3.7 |
| exploitability |
0.5 |
| weighted_severity |
7.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-een8-8kc5-qfcx |
|
| 11 |
| url |
VCID-g4az-63th-yyhk |
| vulnerability_id |
VCID-g4az-63th-yyhk |
| summary |
Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape). |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-4145 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00058 |
| scoring_system |
epss |
| scoring_elements |
0.18066 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00058 |
| scoring_system |
epss |
| scoring_elements |
0.18228 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00058 |
| scoring_system |
epss |
| scoring_elements |
0.1828 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00058 |
| scoring_system |
epss |
| scoring_elements |
0.17982 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00058 |
| scoring_system |
epss |
| scoring_elements |
0.18067 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00058 |
| scoring_system |
epss |
| scoring_elements |
0.18128 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00058 |
| scoring_system |
epss |
| scoring_elements |
0.18042 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00058 |
| scoring_system |
epss |
| scoring_elements |
0.17985 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00058 |
| scoring_system |
epss |
| scoring_elements |
0.17996 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00058 |
| scoring_system |
epss |
| scoring_elements |
0.18135 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00058 |
| scoring_system |
epss |
| scoring_elements |
0.18091 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18419 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18523 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-4145 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-4145
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-g4az-63th-yyhk |
|
| 12 |
| url |
VCID-gc6n-kgsc-f3b6 |
| vulnerability_id |
VCID-gc6n-kgsc-f3b6 |
| summary |
Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape). |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-35505 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00117 |
| scoring_system |
epss |
| scoring_elements |
0.30388 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00117 |
| scoring_system |
epss |
| scoring_elements |
0.30618 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00117 |
| scoring_system |
epss |
| scoring_elements |
0.30601 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00117 |
| scoring_system |
epss |
| scoring_elements |
0.30566 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00117 |
| scoring_system |
epss |
| scoring_elements |
0.30772 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00117 |
| scoring_system |
epss |
| scoring_elements |
0.30586 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00117 |
| scoring_system |
epss |
| scoring_elements |
0.30645 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00117 |
| scoring_system |
epss |
| scoring_elements |
0.30678 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00117 |
| scoring_system |
epss |
| scoring_elements |
0.30683 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00117 |
| scoring_system |
epss |
| scoring_elements |
0.30638 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00117 |
| scoring_system |
epss |
| scoring_elements |
0.30592 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.31525 |
| published_at |
2026-04-02T12:55:00Z |
|
| 12 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.31388 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-35505 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-35505
|
| risk_score |
1.4 |
| exploitability |
0.5 |
| weighted_severity |
2.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-gc6n-kgsc-f3b6 |
|
| 13 |
| url |
VCID-hrhp-htnd-7bbx |
| vulnerability_id |
VCID-hrhp-htnd-7bbx |
| summary |
Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape). |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3607 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00173 |
| scoring_system |
epss |
| scoring_elements |
0.38532 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00173 |
| scoring_system |
epss |
| scoring_elements |
0.38667 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00173 |
| scoring_system |
epss |
| scoring_elements |
0.38691 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00173 |
| scoring_system |
epss |
| scoring_elements |
0.38622 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00173 |
| scoring_system |
epss |
| scoring_elements |
0.38673 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00173 |
| scoring_system |
epss |
| scoring_elements |
0.38682 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00173 |
| scoring_system |
epss |
| scoring_elements |
0.38692 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00173 |
| scoring_system |
epss |
| scoring_elements |
0.38654 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00173 |
| scoring_system |
epss |
| scoring_elements |
0.38628 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00173 |
| scoring_system |
epss |
| scoring_elements |
0.38675 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00173 |
| scoring_system |
epss |
| scoring_elements |
0.38653 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00173 |
| scoring_system |
epss |
| scoring_elements |
0.38575 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00173 |
| scoring_system |
epss |
| scoring_elements |
0.38416 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3607 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-3607
|
| risk_score |
2.7 |
| exploitability |
0.5 |
| weighted_severity |
5.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hrhp-htnd-7bbx |
|
| 14 |
| url |
VCID-j1gy-ttz5-1yct |
| vulnerability_id |
VCID-j1gy-ttz5-1yct |
| summary |
Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape). |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-26353 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0024 |
| scoring_system |
epss |
| scoring_elements |
0.47052 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.0024 |
| scoring_system |
epss |
| scoring_elements |
0.47071 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.0024 |
| scoring_system |
epss |
| scoring_elements |
0.47019 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.0024 |
| scoring_system |
epss |
| scoring_elements |
0.47074 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.0024 |
| scoring_system |
epss |
| scoring_elements |
0.4707 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.0024 |
| scoring_system |
epss |
| scoring_elements |
0.47095 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.0024 |
| scoring_system |
epss |
| scoring_elements |
0.47068 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.0024 |
| scoring_system |
epss |
| scoring_elements |
0.47076 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.0024 |
| scoring_system |
epss |
| scoring_elements |
0.47132 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.0024 |
| scoring_system |
epss |
| scoring_elements |
0.47128 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.0024 |
| scoring_system |
epss |
| scoring_elements |
0.47062 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-26353 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-26353
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-j1gy-ttz5-1yct |
|
| 15 |
| url |
VCID-j6hs-wm45-s3ej |
| vulnerability_id |
VCID-j6hs-wm45-s3ej |
| summary |
Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape). |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-20257 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.22726 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.229 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.22944 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.22737 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.22812 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.22864 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.22885 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.22848 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.22792 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.22806 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.228 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.2276 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.22598 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-20257 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-20257
