Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/podman@2:4.2.0-3?arch=el9
Typerpm
Namespaceredhat
Namepodman
Version2:4.2.0-3
Qualifiers
arch el9
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-1n1h-e2p4-9yhs
vulnerability_id VCID-1n1h-e2p4-9yhs
summary
golang.org/x/crypto/ssh Denial of service via crafted Signer
The golang.org/x/crypto/ssh package before 0.0.0-20220314234659-1baeb1ce4c0b for Go allows an attacker to crash a server in certain circumstances involving AddHostKey.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27191.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27191.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-27191
reference_id
reference_type
scores
0
value 0.00089
scoring_system epss
scoring_elements 0.25209
published_at 2026-04-24T12:55:00Z
1
value 0.00089
scoring_system epss
scoring_elements 0.25479
published_at 2026-04-04T12:55:00Z
2
value 0.00089
scoring_system epss
scoring_elements 0.25318
published_at 2026-04-08T12:55:00Z
3
value 0.00089
scoring_system epss
scoring_elements 0.2525
published_at 2026-04-07T12:55:00Z
4
value 0.00089
scoring_system epss
scoring_elements 0.25443
published_at 2026-04-02T12:55:00Z
5
value 0.00089
scoring_system epss
scoring_elements 0.25246
published_at 2026-04-21T12:55:00Z
6
value 0.00089
scoring_system epss
scoring_elements 0.25276
published_at 2026-04-18T12:55:00Z
7
value 0.00089
scoring_system epss
scoring_elements 0.25286
published_at 2026-04-16T12:55:00Z
8
value 0.00089
scoring_system epss
scoring_elements 0.2528
published_at 2026-04-13T12:55:00Z
9
value 0.00089
scoring_system epss
scoring_elements 0.25333
published_at 2026-04-12T12:55:00Z
10
value 0.00089
scoring_system epss
scoring_elements 0.25374
published_at 2026-04-11T12:55:00Z
11
value 0.00089
scoring_system epss
scoring_elements 0.25363
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-27191
2
reference_url https://cs.opensource.google/go/x/crypto
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://cs.opensource.google/go/x/crypto
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27191
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27191
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://go.dev/cl/392355
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://go.dev/cl/392355
6
reference_url https://go.googlesource.com/crypto/+/1baeb1ce4c0b006eff0f294c47cb7617598dfb3d
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://go.googlesource.com/crypto/+/1baeb1ce4c0b006eff0f294c47cb7617598dfb3d
7
reference_url https://groups.google.com/g/golang-announce
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://groups.google.com/g/golang-announce
8
reference_url https://groups.google.com/g/golang-announce/c/-cp44ypCT5s
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://groups.google.com/g/golang-announce/c/-cp44ypCT5s
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DLUJZV3HBP56ADXU6QH2V7RNYUPMVBXQ
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DLUJZV3HBP56ADXU6QH2V7RNYUPMVBXQ
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZ3S7LB65N54HXXBCB67P4TTOHTNPP5O
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZ3S7LB65N54HXXBCB67P4TTOHTNPP5O
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HHGBEGJ54DZZGTXFUQNS7ZIG3E624YAF
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HHGBEGJ54DZZGTXFUQNS7ZIG3E624YAF
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J5WPM42UR6XIBQNQPNQHM32X7S4LJTRX
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J5WPM42UR6XIBQNQPNQHM32X7S4LJTRX
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QTFOIDHQRGNI4P6LYN6ILH5G443RYYKB
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QTFOIDHQRGNI4P6LYN6ILH5G443RYYKB
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RQXU752ALW53OJAF5MG3WMR5CCZVLWW6
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RQXU752ALW53OJAF5MG3WMR5CCZVLWW6
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YHYRQB7TRMHDB3NEHW5XBRG7PPMUTPGV
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YHYRQB7TRMHDB3NEHW5XBRG7PPMUTPGV
16
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z55VUVGO7E5PJFXIOVAY373NZRHBNCI5
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z55VUVGO7E5PJFXIOVAY373NZRHBNCI5
17
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFUNHFHQVJSADNH7EZ3B53CYDZVEEPBP
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFUNHFHQVJSADNH7EZ3B53CYDZVEEPBP
18
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQNPPQWSTP2IX7SHE6TS4SP4EVMI5EZK
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQNPPQWSTP2IX7SHE6TS4SP4EVMI5EZK
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZY2SLWOQR4ZURQ7UBRZ7JIX6H6F5JHJR
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZY2SLWOQR4ZURQ7UBRZ7JIX6H6F5JHJR
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-27191
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-27191
21
reference_url https://pkg.go.dev/vuln/GO-2021-0356
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://pkg.go.dev/vuln/GO-2021-0356
