Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/99428?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/99428?format=api", "purl": "pkg:rpm/redhat/redhat-virtualization-host@4.4.10-202202081536_8?arch=5", "type": "rpm", "namespace": "redhat", "name": "redhat-virtualization-host", "version": "4.4.10-202202081536_8", "qualifiers": { "arch": "5" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79828?format=api", "vulnerability_id": "VCID-45du-dgkd-p3b8", "summary": "kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4155.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4155.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-4155", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05306", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05347", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05378", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05387", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.0542", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05443", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05416", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05403", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05396", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05345", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.0551", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05547", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05584", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05585", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-4155" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29374", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29374" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36322", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36322" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20317", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20317" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22600", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22600" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28950", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28950" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38300", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38300" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39686", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39686" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39698", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39698" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39713", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39713" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4135", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4135" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4202", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4202" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4203", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4203" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44733", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44733" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0185", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0185" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0322", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0322" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23222", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23222" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24959", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24959" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034813", "reference_id": "2034813", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034813" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0176", "reference_id": "RHSA-2022:0176", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0176" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0186", "reference_id": "RHSA-2022:0186", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0186" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0187", "reference_id": "RHSA-2022:0187", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0187" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0188", "reference_id": "RHSA-2022:0188", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0188" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0231", "reference_id": "RHSA-2022:0231", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0231" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0232", "reference_id": "RHSA-2022:0232", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0232" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0335", "reference_id": "RHSA-2022:0335", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0335" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0344", "reference_id": "RHSA-2022:0344", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0344" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0529", "reference_id": "RHSA-2022:0529", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0529" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0530", "reference_id": "RHSA-2022:0530", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0530" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0531", "reference_id": "RHSA-2022:0531", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0531" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0533", "reference_id": "RHSA-2022:0533", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0533" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0540", "reference_id": "RHSA-2022:0540", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0540" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0590", "reference_id": "RHSA-2022:0590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0592", "reference_id": "RHSA-2022:0592", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0592" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0620", "reference_id": "RHSA-2022:0620", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0620" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0622", "reference_id": "RHSA-2022:0622", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0622" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0629", "reference_id": "RHSA-2022:0629", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0629" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0636", "reference_id": "RHSA-2022:0636", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0636" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0712", "reference_id": "RHSA-2022:0712", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0712" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0718", "reference_id": "RHSA-2022:0718", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0718" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0958", "reference_id": "RHSA-2022:0958", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0958" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1263", "reference_id": "RHSA-2022:1263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1263" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1417", "reference_id": "RHSA-2022:1417", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1417" }, { "reference_url": "https://usn.ubuntu.com/5278-1/", "reference_id": "USN-5278-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5278-1/" }, { "reference_url": "https://usn.ubuntu.com/5294-1/", "reference_id": "USN-5294-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5294-1/" }, { "reference_url": "https://usn.ubuntu.com/5294-2/", "reference_id": "USN-5294-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5294-2/" }, { "reference_url": "https://usn.ubuntu.com/5295-1/", "reference_id": "USN-5295-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5295-1/" }, { "reference_url": "https://usn.ubuntu.com/5295-2/", "reference_id": "USN-5295-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5295-2/" }, { "reference_url": "https://usn.ubuntu.com/5297-1/", "reference_id": "USN-5297-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5297-1/" }, { "reference_url": "https://usn.ubuntu.com/5298-1/", "reference_id": "USN-5298-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5298-1/" }, { "reference_url": "https://usn.ubuntu.com/5362-1/", "reference_id": "USN-5362-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5362-1/" }, { "reference_url": "https://usn.ubuntu.com/5884-1/", "reference_id": "USN-5884-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5884-1/" }, { "reference_url": "https://usn.ubuntu.com/5926-1/", "reference_id": "USN-5926-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5926-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-4155" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-45du-dgkd-p3b8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79747?format=api", "vulnerability_id": "VCID-rbaq-2dap-y7bt", "summary": "kernel: fs_context: heap overflow in legacy parameter handling", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0185.