Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/redhat-virtualization-host@4.4.10-202202081536_8?arch=5
Typerpm
Namespaceredhat
Nameredhat-virtualization-host
Version4.4.10-202202081536_8
Qualifiers
arch 5
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-45du-dgkd-p3b8
vulnerability_id VCID-45du-dgkd-p3b8
summary kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4155.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4155.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-4155
reference_id
reference_type
scores
0
value 0.0002
scoring_system epss
scoring_elements 0.05306
published_at 2026-04-01T12:55:00Z
1
value 0.0002
scoring_system epss
scoring_elements 0.05347
published_at 2026-04-18T12:55:00Z
2
value 0.0002
scoring_system epss
scoring_elements 0.05378
published_at 2026-04-04T12:55:00Z
3
value 0.0002
scoring_system epss
scoring_elements 0.05387
published_at 2026-04-07T12:55:00Z
4
value 0.0002
scoring_system epss
scoring_elements 0.0542
published_at 2026-04-08T12:55:00Z
5
value 0.0002
scoring_system epss
scoring_elements 0.05443
published_at 2026-04-09T12:55:00Z
6
value 0.0002
scoring_system epss
scoring_elements 0.05416
published_at 2026-04-11T12:55:00Z
7
value 0.0002
scoring_system epss
scoring_elements 0.05403
published_at 2026-04-12T12:55:00Z
8
value 0.0002
scoring_system epss
scoring_elements 0.05396
published_at 2026-04-13T12:55:00Z
9
value 0.0002
scoring_system epss
scoring_elements 0.05345
published_at 2026-04-16T12:55:00Z
10
value 0.0002
scoring_system epss
scoring_elements 0.0551
published_at 2026-04-21T12:55:00Z
11
value 0.0002
scoring_system epss
scoring_elements 0.05547
published_at 2026-04-24T12:55:00Z
12
value 0.0002
scoring_system epss
scoring_elements 0.05584
published_at 2026-04-26T12:55:00Z
13
value 0.0002
scoring_system epss
scoring_elements 0.05585
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-4155
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29374
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29374
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36322
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20317
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22600
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28950
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38300
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38300
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39686
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39686
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39698
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39713
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39713
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4135
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4202
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4202
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4203
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4203
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44733
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0185
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0185
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0322
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23222
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24959
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24959
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375
55
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
56
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2034813
reference_id 2034813
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2034813
57
reference_url https://access.redhat.com/errata/RHSA-2022:0176
reference_id RHSA-2022:0176
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0176
58
reference_url https://access.redhat.com/errata/RHSA-2022:0186
reference_id RHSA-2022:0186
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0186
59
reference_url https://access.redhat.com/errata/RHSA-2022:0187
reference_id RHSA-2022:0187
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0187
60
reference_url https://access.redhat.com/errata/RHSA-2022:0188
reference_id RHSA-2022:0188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0188
61
reference_url https://access.redhat.com/errata/RHSA-2022:0231
reference_id RHSA-2022:0231
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0231
62
reference_url https://access.redhat.com/errata/RHSA-2022:0232
reference_id RHSA-2022:0232
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0232
63
reference_url https://access.redhat.com/errata/RHSA-2022:0335
reference_id RHSA-2022:0335
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0335
64
reference_url https://access.redhat.com/errata/RHSA-2022:0344
reference_id RHSA-2022:0344
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0344
65
reference_url https://access.redhat.com/errata/RHSA-2022:0529