22
reference_url https://raw.githubusercontent.com/golang/vulndb/df2d3d326300e2ae768f00351ffa96cc2c56cf54/reports/GO-2021-0356.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://raw.githubusercontent.com/golang/vulndb/df2d3d326300e2ae768f00351ffa96cc2c56cf54/reports/GO-2021-0356.yaml
23
reference_url https://security.netapp.com/advisory/ntap-20220429-0002
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20220429-0002
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2064702
reference_id 2064702
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2064702
25
reference_url https://access.redhat.com/errata/RHSA-2022:5068
reference_id RHSA-2022:5068
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5068
26
reference_url https://access.redhat.com/errata/RHSA-2022:5069
reference_id RHSA-2022:5069
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5069
27
reference_url https://access.redhat.com/errata/RHSA-2022:6527
reference_id RHSA-2022:6527
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6527
28
reference_url https://access.redhat.com/errata/RHSA-2022:7401
reference_id RHSA-2022:7401
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7401
29
reference_url https://access.redhat.com/errata/RHSA-2022:7457
reference_id RHSA-2022:7457
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7457
30
reference_url https://access.redhat.com/errata/RHSA-2022:7469
reference_id RHSA-2022:7469
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7469
31
reference_url https://access.redhat.com/errata/RHSA-2022:7954
reference_id RHSA-2022:7954
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7954
32
reference_url https://access.redhat.com/errata/RHSA-2022:8634
reference_id RHSA-2022:8634
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8634
33
reference_url https://access.redhat.com/errata/RHSA-2022:8893
reference_id RHSA-2022:8893
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8893
34
reference_url https://access.redhat.com/errata/RHSA-2022:8932
reference_id RHSA-2022:8932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8932
35
reference_url https://access.redhat.com/errata/RHSA-2022:8938
reference_id RHSA-2022:8938
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8938
36
reference_url https://access.redhat.com/errata/RHSA-2022:9096
reference_id RHSA-2022:9096
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9096
37
reference_url https://access.redhat.com/errata/RHSA-2022:9107
reference_id RHSA-2022:9107
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9107
38
reference_url https://access.redhat.com/errata/RHSA-2023:1325
reference_id RHSA-2023:1325
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1325
39
reference_url https://access.redhat.com/errata/RHSA-2023:1326
reference_id RHSA-2023:1326
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1326
40
reference_url https://access.redhat.com/errata/RHSA-2023:3366
reference_id RHSA-2023:3366
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3366
41
reference_url https://access.redhat.com/errata/RHSA-2023:3943
reference_id RHSA-2023:3943
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3943
42
reference_url https://access.redhat.com/errata/RHSA-2023:4488
reference_id RHSA-2023:4488
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4488
fixed_packages
aliases CVE-2022-27191, GHSA-8c26-wmh5-6g9v
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1n1h-e2p4-9yhs
1
url VCID-83z3-5q22-wycr
vulnerability_id VCID-83z3-5q22-wycr
summary
Podman Origin Validation Error
Rootless containers run with Podman, receive all traffic with a source IP address of 127.0.0.1 (including from remote hosts). This impacts containerized applications that trust localhost (127.0.01) connections by default and do not require authentication. This issue affects Podman versions from 1.8.0 to 3.0.0.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20199.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20199.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-20199
reference_id
reference_type
scores
0
value 0.00279
scoring_system epss
scoring_elements 0.51272
published_at 2026-04-24T12:55:00Z
1
value 0.00279
scoring_system epss
scoring_elements 0.51199
published_at 2026-04-01T12:55:00Z
2
value 0.00279
scoring_system epss
scoring_elements 0.51252
published_at 2026-04-02T12:55:00Z
3
value 0.00279
scoring_system epss
scoring_elements 0.51277
published_at 2026-04-04T12:55:00Z
4
value 0.00279
scoring_system epss
scoring_elements 0.51237
published_at 2026-04-07T12:55:00Z
5
value 0.00279
scoring_system epss
scoring_elements 0.51292
published_at 2026-04-08T12:55:00Z
6
value 0.00279
scoring_system epss
scoring_elements 0.51289
published_at 2026-04-09T12:55:00Z
7
value 0.00279
scoring_system epss
scoring_elements 0.51332
published_at 2026-04-11T12:55:00Z
8
value 0.00279
scoring_system epss
scoring_elements 0.51311
published_at 2026-04-12T12:55:00Z
9
value 0.00279
scoring_system epss
