Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/rpm@4.18.0%2Bdfsg-1?distro=trixie
Typedeb
Namespacedebian
Namerpm
Version4.18.0+dfsg-1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version4.18.0+dfsg-1+deb12u1
Latest_non_vulnerable_version6.0.1-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-cfys-v272-tkb5
vulnerability_id VCID-cfys-v272-tkb5
summary Multiple vulnerabilities have been found in RPM, the worst of which could lead to root privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3521.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3521.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-3521
reference_id
reference_type
scores
0
value 0.00019
scoring_system epss
scoring_elements 0.04824
published_at 2026-04-18T12:55:00Z
1
value 0.00019
scoring_system epss
scoring_elements 0.04866
published_at 2026-04-13T12:55:00Z
2
value 0.00019
scoring_system epss
scoring_elements 0.04815
published_at 2026-04-16T12:55:00Z
3
value 0.00036
scoring_system epss
scoring_elements 0.10747
published_at 2026-04-02T12:55:00Z
4
value 0.00036
scoring_system epss
scoring_elements 0.10662
published_at 2026-04-07T12:55:00Z
5
value 0.00036
scoring_system epss
scoring_elements 0.10739
published_at 2026-04-08T12:55:00Z
6
value 0.00036
scoring_system epss
scoring_elements 0.10796
published_at 2026-04-09T12:55:00Z
7
value 0.00036
scoring_system epss
scoring_elements 0.10809
published_at 2026-04-11T12:55:00Z
8
value 0.00036
scoring_system epss
scoring_elements 0.10778
published_at 2026-04-12T12:55:00Z
9
value 0.00036
scoring_system epss
scoring_elements 0.10607
published_at 2026-04-01T12:55:00Z
10
value 0.00036
scoring_system epss
scoring_elements 0.10811
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-3521
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3521
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3521
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014723
reference_id 1014723
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014723
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1941098
reference_id 1941098
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1941098
6
reference_url https://security.gentoo.org/glsa/202210-22
reference_id GLSA-202210-22
reference_type
scores
url https://security.gentoo.org/glsa/202210-22
7
reference_url https://access.redhat.com/errata/RHSA-2022:0254
reference_id RHSA-2022:0254
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0254
8
reference_url https://access.redhat.com/errata/RHSA-2022:0368
reference_id RHSA-2022:0368
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0368
9
reference_url https://access.redhat.com/errata/RHSA-2022:0634
reference_id RHSA-2022:0634
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0634
fixed_packages
0
url pkg:deb/debian/rpm@4.18.0%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/rpm@4.18.0%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rpm@4.18.0%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/rpm@4.18.0%2Bdfsg-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/rpm@4.18.0%2Bdfsg-1%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rpm@4.18.0%252Bdfsg-1%252Bdeb12u1%3Fdistro=trixie
2
url pkg:deb/debian/rpm@4.20.1%2Bdfsg-3?distro=trixie
purl pkg:deb/debian/rpm@4.20.1%2Bdfsg-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rpm@4.20.1%252Bdfsg-3%3Fdistro=trixie
3
url pkg:deb/debian/rpm@6.0.1-1?distro=trixie
purl pkg:deb/debian/rpm@6.0.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rpm@6.0.1-1%3Fdistro=trixie
aliases CVE-2021-3521
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cfys-v272-tkb5
1
url VCID-pdb1-awwn-47bw
vulnerability_id VCID-pdb1-awwn-47bw
summary Multiple vulnerabilities have been found in RPM, the worst of which could lead to root privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35938.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35938.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35938
reference_id
reference_type
scores
0
value 0.00149
scoring_system epss
scoring_elements 0.35436
published_at 2026-04-18T12:55:00Z
1
value 0.00149
scoring_system epss
scoring_elements 0.35476
published_at 2026-04-11T12:55:00Z
2
value 0.00149
scoring_system epss
scoring_elements 0.35433
published_at 2026-04-12T12:55:00Z
3
value 0.00149
scoring_system epss
scoring_elements 0.35409
published_at 2026-04-13T12:55:00Z
4
value 0.00149
scoring_system epss
scoring_elements 0.35448
published_at 2026-04-16T12:55:00Z
5
value 0.00149
scoring_system epss
scoring_elements 0.35395
published_at 2026-04-07T12:55:00Z
6
value 0.00149
scoring_system epss
scoring_elements 0.35441
published_at 2026-04-08T12:55:00Z
7
value 0.00149
scoring_system epss
scoring_elements 0.35466
published_at 2026-04-09T12:55:00Z
8
value 0.00153
scoring_system epss
scoring_elements 0.3612
published_at 2026-04-02T12:55:00Z
9
value 0.00153
scoring_system epss
scoring_elements 0.36151
published_at 2026-04-04T12:55:00Z
10
value 0.00153
scoring_system epss
scoring_elements 0.3593
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35938
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35938
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35938
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1964114