|
| risk_score |
1.4 |
| exploitability |
0.5 |
| weighted_severity |
2.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-j6hs-wm45-s3ej |
|
| 16 |
| url |
VCID-nb4k-f7rm-kuhg |
| vulnerability_id |
VCID-nb4k-f7rm-kuhg |
| summary |
Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape). |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3582 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00162 |
| scoring_system |
epss |
| scoring_elements |
0.37003 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00162 |
| scoring_system |
epss |
| scoring_elements |
0.37176 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00162 |
| scoring_system |
epss |
| scoring_elements |
0.37204 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00162 |
| scoring_system |
epss |
| scoring_elements |
0.37035 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00162 |
| scoring_system |
epss |
| scoring_elements |
0.37086 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00162 |
| scoring_system |
epss |
| scoring_elements |
0.37099 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00162 |
| scoring_system |
epss |
| scoring_elements |
0.37109 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00162 |
| scoring_system |
epss |
| scoring_elements |
0.37075 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00162 |
| scoring_system |
epss |
| scoring_elements |
0.37049 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00162 |
| scoring_system |
epss |
| scoring_elements |
0.37095 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00162 |
| scoring_system |
epss |
| scoring_elements |
0.37077 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00162 |
| scoring_system |
epss |
| scoring_elements |
0.3702 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00162 |
| scoring_system |
epss |
| scoring_elements |
0.36789 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3582 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-3582
|
| risk_score |
1.4 |
| exploitability |
0.5 |
| weighted_severity |
2.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-nb4k-f7rm-kuhg |
|
| 17 |
| url |
VCID-q38v-9gvs-sydf |
| vulnerability_id |
VCID-q38v-9gvs-sydf |
| summary |
Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape). |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3545 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00116 |
| scoring_system |
epss |
| scoring_elements |
0.30389 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00116 |
| scoring_system |
epss |
| scoring_elements |
0.30418 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00116 |
| scoring_system |
epss |
| scoring_elements |
0.30464 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00116 |
| scoring_system |
epss |
| scoring_elements |
0.30272 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00116 |
| scoring_system |
epss |
| scoring_elements |
0.30331 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00116 |
| scoring_system |
epss |
| scoring_elements |
0.30366 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00116 |
| scoring_system |
epss |
| scoring_elements |
0.30368 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00116 |
| scoring_system |
epss |
| scoring_elements |
0.30324 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00116 |
| scoring_system |
epss |
| scoring_elements |
0.30277 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00116 |
| scoring_system |
epss |
| scoring_elements |
0.30291 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00116 |
| scoring_system |
epss |
| scoring_elements |
0.30273 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00116 |
| scoring_system |
epss |
| scoring_elements |
0.30229 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00116 |
| scoring_system |
epss |
| scoring_elements |
0.30164 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3545 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-3545
|
| risk_score |
1.4 |
| exploitability |
0.5 |
| weighted_severity |
2.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-q38v-9gvs-sydf |
|
| 18 |
| url |
VCID-qh2s-apkz-sbaz |
| vulnerability_id |
VCID-qh2s-apkz-sbaz |
| summary |
Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape). |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-35504 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00096 |
| scoring_system |
epss |
| scoring_elements |
0.26634 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00096 |
| scoring_system |
epss |
| scoring_elements |
0.26588 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.31438 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.31469 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.31473 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.3143 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.31394 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.31427 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.31407 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.31379 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.31209 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.31568 |
| published_at |
2026-04-04T12:55:00Z |
|
| 12 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.31385 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-35504 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-35504
|
| risk_score |
1.4 |
| exploitability |
0.5 |
| weighted_severity |
2.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qh2s-apkz-sbaz |
|
| 19 |
| url |
VCID-qn73-3gkb-rkbm |
| vulnerability_id |
VCID-qn73-3gkb-rkbm |
| summary |
Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape). |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3930 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.17001 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.17172 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.17224 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.16955 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.17044 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.17103 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.17078 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.17032 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.16971 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.16908 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.1691 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.16947 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.16851 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3930 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-3930
|
| risk_score |
1.4 |
| exploitability |
0.5 |
| weighted_severity |
2.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qn73-3gkb-rkbm |
|
| 20 |
| url |
VCID-r47h-wdgy-7bga |
| vulnerability_id |
VCID-r47h-wdgy-7bga |
| summary |
Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape). |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3748 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10319 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10438 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10505 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10365 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10503 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10533 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.105 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10478 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10345 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10449 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10432 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3748 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-3748
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-r47h-wdgy-7bga |
|
| 21 |
| url |
VCID-t44w-g1ys-47e6 |
| vulnerability_id |
VCID-t44w-g1ys-47e6 |
| summary |
Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape). |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-15859 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09552 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09537 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00119 |
| scoring_system |
epss |
| scoring_elements |
0.30654 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00119 |
| scoring_system |
epss |
| scoring_elements |
0.30818 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.0013 |
| scoring_system |
epss |
| scoring_elements |
0.32562 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.0013 |
| scoring_system |
epss |
| scoring_elements |
0.32434 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.0013 |
| scoring_system |
epss |
| scoring_elements |
0.32461 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.0013 |
| scoring_system |
epss |
| scoring_elements |
0.32465 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.0013 |
| scoring_system |
epss |
| scoring_elements |
0.32427 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.0013 |
| scoring_system |
epss |
| scoring_elements |
0.324 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.0013 |
| scoring_system |
epss |
| scoring_elements |
0.32436 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.0013 |
| scoring_system |
epss |
| scoring_elements |
0.32414 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.0013 |
| scoring_system |
epss |
| scoring_elements |
0.32385 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-15859 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-15859
|
| risk_score |
1.7 |
| exploitability |
0.5 |
| weighted_severity |
3.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-t44w-g1ys-47e6 |
|
| 22 |
| url |
VCID-t5gq-4bhn-gkej |
| vulnerability_id |
VCID-t5gq-4bhn-gkej |
| summary |
Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape). |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3611 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07094 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07214 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07259 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07238 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07293 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07319 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07315 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07302 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07223 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08322 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08185 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08348 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3611 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-3611
|
| risk_score |
1.7 |
| exploitability |
0.5 |
| weighted_severity |
3.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-t5gq-4bhn-gkej |
|
| 23 |
| url |
VCID-tyv8-tzu8-23fj |
| vulnerability_id |
VCID-tyv8-tzu8-23fj |
| summary |
Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape). |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-35517 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24402 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24528 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24563 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24346 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24414 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24459 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24474 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.2443 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24373 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24388 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24378 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24349 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24225 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-35517 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-35517
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-tyv8-tzu8-23fj |
|
| 24 |
| url |
VCID-ueu8-w641-duh3 |
| vulnerability_id |
VCID-ueu8-w641-duh3 |
| summary |
Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape). |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-4158 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06471 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06535 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06571 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06556 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06607 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.0665 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06643 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06634 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06626 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06554 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06545 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.067 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06699 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-4158 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-4158
|
| risk_score |
2.7 |
| exploitability |
0.5 |
| weighted_severity |
5.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ueu8-w641-duh3 |
|
| 25 |
| url |
VCID-vpu8-k8me-tfe6 |
| vulnerability_id |
VCID-vpu8-k8me-tfe6 |
| summary |
Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape). |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-26354 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01493 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01395 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01396 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01386 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.014 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01485 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01408 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01401 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04303 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04324 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04333 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04365 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-26354 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-26354
|
| risk_score |
1.1 |
| exploitability |
0.5 |
| weighted_severity |
2.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vpu8-k8me-tfe6 |
|
| 26 |
| url |
VCID-vrwy-exwv-vyhr |
| vulnerability_id |
VCID-vrwy-exwv-vyhr |
| summary |
Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape). |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-20203 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08695 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08723 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08771 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08697 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08773 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08799 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08801 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08768 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08752 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08641 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08631 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08784 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08797 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-20203 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-20203
|
| risk_score |
1.4 |
| exploitability |
0.5 |
| weighted_severity |
2.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vrwy-exwv-vyhr |
|
| 27 |
| url |
VCID-vvaj-skpn-u3ar |
| vulnerability_id |
VCID-vvaj-skpn-u3ar |
| summary |
Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape). |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3409 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16727 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16897 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00188 |
| scoring_system |
epss |
| scoring_elements |
0.40602 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00188 |
| scoring_system |
epss |
| scoring_elements |
0.40612 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00188 |
| scoring_system |
epss |