scoring_elements 0.51297
published_at 2026-04-13T12:55:00Z
10
value 0.00279
scoring_system epss
scoring_elements 0.51338
published_at 2026-04-16T12:55:00Z
11
value 0.00279
scoring_system epss
scoring_elements 0.51346
published_at 2026-04-18T12:55:00Z
12
value 0.00279
scoring_system epss
scoring_elements 0.51325
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-20199
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1919050
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=1919050
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20199
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://github.com/containers/podman/issues/5138
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/containers/podman/issues/5138
6
reference_url https://github.com/containers/podman/pull/9052
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/containers/podman/pull/9052
7
reference_url https://github.com/containers/podman/pull/9225
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/containers/podman/pull/9225
8
reference_url https://github.com/containers/podman/releases/tag/v3.0.0-rc3
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/containers/podman/releases/tag/v3.0.0-rc3
9
reference_url https://github.com/rootless-containers/rootlesskit/pull/206
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rootless-containers/rootlesskit/pull/206
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-20199
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2021-20199
11
reference_url https://security.archlinux.org/AVG-1517
reference_id AVG-1517
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1517
12
reference_url https://access.redhat.com/errata/RHSA-2021:1796
reference_id RHSA-2021:1796
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1796
13
reference_url https://access.redhat.com/errata/RHSA-2022:7954
reference_id RHSA-2022:7954
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7954
fixed_packages
aliases CVE-2021-20199, GHSA-grh6-q6m2-rh72
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-83z3-5q22-wycr
2
url VCID-ayxa-s9j4-k7hd
vulnerability_id VCID-ayxa-s9j4-k7hd
summary Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-34558.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-34558.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-34558
reference_id
reference_type
scores
0
value 0.00917
scoring_system epss
scoring_elements 0.7598
published_at 2026-04-24T12:55:00Z
1
value 0.00917
scoring_system epss
scoring_elements 0.75918
published_at 2026-04-13T12:55:00Z
2
value 0.00917
scoring_system epss
scoring_elements 0.75955
published_at 2026-04-16T12:55:00Z
3
value 0.00917
scoring_system epss
scoring_elements 0.75957
published_at 2026-04-18T12:55:00Z
4
value 0.00917
scoring_system epss
scoring_elements 0.75942
published_at 2026-04-21T12:55:00Z
5
value 0.00917
scoring_system epss
scoring_elements 0.75899
published_at 2026-04-04T12:55:00Z
6
value 0.00917
scoring_system epss
scoring_elements 0.75878
published_at 2026-04-07T12:55:00Z
7
value 0.00917
scoring_system epss
scoring_elements 0.75911
published_at 2026-04-08T12:55:00Z
8
value 0.00917
scoring_system epss
scoring_elements 0.75924
published_at 2026-04-09T12:55:00Z
9
value 0.00917
scoring_system epss
scoring_elements 0.75947
published_at 2026-04-11T12:55:00Z
10
value 0.00917
scoring_system epss
scoring_elements 0.75925
published_at 2026-04-12T12:55:00Z
11
value 0.01475
scoring_system epss
scoring_elements 0.80907
published_at 2026-04-02T12:55:00Z
12
value 0.01475
scoring_system epss
scoring_elements 0.80898
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-34558
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34558
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34558
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1983596
reference_id 1983596
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1983596
5
reference_url https://security.archlinux.org/ASA-202107-42
reference_id ASA-202107-42
reference_type
scores
url https://security.archlinux.org/ASA-202107-42
6
reference_url https://security.archlinux.org/AVG-2147
reference_id AVG-2147
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2147
7
reference_url https://security.gentoo.org/glsa/202208-02
reference_id GLSA-202208-02
reference_type
scores
url https://security.gentoo.org/glsa/202208-02
8
reference_url https://access.redhat.com/errata/RHSA-2021:2983
reference_id RHSA-2021:2983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2983
9
reference_url https://access.redhat.com/errata/RHSA-2021:2984
reference_id RHSA-2021:2984
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2984
10
reference_url https://access.redhat.com/errata/RHSA-2021:3009
reference_id RHSA-2021:3009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3009
11
reference_url https://access.redhat.com/errata/RHSA-2021:3015
reference_id RHSA-2021:3015
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3015
12
reference_url https://access.redhat.com/errata/RHSA-2021:3076