reference_id 1964114
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1964114
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990543
reference_id 990543
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990543
6
reference_url https://security.gentoo.org/glsa/202210-22
reference_id GLSA-202210-22
reference_type
scores
url https://security.gentoo.org/glsa/202210-22
7
reference_url https://access.redhat.com/errata/RHSA-2024:0424
reference_id RHSA-2024:0424
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0424
8
reference_url https://access.redhat.com/errata/RHSA-2024:0435
reference_id RHSA-2024:0435
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0435
9
reference_url https://access.redhat.com/errata/RHSA-2024:0453
reference_id RHSA-2024:0453
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0453
10
reference_url https://access.redhat.com/errata/RHSA-2024:0463
reference_id RHSA-2024:0463
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0463
11
reference_url https://access.redhat.com/errata/RHSA-2024:0582
reference_id RHSA-2024:0582
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0582
12
reference_url https://access.redhat.com/errata/RHSA-2024:0647
reference_id RHSA-2024:0647
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0647
13
reference_url https://access.redhat.com/errata/RHSA-2024:1383
reference_id RHSA-2024:1383
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1383
14
reference_url https://access.redhat.com/errata/RHSA-2024:1477
reference_id RHSA-2024:1477
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1477
fixed_packages
0
url pkg:deb/debian/rpm@4.18.0%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/rpm@4.18.0%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rpm@4.18.0%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/rpm@4.18.0%2Bdfsg-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/rpm@4.18.0%2Bdfsg-1%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rpm@4.18.0%252Bdfsg-1%252Bdeb12u1%3Fdistro=trixie
2
url pkg:deb/debian/rpm@4.20.1%2Bdfsg-3?distro=trixie
purl pkg:deb/debian/rpm@4.20.1%2Bdfsg-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rpm@4.20.1%252Bdfsg-3%3Fdistro=trixie
3
url pkg:deb/debian/rpm@6.0.1-1?distro=trixie
purl pkg:deb/debian/rpm@6.0.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rpm@6.0.1-1%3Fdistro=trixie
aliases CVE-2021-35938
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pdb1-awwn-47bw
2
url VCID-sdr2-r9wc-7bam
vulnerability_id VCID-sdr2-r9wc-7bam
summary Multiple vulnerabilities have been found in RPM, the worst of which could lead to root privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35937.json
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35937.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35937
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02369
published_at 2026-04-01T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02438
published_at 2026-04-02T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02452
published_at 2026-04-04T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.02451
published_at 2026-04-07T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.02455
published_at 2026-04-08T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.02476
published_at 2026-04-09T12:55:00Z
6
value 0.00014
scoring_system epss
scoring_elements 0.02454
published_at 2026-04-11T12:55:00Z
7
value 0.00014
scoring_system epss
scoring_elements 0.02446
published_at 2026-04-13T12:55:00Z
8
value 0.00014
scoring_system epss
scoring_elements 0.02428
published_at 2026-04-16T12:55:00Z
9
value 0.00014
scoring_system epss
scoring_elements 0.02435
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35937
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35937
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1964125
reference_id 1964125
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1964125
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990543
reference_id 990543
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990543
6
reference_url https://security.gentoo.org/glsa/202210-22
reference_id GLSA-202210-22
reference_type
scores
url https://security.gentoo.org/glsa/202210-22
7
reference_url https://access.redhat.com/errata/RHSA-2024:0424
reference_id RHSA-2024:0424
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0424
8
reference_url https://access.redhat.com/errata/RHSA-2024:0435
reference_id RHSA-2024:0435
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0435
9
reference_url https://access.redhat.com/errata/RHSA-2024:0453
reference_id RHSA-2024:0453
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0453
10
reference_url https://access.redhat.com/errata/RHSA-2024:0463
reference_id RHSA-2024:0463
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0463
11
reference_url https://access.redhat.com/errata/RHSA-2024:0582
reference_id RHSA-2024:0582
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0582
12
reference_url https://access.redhat.com/errata/RHSA-2024:0647
reference_id RHSA-2024:0647
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0647
13
reference_url https://access.redhat.com/errata/RHSA-2024:1383
reference_id RHSA-2024:1383
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1383
