{"url":"http://public2.vulnerablecode.io/api/packages/371811?format=json","purl":"pkg:alpm/archlinux/glibc@2.33-5","type":"alpm","namespace":"archlinux","name":"glibc","version":"2.33-5","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"2.34-1","latest_non_vulnerable_version":"2.34-1","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62165?format=json","vulnerability_id":"VCID-6qa1-upks-g3dm","summary":"Multiple vulnerabilities have been discovered in the GNU C Library, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3999","reference_id":"","reference_type":"","scores":[{"value":"0.00848","scoring_system":"epss","scoring_elements":"0.74936","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00848","scoring_system":"epss","scoring_elements":"0.74805","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00848","scoring_system":"epss","scoring_elements":"0.74806","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00848","scoring_system":"epss","scoring_elements":"0.74835","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00848","scoring_system":"epss","scoring_elements":"0.74808","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00848","scoring_system":"epss","scoring_elements":"0.74841","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00848","scoring_system":"epss","scoring_elements":"0.74855","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00848","scoring_system":"epss","scoring_elements":"0.74879","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00848","scoring_system":"epss","scoring_elements":"0.74858","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00848","scoring_system":"epss","scoring_elements":"0.74849","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00848","scoring_system":"epss","scoring_elements":"0.74885","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00848","scoring_system":"epss","scoring_elements":"0.74892","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00848","scoring_system":"epss","scoring_elements":"0.74883","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00848","scoring_system":"epss","scoring_elements":"0.74919","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00848","scoring_system":"epss","scoring_elements":"0.74926","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00848","scoring_system":"epss","scoring_elements":"0.74929","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3999"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2024637","reference_id":"2024637","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-02T20:54:28Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2024637"},{"reference_url":"https://www.openwall.com/lists/oss-security/2022/01/24/4","reference_id":"4","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-02T20:54:28Z/"}],"url":"https://www.openwall.com/lists/oss-security/2022/01/24/4"},{"reference_url":"https://security.archlinux.org/AVG-1621","reference_id":"AVG-1621","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1621"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2021-3999","reference_id":"CVE-2021-3999","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-02T20:54:28Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2021-3999"},{"reference_url":"https://security-tracker.debian.org/tracker/CVE-2021-3999","reference_id":"CVE-2021-3999","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-02T20:54:28Z/"}],"url":"https://security-tracker.debian.org/tracker/CVE-2021-3999"},{"reference_url":"https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=23e0e8f5f1fb5ed150253d986ecccdc90c2dcd5e","reference_id":"gitweb.cgi?p=glibc.git%3Bh=23e0e8f5f1fb5ed150253d986ecccdc90c2dcd5e","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-02T20:54:28Z/"}],"url":"https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=23e0e8f5f1fb5ed150253d986ecccdc90c2dcd5e"},{"reference_url":"https://security.gentoo.org/glsa/202208-24","reference_id":"GLSA-202208-24","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-24"},{"reference_url":"https://security.netapp.com/advisory/ntap-20221104-0001/","reference_id":"ntap-20221104-0001","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-02T20:54:28Z/"}],"url":"https://security.netapp.com/advisory/ntap-20221104-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0896","reference_id":"RHSA-2022:0896","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0896"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=28769","reference_id":"show_bug.cgi?id=28769","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-02T20:54:28Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=28769"},{"reference_url":"https://usn.ubuntu.com/5310-1/","reference_id":"USN-5310-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5310-1/"},{"reference_url":"https://usn.ubuntu.com/5310-2/","reference_id":"USN-5310-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5310-2/"},{"reference_url":"https://usn.ubuntu.com/6762-1/","reference_id":"USN-6762-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6762-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/371812?format=json","purl":"pkg:alpm/archlinux/glibc@2.34-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/glibc@2.34-1"}],"aliases":["CVE-2021-3999"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6qa1-upks-g3dm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/43780?format=json","vulnerability_id":"VCID-8p27-z2tz-4bbm","summary":"Multiple vulnerabilities in glibc could result in Denial of\n    Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33574.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33574.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-33574","reference_id":"","reference_type":"","scores":[{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30847","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30929","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30653","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30537","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30453","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30973","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.3102","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30838","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30897","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30927","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30887","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30842","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30873","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30852","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30818","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.31863","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-33574"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1965408","reference_id":"1965408","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1965408"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989147","reference_id":"989147","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989147"},{"reference_url":"https://security.archlinux.org/AVG-1621","reference_id":"AVG-1621","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1621"},{"reference_url":"https://security.gentoo.org/glsa/202107-07","reference_id":"GLSA-202107-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4358","reference_id":"RHSA-2021:4358","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4358"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/371812?format=json","purl":"pkg:alpm/archlinux/glibc@2.34-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/glibc@2.34-1"}],"aliases":["CVE-2021-33574"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8p27-z2tz-4bbm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62167?format=json","vulnerability_id":"VCID-dgmx-612a-eqfq","summary":"Multiple vulnerabilities have been discovered in the GNU C Library, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-38604.