reference_id RHSA-2021:3076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3076
13
reference_url https://access.redhat.com/errata/RHSA-2021:3146
reference_id RHSA-2021:3146
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3146
14
reference_url https://access.redhat.com/errata/RHSA-2021:3229
reference_id RHSA-2021:3229
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3229
15
reference_url https://access.redhat.com/errata/RHSA-2021:3248
reference_id RHSA-2021:3248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3248
16
reference_url https://access.redhat.com/errata/RHSA-2021:3361
reference_id RHSA-2021:3361
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3361
17
reference_url https://access.redhat.com/errata/RHSA-2021:3555
reference_id RHSA-2021:3555
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3555
18
reference_url https://access.redhat.com/errata/RHSA-2021:3556
reference_id RHSA-2021:3556
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3556
19
reference_url https://access.redhat.com/errata/RHSA-2021:3598
reference_id RHSA-2021:3598
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3598
20
reference_url https://access.redhat.com/errata/RHSA-2021:3733
reference_id RHSA-2021:3733
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3733
21
reference_url https://access.redhat.com/errata/RHSA-2021:3759
reference_id RHSA-2021:3759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3759
22
reference_url https://access.redhat.com/errata/RHSA-2021:3820
reference_id RHSA-2021:3820
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3820
23
reference_url https://access.redhat.com/errata/RHSA-2021:4104
reference_id RHSA-2021:4104
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4104
24
reference_url https://access.redhat.com/errata/RHSA-2021:4226
reference_id RHSA-2021:4226
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4226
25
reference_url https://access.redhat.com/errata/RHSA-2021:4582
reference_id RHSA-2021:4582
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4582
26
reference_url https://access.redhat.com/errata/RHSA-2021:4722
reference_id RHSA-2021:4722
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4722
27
reference_url https://access.redhat.com/errata/RHSA-2021:5085
reference_id RHSA-2021:5085
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5085
28
reference_url https://access.redhat.com/errata/RHSA-2021:5086
reference_id RHSA-2021:5086
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5086
29
reference_url https://access.redhat.com/errata/RHSA-2022:0191
reference_id RHSA-2022:0191
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0191
30
reference_url https://access.redhat.com/errata/RHSA-2022:0237
reference_id RHSA-2022:0237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0237
31
reference_url https://access.redhat.com/errata/RHSA-2022:0260
reference_id RHSA-2022:0260
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0260
32
reference_url https://access.redhat.com/errata/RHSA-2022:0577
reference_id RHSA-2022:0577
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0577
33
reference_url https://access.redhat.com/errata/RHSA-2022:0988
reference_id RHSA-2022:0988
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0988
34
reference_url https://access.redhat.com/errata/RHSA-2022:0998
reference_id RHSA-2022:0998
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0998
35
reference_url https://access.redhat.com/errata/RHSA-2022:1329
reference_id RHSA-2022:1329
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1329
36
reference_url https://access.redhat.com/errata/RHSA-2022:1372
reference_id RHSA-2022:1372
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1372
37
reference_url https://access.redhat.com/errata/RHSA-2022:7954
reference_id RHSA-2022:7954
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7954
38
reference_url https://access.redhat.com/errata/RHSA-2024:2988
reference_id RHSA-2024:2988
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2988
fixed_packages
aliases CVE-2021-34558
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ayxa-s9j4-k7hd
3
url VCID-hvfd-h9rm-jkbw
vulnerability_id VCID-hvfd-h9rm-jkbw
summary golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-28852.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-28852.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-28852
reference_id
reference_type
scores
0
value 0.00107
scoring_system epss
scoring_elements 0.28995
published_at 2026-04-01T12:55:00Z
1
value 0.00107
scoring_system epss
scoring_elements 0.29072
published_at 2026-04-02T12:55:00Z
2
value 0.00107
scoring_system epss
scoring_elements 0.29123
published_at 2026-04-04T12:55:00Z
3
value 0.00107
scoring_system epss
scoring_elements 0.28934
published_at 2026-04-07T12:55:00Z
4
value 0.00107
scoring_system epss
scoring_elements 0.28999
published_at 2026-04-08T12:55:00Z
5
value 0.00107
scoring_system epss
scoring_elements 0.29042