reference_id RHSA-2022:0529
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0529
66
reference_url https://access.redhat.com/errata/RHSA-2022:0530
reference_id RHSA-2022:0530
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0530
67
reference_url https://access.redhat.com/errata/RHSA-2022:0531
reference_id RHSA-2022:0531
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0531
68
reference_url https://access.redhat.com/errata/RHSA-2022:0533
reference_id RHSA-2022:0533
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0533
69
reference_url https://access.redhat.com/errata/RHSA-2022:0540
reference_id RHSA-2022:0540
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0540
70
reference_url https://access.redhat.com/errata/RHSA-2022:0590
reference_id RHSA-2022:0590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0590
71
reference_url https://access.redhat.com/errata/RHSA-2022:0592
reference_id RHSA-2022:0592
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0592
72
reference_url https://access.redhat.com/errata/RHSA-2022:0620
reference_id RHSA-2022:0620
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0620
73
reference_url https://access.redhat.com/errata/RHSA-2022:0622
reference_id RHSA-2022:0622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0622
74
reference_url https://access.redhat.com/errata/RHSA-2022:0629
reference_id RHSA-2022:0629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0629
75
reference_url https://access.redhat.com/errata/RHSA-2022:0636
reference_id RHSA-2022:0636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0636
76
reference_url https://access.redhat.com/errata/RHSA-2022:0712
reference_id RHSA-2022:0712
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0712
77
reference_url https://access.redhat.com/errata/RHSA-2022:0718
reference_id RHSA-2022:0718
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0718
78
reference_url https://access.redhat.com/errata/RHSA-2022:0958
reference_id RHSA-2022:0958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0958
79
reference_url https://access.redhat.com/errata/RHSA-2022:1263
reference_id RHSA-2022:1263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1263
80
reference_url https://access.redhat.com/errata/RHSA-2022:1417
reference_id RHSA-2022:1417
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1417
81
reference_url https://usn.ubuntu.com/5278-1/
reference_id USN-5278-1
reference_type
scores
url https://usn.ubuntu.com/5278-1/
82
reference_url https://usn.ubuntu.com/5294-1/
reference_id USN-5294-1
reference_type
scores
url https://usn.ubuntu.com/5294-1/
83
reference_url https://usn.ubuntu.com/5294-2/
reference_id USN-5294-2
reference_type
scores
url https://usn.ubuntu.com/5294-2/
84
reference_url https://usn.ubuntu.com/5295-1/
reference_id USN-5295-1
reference_type
scores
url https://usn.ubuntu.com/5295-1/
85
reference_url https://usn.ubuntu.com/5295-2/
reference_id USN-5295-2
reference_type
scores
url https://usn.ubuntu.com/5295-2/
86
reference_url https://usn.ubuntu.com/5297-1/
reference_id USN-5297-1
reference_type
scores
url https://usn.ubuntu.com/5297-1/
87
reference_url https://usn.ubuntu.com/5298-1/
reference_id USN-5298-1
reference_type
scores
url https://usn.ubuntu.com/5298-1/
88
reference_url https://usn.ubuntu.com/5362-1/
reference_id USN-5362-1
reference_type
scores
url https://usn.ubuntu.com/5362-1/
89
reference_url https://usn.ubuntu.com/5884-1/
reference_id USN-5884-1
reference_type
scores
url https://usn.ubuntu.com/5884-1/
90
reference_url https://usn.ubuntu.com/5926-1/
reference_id USN-5926-1
reference_type
scores
url https://usn.ubuntu.com/5926-1/
fixed_packages
aliases CVE-2021-4155
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-45du-dgkd-p3b8
1
url VCID-rbaq-2dap-y7bt
vulnerability_id VCID-rbaq-2dap-y7bt
summary kernel: fs_context: heap overflow in legacy parameter handling
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0185.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0185.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-0185
reference_id
reference_type
scores
0
value 0.01828
scoring_system epss
scoring_elements 0.82851
published_at 2026-04-02T12:55:00Z
1
value 0.01828
scoring_system epss
scoring_elements 0.82834
published_at 2026-04-01T12:55:00Z
2
value 0.02147
scoring_system epss
scoring_elements 0.84229
published_at 2026-04-13T12:55:00Z
3
value 0.02147
scoring_system epss
scoring_elements 0.8422
published_at 2026-04-09T12:55:00Z
4
value 0.02147
scoring_system epss
scoring_elements 0.84238
published_at 2026-04-11T12:55:00Z
5
value 0.02147
scoring_system epss
scoring_elements 0.84232
published_at 2026-04-12T12:55:00Z
6
value 0.02147
scoring_system epss
scoring_elements 0.84252
published_at 2026-04-18T12:55:00Z
7
value 0.02147
scoring_system epss
scoring_elements 0.84251