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0185.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-0185", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01828", "scoring_system": "epss", "scoring_elements": "0.82851", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01828", "scoring_system": "epss", "scoring_elements": "0.82834", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02147", "scoring_system": "epss", "scoring_elements": "0.84229", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02147", "scoring_system": "epss", "scoring_elements": "0.8422", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02147", "scoring_system": "epss", "scoring_elements": "0.84238", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02147", "scoring_system": "epss", "scoring_elements": "0.84232", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02147", "scoring_system": "epss", "scoring_elements": "0.84252", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02147", "scoring_system": "epss", "scoring_elements": "0.84251", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02256", "scoring_system": "epss", "scoring_elements": "0.84626", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02261", "scoring_system": "epss", "scoring_elements": "0.84579", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02261", "scoring_system": "epss", "scoring_elements": "0.84604", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02261", "scoring_system": "epss", "scoring_elements": "0.84582", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02576", "scoring_system": "epss", "scoring_elements": "0.85598", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02576", "scoring_system": "epss", "scoring_elements": "0.85609", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02854", "scoring_system": "epss", "scoring_elements": "0.86279", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-0185" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0185", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0185" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23222", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23222" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040358", "reference_id": "2040358", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040358" }, { "reference_url": "https://www.openwall.com/lists/oss-security/2022/01/18/7", "reference_id": "7", "reference_type": "", "scores": [ { "value": "8.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-08-22T12:49:08Z/" } ], "url": "https://www.openwall.com/lists/oss-security/2022/01/18/7" }, { "reference_url": "https://github.com/Crusaders-of-Rust/CVE-2022-0185", "reference_id": "CVE-2022-0185", "reference_type": "", "scores": [ { "value": "8.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-08-22T12:49:08Z/" } ], "url": "https://github.com/Crusaders-of-Rust/CVE-2022-0185" }, { "reference_url": "https://www.willsroot.io/2022/01/cve-2022-0185.html", "reference_id": "cve-2022-0185.html", "reference_type": "", "scores": [ { "value": "8.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-08-22T12:49:08Z/" } ], "url": "https://www.willsroot.io/2022/01/cve-2022-0185.html" }, { "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=722d94847de2", "reference_id": "?id=722d94847de2", "reference_type": "", "scores": [ { "value": "8.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-08-22T12:49:08Z/" } ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=722d94847de2" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220225-0003/", "reference_id": "ntap-20220225-0003", "reference_type": "", "scores": [ { "value": "8.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-08-22T12:49:08Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220225-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0176", "reference_id": "RHSA-2022:0176", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0176" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0186", "reference_id": "RHSA-2022:0186", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0186" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0187", "reference_id": "RHSA-2022:0187", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0187" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0188", "reference_id": "RHSA-2022:0188", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0188" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0231", "reference_id": "RHSA-2022:0231", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0231" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0232", "reference_id": "RHSA-2022:0232", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0232" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0540", "reference_id": "RHSA-2022:0540", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0540" }, { "reference_url": "https://usn.ubuntu.com/5240-1/", "reference_id": "USN-5240-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5240-1/" }, { "reference_url": "https://usn.ubuntu.com/5362-1/", "reference_id": "USN-5362-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5362-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-0185" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "7.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rbaq-2dap-y7bt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31862?format=api", "vulnerability_id": "VCID-y5u5-dgk3-u3da", "summary": "A vulnerability has been found in AIDE which can lead to root privilege escalation.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45417.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45417.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-45417", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11285", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11425", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11484", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11272", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11354", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11412", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11419", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11387", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11357", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11216", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11219", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11347", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11288", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11248", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11187", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-45417" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45417", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45417" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041489", "reference_id": "2041489", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041489" }, { "reference_url": "https://security.gentoo.org/glsa/202311-07", "reference_id": "GLSA-202311-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202311-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0440", "reference_id": "RHSA-2022:0440", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0440" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0441", "reference_id": "RHSA-2022:0441", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0441" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0456", "reference_id": "RHSA-2022:0456", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0456" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0464", "reference_id": "RHSA-2022:0464", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0464" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0472", "reference_id": "RHSA-2022:0472", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0472" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0473", "reference_id": "RHSA-2022:0473", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0473" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0540", "reference_id": "RHSA-2022:0540", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0540" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1263", "reference_id": "RHSA-2022:1263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1263" }, { "reference_url": "https://usn.ubuntu.com/5243-1/", "reference_id": "USN-5243-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5243-1/" }, { "reference_url": "https://usn.ubuntu.com/5243-2/", "reference_id": "USN-5243-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5243-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-45417" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y5u5-dgk3-u3da" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47906?format=api", "vulnerability_id": "VCID-yee7-fp2m-r7eg", "summary": "A vulnerability in polkit could lead to local root privilege escalation.