published_at 2026-04-09T12:55:00Z
6
value 0.00107
scoring_system epss
scoring_elements 0.29046
published_at 2026-04-11T12:55:00Z
7
value 0.00107
scoring_system epss
scoring_elements 0.29001
published_at 2026-04-12T12:55:00Z
8
value 0.00107
scoring_system epss
scoring_elements 0.28952
published_at 2026-04-13T12:55:00Z
9
value 0.00107
scoring_system epss
scoring_elements 0.28976
published_at 2026-04-16T12:55:00Z
10
value 0.00107
scoring_system epss
scoring_elements 0.28954
published_at 2026-04-18T12:55:00Z
11
value 0.00107
scoring_system epss
scoring_elements 0.28908
published_at 2026-04-21T12:55:00Z
12
value 0.00107
scoring_system epss
scoring_elements 0.28787
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-28852
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28852
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1913338
reference_id 1913338
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1913338
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980002
reference_id 980002
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980002
6
reference_url https://access.redhat.com/errata/RHSA-2021:2438
reference_id RHSA-2021:2438
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2438
7
reference_url https://access.redhat.com/errata/RHSA-2022:0577
reference_id RHSA-2022:0577
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0577
8
reference_url https://access.redhat.com/errata/RHSA-2022:1276
reference_id RHSA-2022:1276
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1276
9
reference_url https://access.redhat.com/errata/RHSA-2022:7129
reference_id RHSA-2022:7129
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7129
10
reference_url https://access.redhat.com/errata/RHSA-2022:7954
reference_id RHSA-2022:7954
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7954
11
reference_url https://usn.ubuntu.com/5873-1/
reference_id USN-5873-1
reference_type
scores
url https://usn.ubuntu.com/5873-1/
fixed_packages
aliases CVE-2020-28852
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hvfd-h9rm-jkbw
4
url VCID-mzjw-b6mh-nugs
vulnerability_id VCID-mzjw-b6mh-nugs
summary
Exposure of Sensitive Information to an Unauthorized Actor and Origin Validation Error in podman
A flaw was found in podman. The `podman machine` function (used to create and manage Podman virtual machine containing a Podman process) spawns a `gvproxy` process on the host system. The `gvproxy` API is accessible on port 7777 on all IP addresses on the host. If that port is open on the host's firewall, an attacker can potentially use the `gvproxy` API to forward ports on the host to ports in the VM, making private services on the VM accessible to the network. This issue could be also used to interrupt the host's services by forwarding all ports to the VM.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4024.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4024.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-4024
reference_id
reference_type
scores
0
value 0.00095
scoring_system epss
scoring_elements 0.26318
published_at 2026-04-24T12:55:00Z
1
value 0.00095
scoring_system epss
scoring_elements 0.26383
published_at 2026-04-21T12:55:00Z
2
value 0.00095
scoring_system epss
scoring_elements 0.26636
published_at 2026-04-04T12:55:00Z
3
value 0.00095
scoring_system epss
scoring_elements 0.26592
published_at 2026-04-02T12:55:00Z
4
value 0.00095
scoring_system epss
scoring_elements 0.26421
published_at 2026-04-07T12:55:00Z
5
value 0.00095
scoring_system epss
scoring_elements 0.26419
published_at 2026-04-18T12:55:00Z
6
value 0.00095
scoring_system epss
scoring_elements 0.26449
published_at 2026-04-16T12:55:00Z
7
value 0.00095
scoring_system epss
scoring_elements 0.26442
published_at 2026-04-13T12:55:00Z
8
value 0.00095
scoring_system epss
scoring_elements 0.26499
published_at 2026-04-12T12:55:00Z
9
value 0.00095
scoring_system epss
scoring_elements 0.26546
published_at 2026-04-11T12:55:00Z
10
value 0.00095
scoring_system epss
scoring_elements 0.26541
published_at 2026-04-01T12:55:00Z
11
value 0.00095
scoring_system epss
scoring_elements 0.26539
published_at 2026-04-09T12:55:00Z
12
value 0.00095
scoring_system epss
scoring_elements 0.2649
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-4024
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2026675,
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=2026675,
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/containers/podman
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/containers/podman
5
reference_url https://github.com/containers/podman/releases/tag/v3.4.3
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/containers/podman/releases/tag/v3.4.3
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QFFVJ6S3ZRMPDYB7KYAWEMDHXFZYQPU3
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QFFVJ6S3ZRMPDYB7KYAWEMDHXFZYQPU3
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-4024
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2021-4024