| scoring_elements |
0.40593 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00188 |
| scoring_system |
epss |
| scoring_elements |
0.40573 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00188 |
| scoring_system |
epss |
| scoring_elements |
0.4062 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00188 |
| scoring_system |
epss |
| scoring_elements |
0.4059 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00188 |
| scoring_system |
epss |
| scoring_elements |
0.40512 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00188 |
| scoring_system |
epss |
| scoring_elements |
0.4041 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.00188 |
| scoring_system |
epss |
| scoring_elements |
0.4063 |
| published_at |
2026-04-11T12:55:00Z |
|
| 11 |
| value |
0.00188 |
| scoring_system |
epss |
| scoring_elements |
0.40552 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3409 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-3409
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vvaj-skpn-u3ar |
|
| 28 |
| url |
VCID-w7gc-1eh2-3ufu |
| vulnerability_id |
VCID-w7gc-1eh2-3ufu |
| summary |
Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape). |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3750 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08586 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08579 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08573 |
| published_at |
2026-04-21T12:55:00Z |
|
| 3 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08552 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08536 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08429 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08413 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08752 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.088 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08733 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08812 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08723 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3750 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-3750
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-w7gc-1eh2-3ufu |
|
| 29 |
| url |
VCID-wdjx-9f36-abgu |
| vulnerability_id |
VCID-wdjx-9f36-abgu |
| summary |
Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape). |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-15863 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13872 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13955 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.14011 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13813 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13896 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13948 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13905 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13869 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.1382 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00121 |
| scoring_system |
epss |
| scoring_elements |
0.30967 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.00121 |
| scoring_system |
epss |
| scoring_elements |
0.31177 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00121 |
| scoring_system |
epss |
| scoring_elements |
0.31158 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00121 |
| scoring_system |
epss |
| scoring_elements |
0.31127 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-15863 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-15863
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wdjx-9f36-abgu |
|
| 30 |
| url |
VCID-wjxf-kgdw-2kau |
| vulnerability_id |
VCID-wjxf-kgdw-2kau |
| summary |
Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape). |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-16092 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11559 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11685 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11728 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11513 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.116 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.1166 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11672 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11635 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11608 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.1147 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11472 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11598 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11551 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-16092 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-16092
|
| risk_score |
1.7 |
| exploitability |
0.5 |
| weighted_severity |
3.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wjxf-kgdw-2kau |
|
| 31 |
| url |
VCID-ycrs-vy13-wbff |
| vulnerability_id |
VCID-ycrs-vy13-wbff |
| summary |
Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape). |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3713 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09598 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09663 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09714 |
| published_at |
2026-04-21T12:55:00Z |
|
| 3 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09622 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09692 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09741 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09753 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09721 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09705 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09595 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09567 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3713 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-3713
|
| risk_score |
3.5 |
| exploitability |
0.5 |
| weighted_severity |
7.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ycrs-vy13-wbff |
|
| 32 |
| url |
VCID-yt3z-g3w7-xfa5 |
| vulnerability_id |
VCID-yt3z-g3w7-xfa5 |
| summary |
Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape). |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-4207 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15388 |
| published_at |
2026-04-08T12:55:00Z |
|
| 1 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15427 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15497 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.153 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15438 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.154 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15361 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15295 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15211 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15216 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15267 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15307 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-4207 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-4207
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-yt3z-g3w7-xfa5 |
|
| 33 |
| url |
VCID-zf4c-x45c-tudm |
| vulnerability_id |
VCID-zf4c-x45c-tudm |
| summary |
Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape). |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0358 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10785 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.1092 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10984 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.1081 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10886 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10939 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.1094 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10907 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10885 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10749 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10762 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10883 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10844 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0358 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-0358
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zf4c-x45c-tudm |
|