published_at 2026-04-16T12:55:00Z
8
value 0.02256
scoring_system epss
scoring_elements 0.84626
published_at 2026-04-21T12:55:00Z
9
value 0.02261
scoring_system epss
scoring_elements 0.84579
published_at 2026-04-04T12:55:00Z
10
value 0.02261
scoring_system epss
scoring_elements 0.84604
published_at 2026-04-08T12:55:00Z
11
value 0.02261
scoring_system epss
scoring_elements 0.84582
published_at 2026-04-07T12:55:00Z
12
value 0.02576
scoring_system epss
scoring_elements 0.85598
published_at 2026-04-24T12:55:00Z
13
value 0.02576
scoring_system epss
scoring_elements 0.85609
published_at 2026-04-26T12:55:00Z
14
value 0.02854
scoring_system epss
scoring_elements 0.86279
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-0185
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0185
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0185
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23222
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2040358
reference_id 2040358
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2040358
16
reference_url https://www.openwall.com/lists/oss-security/2022/01/18/7
reference_id 7
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-08-22T12:49:08Z/
url https://www.openwall.com/lists/oss-security/2022/01/18/7
17
reference_url https://github.com/Crusaders-of-Rust/CVE-2022-0185
reference_id CVE-2022-0185
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-08-22T12:49:08Z/
url https://github.com/Crusaders-of-Rust/CVE-2022-0185
18
reference_url https://www.willsroot.io/2022/01/cve-2022-0185.html
reference_id cve-2022-0185.html
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-08-22T12:49:08Z/
url https://www.willsroot.io/2022/01/cve-2022-0185.html
19
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=722d94847de2
reference_id ?id=722d94847de2
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-08-22T12:49:08Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=722d94847de2
20
reference_url https://security.netapp.com/advisory/ntap-20220225-0003/
reference_id ntap-20220225-0003
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-08-22T12:49:08Z/
url https://security.netapp.com/advisory/ntap-20220225-0003/
21
reference_url https://access.redhat.com/errata/RHSA-2022:0176
reference_id RHSA-2022:0176
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0176
22
reference_url https://access.redhat.com/errata/RHSA-2022:0186
reference_id RHSA-2022:0186
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0186
23
reference_url https://access.redhat.com/errata/RHSA-2022:0187
reference_id RHSA-2022:0187
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0187
24
reference_url https://access.redhat.com/errata/RHSA-2022:0188
reference_id RHSA-2022:0188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0188
25
reference_url https://access.redhat.com/errata/RHSA-2022:0231
reference_id RHSA-2022:0231
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0231
26
reference_url https://access.redhat.com/errata/RHSA-2022:0232
reference_id RHSA-2022:0232
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0232
27
reference_url https://access.redhat.com/errata/RHSA-2022:0540
reference_id RHSA-2022:0540
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0540
28
reference_url https://usn.ubuntu.com/5240-1/
reference_id USN-5240-1
reference_type
scores
url https://usn.ubuntu.com/5240-1/
29
reference_url https://usn.ubuntu.com/5362-1/
reference_id USN-5362-1
reference_type
scores
url https://usn.ubuntu.com/5362-1/
fixed_packages
aliases CVE-2022-0185
risk_score 10.0
exploitability 2.0
weighted_severity 7.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rbaq-2dap-y7bt
2
url VCID-y5u5-dgk3-u3da
vulnerability_id VCID-y5u5-dgk3-u3da
summary A vulnerability has been found in AIDE which can lead to root privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45417.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45417.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-45417
reference_id
reference_type
scores
0
value 0.00038
scoring_system epss
scoring_elements 0.11285
published_at 2026-04-01T12:55:00Z
1
value 0.00038
scoring_system epss
scoring_elements 0.11425
published_at 2026-04-02T12:55:00Z
2
value 0.00038
scoring_system epss
scoring_elements 0.11484
published_at 2026-04-04T12:55:00Z
3
value 0.00038
scoring_system epss
scoring_elements 0.11272
published_at 2026-04-07T12:55:00Z
4
value 0.00038
scoring_system epss
scoring_elements 0.11354
published_at 2026-04-08T12:55:00Z
5
value 0.00038
scoring_system epss
scoring_elements 0.11412
published_at 2026-04-09T12:55:00Z
6
value 0.00038
scoring_system epss
scoring_elements 0.11419
published_at 2026-04-11T12:55:00Z
7
value 0.00038
scoring_system epss
scoring_elements 0.11387
published_at 2026-04-12T12:55:00Z
8
value 0.00038
scoring_system epss
scoring_elements 0.11357
published_at 2026-04-13T12:55:00Z