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1000844
reference_id 1000844
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1000844
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2026675
reference_id 2026675
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2026675
10
reference_url https://security.archlinux.org/AVG-2591
reference_id AVG-2591
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2591
11
reference_url https://security.gentoo.org/glsa/202407-12
reference_id GLSA-202407-12
reference_type
scores
url https://security.gentoo.org/glsa/202407-12
12
reference_url https://access.redhat.com/errata/RHSA-2022:7954
reference_id RHSA-2022:7954
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7954
13
reference_url https://access.redhat.com/errata/RHSA-2024:10289
reference_id RHSA-2024:10289
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10289
fixed_packages
aliases CVE-2021-4024, GHSA-3cf2-x423-x582
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mzjw-b6mh-nugs
5
url VCID-pqs8-s3dm-7ff2
vulnerability_id VCID-pqs8-s3dm-7ff2
summary
Improper Locking in github.com/containers/storage
A deadlock vulnerability was found in `github.com/containers/storage` in versions before 1.28.1. When a container image is processed, each layer is unpacked using `tar`. If one of those layers is not a valid `tar` archive this causes an error leading to an unexpected situation where the code indefinitely waits for the tar unpacked stream, which never finishes. An attacker could use this vulnerability to craft a malicious image, which when downloaded and stored by an application using containers/storage, would then cause a deadlock leading to a Denial of Service (DoS).
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20291.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20291.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-20291
reference_id
reference_type
scores
0
value 0.01026
scoring_system epss
scoring_elements 0.77349
published_at 2026-04-24T12:55:00Z
1
value 0.01026
scoring_system epss
scoring_elements 0.77286
published_at 2026-04-12T12:55:00Z
2
value 0.01026
scoring_system epss
scoring_elements 0.77315
published_at 2026-04-21T12:55:00Z
3
value 0.01026
scoring_system epss
scoring_elements 0.77323
published_at 2026-04-18T12:55:00Z
4
value 0.01026
scoring_system epss
scoring_elements 0.77324
published_at 2026-04-16T12:55:00Z
5
value 0.01026
scoring_system epss
scoring_elements 0.77283
published_at 2026-04-13T12:55:00Z
6
value 0.01026
scoring_system epss
scoring_elements 0.77221
published_at 2026-04-01T12:55:00Z
7
value 0.01026
scoring_system epss
scoring_elements 0.77228
published_at 2026-04-02T12:55:00Z
8
value 0.01026
scoring_system epss
scoring_elements 0.77257
published_at 2026-04-04T12:55:00Z
9
value 0.01026
scoring_system epss
scoring_elements 0.77239
published_at 2026-04-07T12:55:00Z
10
value 0.01026
scoring_system epss
scoring_elements 0.7727
published_at 2026-04-08T12:55:00Z
11
value 0.01026
scoring_system epss
scoring_elements 0.77279
published_at 2026-04-09T12:55:00Z
12
value 0.01026
scoring_system epss
scoring_elements 0.77306
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-20291
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1939485
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=1939485
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20291
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://github.com/containers/storage
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/containers/storage
6
reference_url https://github.com/containers/storage/commit/306fcabc964470e4b3b87a43a8f6b7d698209ee1
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/containers/storage/commit/306fcabc964470e4b3b87a43a8f6b7d698209ee1
7
reference_url https://github.com/containers/storage/pull/860
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/containers/storage/pull/860
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R5D7XL7FL24TWFMGQ3K2S72EOUSLZMKL
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R5D7XL7FL24TWFMGQ3K2S72EOUSLZMKL
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYOHNG2Q7DCAQZMGYLMENLKALGDLG3X
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYOHNG2Q7DCAQZMGYLMENLKALGDLG3X
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WX24EITRXVHDM5M223BVTJA2ODF2FSHI
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WX24EITRXVHDM5M223BVTJA2ODF2FSHI
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNMB7O2UIXE34PGSCSOULGHPX5LIJBMM
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNMB7O2UIXE34PGSCSOULGHPX5LIJBMM
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-20291
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2021-20291
13
reference_url https://pkg.go.dev/vuln/GO-2021-0100
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://pkg.go.dev/vuln/GO-2021-0100
14
reference_url https://unit42.paloaltonetworks.com/cve-2021-20291
