Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/gnutls@3.6.16-4?arch=el8
Typerpm
Namespaceredhat
Namegnutls
Version3.6.16-4
Qualifiers
arch el8
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-bzux-re4q-s7hu
vulnerability_id VCID-bzux-re4q-s7hu
summary
Improper Input Validation
A flaw was found in the way nettle's RSA decryption functions handled specially crafted ciphertext. An attacker could use this flaw to provide a manipulated ciphertext leading to application crash and denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3580.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3580.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-3580
reference_id
reference_type
scores
0
value 0.00104
scoring_system epss
scoring_elements 0.28366
published_at 2026-04-01T12:55:00Z
1
value 0.00104
scoring_system epss
scoring_elements 0.283
published_at 2026-04-16T12:55:00Z
2
value 0.00104
scoring_system epss
scoring_elements 0.28275
published_at 2026-04-07T12:55:00Z
3
value 0.00104
scoring_system epss
scoring_elements 0.28342
published_at 2026-04-08T12:55:00Z
4
value 0.00104
scoring_system epss
scoring_elements 0.28385
published_at 2026-04-09T12:55:00Z
5
value 0.00104
scoring_system epss
scoring_elements 0.28389
published_at 2026-04-11T12:55:00Z
6
value 0.00104
scoring_system epss
scoring_elements 0.28346
published_at 2026-04-12T12:55:00Z
7
value 0.00104
scoring_system epss
scoring_elements 0.28288
published_at 2026-04-13T12:55:00Z
8
value 0.00104
scoring_system epss
scoring_elements 0.28441
published_at 2026-04-02T12:55:00Z
9
value 0.00104
scoring_system epss
scoring_elements 0.28483
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-3580
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1967983
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-19T14:22:19Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=1967983
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20305
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3580
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3580
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989631
reference_id 989631
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989631
7
reference_url https://security.archlinux.org/ASA-202106-28
reference_id ASA-202106-28
reference_type
scores
url https://security.archlinux.org/ASA-202106-28
8
reference_url https://security.archlinux.org/AVG-2052
reference_id AVG-2052
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2052
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-3580
reference_id CVE-2021-3580
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2021-3580
10
reference_url https://security.gentoo.org/glsa/202401-24
reference_id GLSA-202401-24
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-19T14:22:19Z/
url https://security.gentoo.org/glsa/202401-24
11
reference_url https://lists.debian.org/debian-lts-announce/2021/09/msg00008.html
reference_id msg00008.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-19T14:22:19Z/
url https://lists.debian.org/debian-lts-announce/2021/09/msg00008.html
12
reference_url https://security.netapp.com/advisory/ntap-20211104-0006/
reference_id ntap-20211104-0006
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-19T14:22:19Z/
url https://security.netapp.com/advisory/ntap-20211104-0006/
13
reference_url https://access.redhat.com/errata/RHSA-2021:4451
reference_id RHSA-2021:4451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4451
14
reference_url https://usn.ubuntu.com/4990-1/
reference_id USN-4990-1
reference_type
scores
url https://usn.ubuntu.com/4990-1/
fixed_packages
aliases CVE-2021-3580
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bzux-re4q-s7hu
1
url VCID-k5vv-ts4z-j7g5
vulnerability_id VCID-k5vv-ts4z-j7g5
summary gnutls: Use after free in client_send_params in lib/ext/pre_shared_key.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20232.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20232.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-20232
reference_id
reference_type
scores
0
value 0.00844
scoring_system epss
scoring_elements 0.74724
published_at 2026-04-01T12:55:00Z
1
value 0.00844
scoring_system epss
scoring_elements 0.74803
published_at 2026-04-16T12:55:00Z
2
value 0.00844