14
reference_url https://access.redhat.com/errata/RHSA-2024:1477
reference_id RHSA-2024:1477
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1477
fixed_packages
0
url pkg:deb/debian/rpm@4.18.0%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/rpm@4.18.0%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rpm@4.18.0%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/rpm@4.18.0%2Bdfsg-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/rpm@4.18.0%2Bdfsg-1%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rpm@4.18.0%252Bdfsg-1%252Bdeb12u1%3Fdistro=trixie
2
url pkg:deb/debian/rpm@4.20.1%2Bdfsg-3?distro=trixie
purl pkg:deb/debian/rpm@4.20.1%2Bdfsg-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rpm@4.20.1%252Bdfsg-3%3Fdistro=trixie
3
url pkg:deb/debian/rpm@6.0.1-1?distro=trixie
purl pkg:deb/debian/rpm@6.0.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rpm@6.0.1-1%3Fdistro=trixie
aliases CVE-2021-35937
risk_score 2.9
exploitability 0.5
weighted_severity 5.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sdr2-r9wc-7bam
3
url VCID-t2tv-y7yz-vfh3
vulnerability_id VCID-t2tv-y7yz-vfh3
summary Multiple vulnerabilities have been found in RPM, the worst of which could lead to root privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35939.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35939.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-35939
reference_id
reference_type
scores
0
value 0.00202
scoring_system epss
scoring_elements 0.42321
published_at 2026-04-18T12:55:00Z
1
value 0.00202
scoring_system epss
scoring_elements 0.4236
published_at 2026-04-11T12:55:00Z
2
value 0.00202
scoring_system epss
scoring_elements 0.42324
published_at 2026-04-12T12:55:00Z
3
value 0.00202
scoring_system epss
scoring_elements 0.42295
published_at 2026-04-13T12:55:00Z
4
value 0.00202
scoring_system epss
scoring_elements 0.42345
published_at 2026-04-16T12:55:00Z
5
value 0.00202
scoring_system epss
scoring_elements 0.42278
published_at 2026-04-07T12:55:00Z
6
value 0.00202
scoring_system epss
scoring_elements 0.42329
published_at 2026-04-08T12:55:00Z
7
value 0.00202
scoring_system epss
scoring_elements 0.42337
published_at 2026-04-09T12:55:00Z
8
value 0.00207
scoring_system epss
scoring_elements 0.43134
published_at 2026-04-02T12:55:00Z
9
value 0.00207
scoring_system epss
scoring_elements 0.43162
published_at 2026-04-04T12:55:00Z
10
value 0.00207
scoring_system epss
scoring_elements 0.43076
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-35939
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35939
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35939
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1964129
reference_id 1964129
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1964129
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990543
reference_id 990543
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990543
6
reference_url https://security.gentoo.org/glsa/202210-22
reference_id GLSA-202210-22
reference_type
scores
url https://security.gentoo.org/glsa/202210-22
7
reference_url https://access.redhat.com/errata/RHSA-2024:0424
reference_id RHSA-2024:0424
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0424
8
reference_url https://access.redhat.com/errata/RHSA-2024:0435
reference_id RHSA-2024:0435
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0435
9
reference_url https://access.redhat.com/errata/RHSA-2024:0453
reference_id RHSA-2024:0453
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0453
10
reference_url https://access.redhat.com/errata/RHSA-2024:0463
reference_id RHSA-2024:0463
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0463
11
reference_url https://access.redhat.com/errata/RHSA-2024:0582
reference_id RHSA-2024:0582
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0582
12
reference_url https://access.redhat.com/errata/RHSA-2024:0647
reference_id RHSA-2024:0647
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0647
13
reference_url https://access.redhat.com/errata/RHSA-2024:1383
reference_id RHSA-2024:1383
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1383
14
reference_url https://access.redhat.com/errata/RHSA-2024:1477
reference_id RHSA-2024:1477
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1477
fixed_packages
0
url pkg:deb/debian/rpm@4.18.0%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/rpm@4.18.0%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rpm@4.18.0%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/rpm@4.18.0%2Bdfsg-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/rpm@4.18.0%2Bdfsg-1%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rpm@4.18.0%252Bdfsg-1%252Bdeb12u1%3Fdistro=trixie
2
url pkg:deb/debian/rpm@4.20.1%2Bdfsg-3?distro=trixie
purl pkg:deb/debian/rpm@4.20.1%2Bdfsg-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rpm@4.20.1%252Bdfsg-3%3Fdistro=trixie
3
url pkg:deb/debian/rpm@6.0.1-1?distro=trixie
purl pkg:deb/debian/rpm@6.0.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rpm@6.0.1-1%3Fdistro=trixie
aliases CVE-2021-35939
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t2tv-y7yz-vfh3
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/rpm@4.18.0%252Bdfsg-1%3Fdistro=trixie