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://unit42.paloaltonetworks.com/cve-2021-20291
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988942
reference_id 988942
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988942
16
reference_url https://access.redhat.com/errata/RHSA-2021:1150
reference_id RHSA-2021:1150
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1150
17
reference_url https://access.redhat.com/errata/RHSA-2021:2438
reference_id RHSA-2021:2438
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2438
18
reference_url https://access.redhat.com/errata/RHSA-2021:4154
reference_id RHSA-2021:4154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4154
19
reference_url https://access.redhat.com/errata/RHSA-2022:7954
reference_id RHSA-2022:7954
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7954
20
reference_url https://access.redhat.com/errata/RHSA-2022:7955
reference_id RHSA-2022:7955
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7955
fixed_packages
aliases CVE-2021-20291, GHSA-7qw8-847f-pggm
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pqs8-s3dm-7ff2
6
url VCID-r52s-2crw-tfbx
vulnerability_id VCID-r52s-2crw-tfbx
summary golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-28851.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-28851.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-28851
reference_id
reference_type
scores
0
value 0.00138
scoring_system epss
scoring_elements 0.3356
published_at 2026-04-01T12:55:00Z
1
value 0.00138
scoring_system epss
scoring_elements 0.33894
published_at 2026-04-02T12:55:00Z
2
value 0.00138
scoring_system epss
scoring_elements 0.33926
published_at 2026-04-04T12:55:00Z
3
value 0.00138
scoring_system epss
scoring_elements 0.33779
published_at 2026-04-21T12:55:00Z
4
value 0.00138
scoring_system epss
scoring_elements 0.33822
published_at 2026-04-08T12:55:00Z
5
value 0.00138
scoring_system epss
scoring_elements 0.33855
published_at 2026-04-09T12:55:00Z
6
value 0.00138
scoring_system epss
scoring_elements 0.33853
published_at 2026-04-11T12:55:00Z
7
value 0.00138
scoring_system epss
scoring_elements 0.33811
published_at 2026-04-18T12:55:00Z
8
value 0.00138
scoring_system epss
scoring_elements 0.33787
published_at 2026-04-13T12:55:00Z
9
value 0.00138
scoring_system epss
scoring_elements 0.33825
published_at 2026-04-16T12:55:00Z
10
value 0.00138
scoring_system epss
scoring_elements 0.33412
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-28851
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28851
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1913333
reference_id 1913333
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1913333
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980001
reference_id 980001
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980001
6
reference_url https://access.redhat.com/errata/RHSA-2022:0577
reference_id RHSA-2022:0577
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0577
7
reference_url https://access.redhat.com/errata/RHSA-2022:1276
reference_id RHSA-2022:1276
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1276
8
reference_url https://access.redhat.com/errata/RHSA-2022:1762
reference_id RHSA-2022:1762
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1762
9
reference_url https://access.redhat.com/errata/RHSA-2022:7129
reference_id RHSA-2022:7129
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7129
10
reference_url https://access.redhat.com/errata/RHSA-2022:7954
reference_id RHSA-2022:7954
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7954
11
reference_url https://usn.ubuntu.com/5873-1/
reference_id USN-5873-1
reference_type
scores
url https://usn.ubuntu.com/5873-1/
fixed_packages
aliases CVE-2020-28851
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r52s-2crw-tfbx
7
url VCID-z1ct-cecz-mqer
vulnerability_id VCID-z1ct-cecz-mqer
summary Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33197.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33197.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-33197
reference_id
reference_type
scores
0
value 0.00039
scoring_system epss
scoring_elements 0.11881
published_at 2026-04-01T12:55:00Z
1
value 0.00039
scoring_system epss
scoring_elements 0.11876
published_at 2026-04-24T12:55:00Z
2
value 0.00039
scoring_system epss
scoring_elements 0.11785
published_at 2026-04-18T12:55:00Z
3
value 0.00039
scoring_system epss
scoring_elements 0.11905
published_at 2026-04-21T12:55:00Z
4
value 0.00039
scoring_system epss
scoring_elements 0.11994
published_at 2026-04-02T12:55:00Z
5
value 0.00039
scoring_system epss
scoring_elements 0.12037
published_at 2026-04-04T12:55:00Z
6
value 0.00039
scoring_system epss
scoring_elements 0.11839
published_at 2026-04-07T12:55:00Z
7
value 0.00039
scoring_system epss
scoring_elements 0.11922
published_at 2026-04-08T12:55:00Z
8
value 0.00039
scoring_system epss
scoring_elements 0.11974
published_at 2026-04-09T12:55:00Z
9
value 0.00039
scoring_system epss
scoring_elements 0.11981