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4034.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4034.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-4034", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.87811", "scoring_system": "epss", "scoring_elements": "0.99477", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.87811", "scoring_system": "epss", "scoring_elements": "0.99474", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.8794", "scoring_system": "epss", "scoring_elements": "0.99476", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.8794", "scoring_system": "epss", "scoring_elements": "0.99475", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.8794", "scoring_system": "epss", "scoring_elements": "0.99473", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.8794", "scoring_system": "epss", "scoring_elements": "0.99478", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.88057", "scoring_system": "epss", "scoring_elements": "0.99488", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.88083", "scoring_system": "epss", "scoring_elements": "0.99488", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.88472", "scoring_system": "epss", "scoring_elements": "0.99495", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.88806", "scoring_system": "epss", "scoring_elements": "0.99523", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-4034" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4034", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4034" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869", "reference_id": "2025869", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-12T10:21:57Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869" }, { "reference_url": "https://gitlab.freedesktop.org/polkit/polkit/-/commit/a2bf5c9c83b6ae46cbd5c779d3055bff81ded683", "reference_id": "a2bf5c9c83b6ae46cbd5c779d3055bff81ded683", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-12T10:21:57Z/" } ], "url": "https://gitlab.freedesktop.org/polkit/polkit/-/commit/a2bf5c9c83b6ae46cbd5c779d3055bff81ded683" }, { "reference_url": "https://security.archlinux.org/ASA-202204-2", "reference_id": "ASA-202204-2", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202204-2" }, { "reference_url": "https://security.archlinux.org/AVG-2654", "reference_id": "AVG-2654", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2654" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/50689.txt", "reference_id": "CVE-2021-4034", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/50689.txt" }, { "reference_url": "https://security.gentoo.org/glsa/202201-01", "reference_id": "GLSA-202201-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202201-01" }, { "reference_url": "https://www.suse.com/support/kb/doc/?id=000020564", "reference_id": "?id=000020564", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-12T10:21:57Z/" } ], "url": "https://www.suse.com/support/kb/doc/?id=000020564" }, { "reference_url": "https://www.secpod.com/blog/local-privilege-escalation-vulnerability-in-major-linux-distributions-cve-2021-4034/", "reference_id": "local-privilege-escalation-vulnerability-in-major-linux-distributions-cve-2021-4034", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-12T10:21:57Z/" } ], "url": "https://www.secpod.com/blog/local-privilege-escalation-vulnerability-in-major-linux-distributions-cve-2021-4034/" }, { "reference_url": "http://packetstormsecurity.com/files/166196/Polkit-pkexec-Local-Privilege-Escalation.html", "reference_id": "Polkit-pkexec-Local-Privilege-Escalation.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-12T10:21:57Z/" } ], "url": "http://packetstormsecurity.com/files/166196/Polkit-pkexec-Local-Privilege-Escalation.html" }, { "reference_url": "http://packetstormsecurity.com/files/166200/Polkit-pkexec-Privilege-Escalation.html", "reference_id": "Polkit-pkexec-Privilege-Escalation.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-12T10:21:57Z/" } ], "url": "http://packetstormsecurity.com/files/166200/Polkit-pkexec-Privilege-Escalation.html" }, { "reference_url": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt", "reference_id": "pwnkit.txt", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-12T10:21:57Z/" } ], "url": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0265", "reference_id": "RHSA-2022:0265", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0265" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0266", "reference_id": "RHSA-2022:0266", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0266" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0267", "reference_id": "RHSA-2022:0267", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0267" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0268", "reference_id": "RHSA-2022:0268", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0268" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0269", "reference_id": "RHSA-2022:0269", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0269" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0270", "reference_id": "RHSA-2022:0270", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0270" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0271", "reference_id": "RHSA-2022:0271", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0271" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0272", "reference_id": "RHSA-2022:0272", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0272" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0273", "reference_id": "RHSA-2022:0273", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0273" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0274", "reference_id": "RHSA-2022:0274", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0274" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0443", "reference_id": "RHSA-2022:0443", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0443" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0540", "reference_id": "RHSA-2022:0540", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0540" }, { "reference_url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001", "reference_id": "RHSB-2022-001", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-12T10:21:57Z/" } ], "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001" }, { "reference_url": "https://cert-portal.siemens.com/productcert/pdf/ssa-330556.pdf", "reference_id": "ssa-330556.pdf", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-12T10:21:57Z/" } ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-330556.pdf" }, { "reference_url": "https://www.starwindsoftware.com/security/sw-20220818-0001/", "reference_id": "sw-20220818-0001", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-12T10:21:57Z/" } ], "url": "https://www.starwindsoftware.com/security/sw-20220818-0001/" }, { "reference_url": "https://usn.ubuntu.com/5252-1/", "reference_id": "USN-5252-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5252-1/" }, { "reference_url": "https://usn.ubuntu.com/5252-2/", "reference_id": "USN-5252-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5252-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-4034" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yee7-fp2m-r7eg" } ], "fixing_vulnerabilities": [], "risk_score": "10.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/redhat-virtualization-host@4.4.10-202202081536_8%3Farch=5" }