scoring_system epss
scoring_elements 0.74727
published_at 2026-04-02T12:55:00Z
3
value 0.00844
scoring_system epss
scoring_elements 0.74754
published_at 2026-04-04T12:55:00Z
4
value 0.00844
scoring_system epss
scoring_elements 0.74728
published_at 2026-04-07T12:55:00Z
5
value 0.00844
scoring_system epss
scoring_elements 0.7476
published_at 2026-04-08T12:55:00Z
6
value 0.00844
scoring_system epss
scoring_elements 0.74775
published_at 2026-04-09T12:55:00Z
7
value 0.00844
scoring_system epss
scoring_elements 0.74799
published_at 2026-04-11T12:55:00Z
8
value 0.00844
scoring_system epss
scoring_elements 0.74778
published_at 2026-04-12T12:55:00Z
9
value 0.00844
scoring_system epss
scoring_elements 0.74768
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-20232
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20232
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20232
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922275
reference_id 1922275
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-03T15:03:27Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=1922275
5
reference_url https://security.archlinux.org/ASA-202103-1
reference_id ASA-202103-1
reference_type
scores
url https://security.archlinux.org/ASA-202103-1
6
reference_url https://security.archlinux.org/AVG-1674
reference_id AVG-1674
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1674
7
reference_url https://security.netapp.com/advisory/ntap-20210416-0005/
reference_id ntap-20210416-0005
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-03T15:03:27Z/
url https://security.netapp.com/advisory/ntap-20210416-0005/
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OSLAE6PP33A7VYRYMYMUVB3U6B26GZER/
reference_id OSLAE6PP33A7VYRYMYMUVB3U6B26GZER
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-03T15:03:27Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OSLAE6PP33A7VYRYMYMUVB3U6B26GZER/
9
reference_url https://lists.apache.org/thread.html/r50661d6f0082709aad9a584431b59ec364f9974b63b07e0800230168%40%3Cissues.spark.apache.org%3E
reference_id r50661d6f0082709aad9a584431b59ec364f9974b63b07e0800230168%40%3Cissues.spark.apache.org%3E
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-03T15:03:27Z/
url https://lists.apache.org/thread.html/r50661d6f0082709aad9a584431b59ec364f9974b63b07e0800230168%40%3Cissues.spark.apache.org%3E
10
reference_url https://lists.apache.org/thread.html/r5d4001031e7790d8c6396c499522b4ed2aab782da87b1a14184793bb%40%3Cissues.spark.apache.org%3E
reference_id r5d4001031e7790d8c6396c499522b4ed2aab782da87b1a14184793bb%40%3Cissues.spark.apache.org%3E
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-03T15:03:27Z/
url https://lists.apache.org/thread.html/r5d4001031e7790d8c6396c499522b4ed2aab782da87b1a14184793bb%40%3Cissues.spark.apache.org%3E
11
reference_url https://lists.apache.org/thread.html/r5f88bed447742fcc5c47bf1c7be965ef450131914a6e1f85feba2779%40%3Cissues.spark.apache.org%3E
reference_id r5f88bed447742fcc5c47bf1c7be965ef450131914a6e1f85feba2779%40%3Cissues.spark.apache.org%3E
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-03T15:03:27Z/
url https://lists.apache.org/thread.html/r5f88bed447742fcc5c47bf1c7be965ef450131914a6e1f85feba2779%40%3Cissues.spark.apache.org%3E
12
reference_url https://lists.apache.org/thread.html/r6ac143ba6dd98bd4bf6bf010d46e56e254056459721ba18822d611f7%40%3Cissues.spark.apache.org%3E
reference_id r6ac143ba6dd98bd4bf6bf010d46e56e254056459721ba18822d611f7%40%3Cissues.spark.apache.org%3E
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-03T15:03:27Z/
url https://lists.apache.org/thread.html/r6ac143ba6dd98bd4bf6bf010d46e56e254056459721ba18822d611f7%40%3Cissues.spark.apache.org%3E
13
reference_url https://lists.apache.org/thread.html/r9cbc69e57276413788e90a6ee16c7c034ea4258d31935b70db2bd158%40%3Cissues.spark.apache.org%3E
reference_id r9cbc69e57276413788e90a6ee16c7c034ea4258d31935b70db2bd158%40%3Cissues.spark.apache.org%3E
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-03T15:03:27Z/
url https://lists.apache.org/thread.html/r9cbc69e57276413788e90a6ee16c7c034ea4258d31935b70db2bd158%40%3Cissues.spark.apache.org%3E
14
reference_url https://lists.apache.org/thread.html/rcd70a4c88a47a75fd2d5f3ffb7cee8c2a18c713320bd90fdcb57495f%40%3Cissues.spark.apache.org%3E