published_at 2026-04-11T12:55:00Z
10
value 0.00039
scoring_system epss
scoring_elements 0.11944
published_at 2026-04-12T12:55:00Z
11
value 0.00039
scoring_system epss
scoring_elements 0.11918
published_at 2026-04-13T12:55:00Z
12
value 0.00039
scoring_system epss
scoring_elements 0.11787
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-33197
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33197
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1989570
reference_id 1989570
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1989570
5
reference_url https://security.archlinux.org/ASA-202106-42
reference_id ASA-202106-42
reference_type
scores
url https://security.archlinux.org/ASA-202106-42
6
reference_url https://security.archlinux.org/AVG-2006
reference_id AVG-2006
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2006
7
reference_url https://security.gentoo.org/glsa/202208-02
reference_id GLSA-202208-02
reference_type
scores
url https://security.gentoo.org/glsa/202208-02
8
reference_url https://access.redhat.com/errata/RHSA-2021:2983
reference_id RHSA-2021:2983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2983
9
reference_url https://access.redhat.com/errata/RHSA-2021:2984
reference_id RHSA-2021:2984
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2984
10
reference_url https://access.redhat.com/errata/RHSA-2021:3009
reference_id RHSA-2021:3009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3009
11
reference_url https://access.redhat.com/errata/RHSA-2021:3146
reference_id RHSA-2021:3146
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3146
12
reference_url https://access.redhat.com/errata/RHSA-2021:3229
reference_id RHSA-2021:3229
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3229
13
reference_url https://access.redhat.com/errata/RHSA-2021:3248
reference_id RHSA-2021:3248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3248
14
reference_url https://access.redhat.com/errata/RHSA-2021:3361
reference_id RHSA-2021:3361
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3361
15
reference_url https://access.redhat.com/errata/RHSA-2021:3431
reference_id RHSA-2021:3431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3431
16
reference_url https://access.redhat.com/errata/RHSA-2021:3487
reference_id RHSA-2021:3487
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3487
17
reference_url https://access.redhat.com/errata/RHSA-2021:3555
reference_id RHSA-2021:3555
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3555
18
reference_url https://access.redhat.com/errata/RHSA-2021:3556
reference_id RHSA-2021:3556
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3556
19
reference_url https://access.redhat.com/errata/RHSA-2021:3598
reference_id RHSA-2021:3598
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3598
20
reference_url https://access.redhat.com/errata/RHSA-2021:3759
reference_id RHSA-2021:3759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3759
21
reference_url https://access.redhat.com/errata/RHSA-2021:3820
reference_id RHSA-2021:3820
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3820
22
reference_url https://access.redhat.com/errata/RHSA-2021:4104
reference_id RHSA-2021:4104
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4104
23
reference_url https://access.redhat.com/errata/RHSA-2021:4156
reference_id RHSA-2021:4156
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4156
24
reference_url https://access.redhat.com/errata/RHSA-2021:4226
reference_id RHSA-2021:4226
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4226
25
reference_url https://access.redhat.com/errata/RHSA-2021:5072
reference_id RHSA-2021:5072
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5072
26
reference_url https://access.redhat.com/errata/RHSA-2021:5085
reference_id RHSA-2021:5085
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5085
27
reference_url https://access.redhat.com/errata/RHSA-2021:5086
reference_id RHSA-2021:5086
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5086
28
reference_url https://access.redhat.com/errata/RHSA-2022:0191
reference_id RHSA-2022:0191
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0191
29
reference_url https://access.redhat.com/errata/RHSA-2022:0577
reference_id RHSA-2022:0577
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0577
30
reference_url https://access.redhat.com/errata/RHSA-2022:1329
reference_id RHSA-2022:1329
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1329
31
reference_url https://access.redhat.com/errata/RHSA-2022:1402
reference_id RHSA-2022:1402
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1402
32
reference_url https://access.redhat.com/errata/RHSA-2022:7954
reference_id RHSA-2022:7954
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7954
fixed_packages
aliases CVE-2021-33197
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z1ct-cecz-mqer
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/podman@2:4.2.0-3%3Farch=el9