9
value 0.00038
scoring_system epss
scoring_elements 0.11216
published_at 2026-04-16T12:55:00Z
10
value 0.00038
scoring_system epss
scoring_elements 0.11219
published_at 2026-04-18T12:55:00Z
11
value 0.00038
scoring_system epss
scoring_elements 0.11347
published_at 2026-04-21T12:55:00Z
12
value 0.00038
scoring_system epss
scoring_elements 0.11288
published_at 2026-04-24T12:55:00Z
13
value 0.00038
scoring_system epss
scoring_elements 0.11248
published_at 2026-04-26T12:55:00Z
14
value 0.00038
scoring_system epss
scoring_elements 0.11187
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-45417
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45417
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45417
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2041489
reference_id 2041489
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2041489
5
reference_url https://security.gentoo.org/glsa/202311-07
reference_id GLSA-202311-07
reference_type
scores
url https://security.gentoo.org/glsa/202311-07
6
reference_url https://access.redhat.com/errata/RHSA-2022:0440
reference_id RHSA-2022:0440
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0440
7
reference_url https://access.redhat.com/errata/RHSA-2022:0441
reference_id RHSA-2022:0441
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0441
8
reference_url https://access.redhat.com/errata/RHSA-2022:0456
reference_id RHSA-2022:0456
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0456
9
reference_url https://access.redhat.com/errata/RHSA-2022:0464
reference_id RHSA-2022:0464
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0464
10
reference_url https://access.redhat.com/errata/RHSA-2022:0472
reference_id RHSA-2022:0472
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0472
11
reference_url https://access.redhat.com/errata/RHSA-2022:0473
reference_id RHSA-2022:0473
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0473
12
reference_url https://access.redhat.com/errata/RHSA-2022:0540
reference_id RHSA-2022:0540
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0540
13
reference_url https://access.redhat.com/errata/RHSA-2022:1263
reference_id RHSA-2022:1263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1263
14
reference_url https://usn.ubuntu.com/5243-1/
reference_id USN-5243-1
reference_type
scores
url https://usn.ubuntu.com/5243-1/
15
reference_url https://usn.ubuntu.com/5243-2/
reference_id USN-5243-2
reference_type
scores
url https://usn.ubuntu.com/5243-2/
fixed_packages
aliases CVE-2021-45417
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y5u5-dgk3-u3da
3
url VCID-yee7-fp2m-r7eg
vulnerability_id VCID-yee7-fp2m-r7eg
summary A vulnerability in polkit could lead to local root privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4034.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4034.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-4034
reference_id
reference_type
scores
0
value 0.87811
scoring_system epss
scoring_elements 0.99477
published_at 2026-04-18T12:55:00Z
1
value 0.87811
scoring_system epss
scoring_elements 0.99474
published_at 2026-04-13T12:55:00Z
2
value 0.8794
scoring_system epss
scoring_elements 0.99476
published_at 2026-04-07T12:55:00Z
3
value 0.8794
scoring_system epss
scoring_elements 0.99475
published_at 2026-04-04T12:55:00Z
4
value 0.8794
scoring_system epss
scoring_elements 0.99473
published_at 2026-04-02T12:55:00Z
5
value 0.8794
scoring_system epss
scoring_elements 0.99478
published_at 2026-04-09T12:55:00Z
6
value 0.88057
scoring_system epss
scoring_elements 0.99488
published_at 2026-04-29T12:55:00Z
7
value 0.88083
scoring_system epss
scoring_elements 0.99488
published_at 2026-04-21T12:55:00Z
8
value 0.88472
scoring_system epss
scoring_elements 0.99495
published_at 2026-04-01T12:55:00Z
9
value 0.88806
scoring_system epss
scoring_elements 0.99523
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-4034
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4034
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4034
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2025869
reference_id 2025869
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-12T10:21:57Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2025869
5
reference_url https://gitlab.freedesktop.org/polkit/polkit/-/commit/a2bf5c9c83b6ae46cbd5c779d3055bff81ded683
reference_id a2bf5c9c83b6ae46cbd5c779d3055bff81ded683
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-12T10:21:57Z/
url https://gitlab.freedesktop.org/polkit/polkit/-/commit/a2bf5c9c83b6ae46cbd5c779d3055bff81ded683
6
reference_url https://security.archlinux.org/ASA-202204-2
reference_id ASA-202204-2
reference_type
scores
url https://security.archlinux.org/ASA-202204-2
7
reference_url https://security.archlinux.org/AVG-2654
reference_id AVG-2654
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2654