reference_id rcd70a4c88a47a75fd2d5f3ffb7cee8c2a18c713320bd90fdcb57495f%40%3Cissues.spark.apache.org%3E
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-03T15:03:27Z/
url https://lists.apache.org/thread.html/rcd70a4c88a47a75fd2d5f3ffb7cee8c2a18c713320bd90fdcb57495f%40%3Cissues.spark.apache.org%3E
15
reference_url https://lists.apache.org/thread.html/rf5e1256d870193def4a82ad89ab95e63943a313b5ff0d81aa87e4532%40%3Cissues.spark.apache.org%3E
reference_id rf5e1256d870193def4a82ad89ab95e63943a313b5ff0d81aa87e4532%40%3Cissues.spark.apache.org%3E
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-03T15:03:27Z/
url https://lists.apache.org/thread.html/rf5e1256d870193def4a82ad89ab95e63943a313b5ff0d81aa87e4532%40%3Cissues.spark.apache.org%3E
16
reference_url https://lists.apache.org/thread.html/rfd5273d72d244178441e6904a2f2b41a3268f569e8092ea0b3b2bb20%40%3Cissues.spark.apache.org%3E
reference_id rfd5273d72d244178441e6904a2f2b41a3268f569e8092ea0b3b2bb20%40%3Cissues.spark.apache.org%3E
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-03T15:03:27Z/
url https://lists.apache.org/thread.html/rfd5273d72d244178441e6904a2f2b41a3268f569e8092ea0b3b2bb20%40%3Cissues.spark.apache.org%3E
17
reference_url https://access.redhat.com/errata/RHSA-2021:4451
reference_id RHSA-2021:4451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4451
18
reference_url https://www.gnutls.org/security-new.html#GNUTLS-SA-2021-03-10
reference_id security-new.html#GNUTLS-SA-2021-03-10
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-03T15:03:27Z/
url https://www.gnutls.org/security-new.html#GNUTLS-SA-2021-03-10
19
reference_url https://usn.ubuntu.com/5029-1/
reference_id USN-5029-1
reference_type
scores
url https://usn.ubuntu.com/5029-1/
fixed_packages
aliases CVE-2021-20232
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k5vv-ts4z-j7g5
2
url VCID-uws5-j79f-cbar
vulnerability_id VCID-uws5-j79f-cbar
summary gnutls: Use after free in client key_share extension
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20231.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20231.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-20231
reference_id
reference_type
scores
0
value 0.00917
scoring_system epss
scoring_elements 0.75866
published_at 2026-04-01T12:55:00Z
1
value 0.00917
scoring_system epss
scoring_elements 0.75882
published_at 2026-04-07T12:55:00Z
2
value 0.00917
scoring_system epss
scoring_elements 0.7587
published_at 2026-04-02T12:55:00Z
3
value 0.00917
scoring_system epss
scoring_elements 0.75902
published_at 2026-04-04T12:55:00Z
4
value 0.00917
scoring_system epss
scoring_elements 0.75915
published_at 2026-04-08T12:55:00Z
5
value 0.00917
scoring_system epss
scoring_elements 0.75928
published_at 2026-04-09T12:55:00Z
6
value 0.00917
scoring_system epss
scoring_elements 0.75951
published_at 2026-04-11T12:55:00Z
7
value 0.01195
scoring_system epss
scoring_elements 0.78876
published_at 2026-04-13T12:55:00Z
8
value 0.01195
scoring_system epss
scoring_elements 0.78905
published_at 2026-04-16T12:55:00Z
9
value 0.01195
scoring_system epss
scoring_elements 0.78885
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-20231
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20231
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922276
reference_id 1922276
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922276
5
reference_url https://security.archlinux.org/ASA-202103-1
reference_id ASA-202103-1
reference_type
scores
url https://security.archlinux.org/ASA-202103-1
6
reference_url https://security.archlinux.org/AVG-1674
reference_id AVG-1674
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1674
7
reference_url https://access.redhat.com/errata/RHSA-2021:4451
reference_id RHSA-2021:4451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4451
8
reference_url https://usn.ubuntu.com/5029-1/
reference_id USN-5029-1
reference_type
scores
url https://usn.ubuntu.com/5029-1/
fixed_packages
aliases CVE-2021-20231, GNUTLS-SA-2021-03-10
risk_score 1.9
exploitability 0.5
weighted_severity 3.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uws5-j79f-cbar
Fixing_vulnerabilities
Risk_score4.4
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/gnutls@3.6.16-4%3Farch=el8