8
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/50689.txt
reference_id CVE-2021-4034
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/50689.txt
9
reference_url https://security.gentoo.org/glsa/202201-01
reference_id GLSA-202201-01
reference_type
scores
url https://security.gentoo.org/glsa/202201-01
10
reference_url https://www.suse.com/support/kb/doc/?id=000020564
reference_id ?id=000020564
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-12T10:21:57Z/
url https://www.suse.com/support/kb/doc/?id=000020564
11
reference_url https://www.secpod.com/blog/local-privilege-escalation-vulnerability-in-major-linux-distributions-cve-2021-4034/
reference_id local-privilege-escalation-vulnerability-in-major-linux-distributions-cve-2021-4034
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-12T10:21:57Z/
url https://www.secpod.com/blog/local-privilege-escalation-vulnerability-in-major-linux-distributions-cve-2021-4034/
12
reference_url http://packetstormsecurity.com/files/166196/Polkit-pkexec-Local-Privilege-Escalation.html
reference_id Polkit-pkexec-Local-Privilege-Escalation.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-12T10:21:57Z/
url http://packetstormsecurity.com/files/166196/Polkit-pkexec-Local-Privilege-Escalation.html
13
reference_url http://packetstormsecurity.com/files/166200/Polkit-pkexec-Privilege-Escalation.html
reference_id Polkit-pkexec-Privilege-Escalation.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-12T10:21:57Z/
url http://packetstormsecurity.com/files/166200/Polkit-pkexec-Privilege-Escalation.html
14
reference_url https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt
reference_id pwnkit.txt
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-12T10:21:57Z/
url https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt
15
reference_url https://access.redhat.com/errata/RHSA-2022:0265
reference_id RHSA-2022:0265
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0265
16
reference_url https://access.redhat.com/errata/RHSA-2022:0266
reference_id RHSA-2022:0266
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0266
17
reference_url https://access.redhat.com/errata/RHSA-2022:0267
reference_id RHSA-2022:0267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0267
18
reference_url https://access.redhat.com/errata/RHSA-2022:0268
reference_id RHSA-2022:0268
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0268
19
reference_url https://access.redhat.com/errata/RHSA-2022:0269
reference_id RHSA-2022:0269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0269
20
reference_url https://access.redhat.com/errata/RHSA-2022:0270
reference_id RHSA-2022:0270
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0270
21
reference_url https://access.redhat.com/errata/RHSA-2022:0271
reference_id RHSA-2022:0271
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0271
22
reference_url https://access.redhat.com/errata/RHSA-2022:0272
reference_id RHSA-2022:0272
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0272
23
reference_url https://access.redhat.com/errata/RHSA-2022:0273
reference_id RHSA-2022:0273
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0273
24
reference_url https://access.redhat.com/errata/RHSA-2022:0274
reference_id RHSA-2022:0274
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0274
25
reference_url https://access.redhat.com/errata/RHSA-2022:0443
reference_id RHSA-2022:0443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0443
26
reference_url https://access.redhat.com/errata/RHSA-2022:0540
reference_id RHSA-2022:0540
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0540
27
reference_url https://access.redhat.com/security/vulnerabilities/RHSB-2022-001
reference_id RHSB-2022-001
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-12T10:21:57Z/
url https://access.redhat.com/security/vulnerabilities/RHSB-2022-001
28
reference_url https://cert-portal.siemens.com/productcert/pdf/ssa-330556.pdf
reference_id ssa-330556.pdf
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-12T10:21:57Z/
url https://cert-portal.siemens.com/productcert/pdf/ssa-330556.pdf
29
reference_url https://www.starwindsoftware.com/security/sw-20220818-0001/
reference_id sw-20220818-0001
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-12T10:21:57Z/
url https://www.starwindsoftware.com/security/sw-20220818-0001/
30
reference_url https://usn.ubuntu.com/5252-1/
reference_id USN-5252-1
reference_type
scores
url https://usn.ubuntu.com/5252-1/
31
reference_url https://usn.ubuntu.com/5252-2/
reference_id USN-5252-2
reference_type
scores
url https://usn.ubuntu.com/5252-2/
fixed_packages
aliases CVE-2021-4034
risk_score 10.0
exploitability 2.0
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yee7-fp2m-r7eg
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/redhat-virtualization-host@4.4.10-202202081536_8%3Farch=5