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-38604.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-38604","reference_id":"","reference_type":"","scores":[{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.28049","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.28077","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27968","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27985","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27977","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.28034","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.28164","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.2796","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.28028","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.2807","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.28121","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27478","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27649","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27723","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27834","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27919","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-38604"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1993517","reference_id":"1993517","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1993517"},{"reference_url":"https://security.archlinux.org/AVG-2293","reference_id":"AVG-2293","reference_type":"","scores":[{"value":"Low","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2293"},{"reference_url":"https://security.gentoo.org/glsa/202208-24","reference_id":"GLSA-202208-24","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:18:15Z/"}],"url":"https://security.gentoo.org/glsa/202208-24"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GYEXYM37RCJWJ6B5KQUYQI4NZBDDYSXP/","reference_id":"GYEXYM37RCJWJ6B5KQUYQI4NZBDDYSXP","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:18:15Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GYEXYM37RCJWJ6B5KQUYQI4NZBDDYSXP/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210909-0005/","reference_id":"ntap-20210909-0005","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:18:15Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210909-0005/"},{"reference_url":"https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=4cc79c217744743077bf7a0ec5e0a4318f1e6641","reference_id":"?p=glibc.git%3Ba=commit%3Bh=4cc79c217744743077bf7a0ec5e0a4318f1e6641","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:18:15Z/"}],"url":"https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=4cc79c217744743077bf7a0ec5e0a4318f1e6641"},{"reference_url":"https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=b805aebd42364fe696e417808a700fdb9800c9e8","reference_id":"?p=glibc.git%3Ba=commit%3Bh=b805aebd42364fe696e417808a700fdb9800c9e8","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:18:15Z/"}],"url":"https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=b805aebd42364fe696e417808a700fdb9800c9e8"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=28213","reference_id":"show_bug.cgi?id=28213","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:18:15Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=28213"},{"reference_url":"https://blog.tuxcare.com/cve/tuxcare-team-identifies-cve-2021-38604-a-new-vulnerability-in-glibc","reference_id":"tuxcare-team-identifies-cve-2021-38604-a-new-vulnerability-in-glibc","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:18:15Z/"}],"url":"https://blog.tuxcare.com/cve/tuxcare-team-identifies-cve-2021-38604-a-new-vulnerability-in-glibc"}],"fixed_packages":[],"aliases":["CVE-2021-38604"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dgmx-612a-eqfq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62166?format=json","vulnerability_id":"VCID-ge24-a7a4-d3bn","summary":"Multiple vulnerabilities have been discovered in the GNU C Library, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json","reference_id":"","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35942","reference_id":"","reference_type":"","scores":[{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78075","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78154","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78083","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78128","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78123","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78113","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78096","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01598","scoring_system":"epss","scoring_elements":"0.8178","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01598","scoring_system":"epss","scoring_elements":"0.81688","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01598","scoring_system":"epss","scoring_elements":"0.81682","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01598","scoring_system":"epss","scoring_elements":"0.8172","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01598","scoring_system":"epss","scoring_elements":"0.81723","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01598","scoring_system":"epss","scoring_elements":"0.81748","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01598","scoring_system":"epss","scoring_elements":"0.81757","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01598","scoring_system":"epss","scoring_elements":"0.81763","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35942"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1977975","reference_id":"1977975","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1977975"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990542","reference_id":"990542","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990542"},{"reference_url":"https://security.archlinux.org/AVG-1621","reference_id":"AVG-1621","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1621"},{"reference_url":"https://security.gentoo.org/glsa/202208-24","reference_id":"GLSA-202208-24","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T20:00:35Z/"}],"url":"https://security.gentoo.org/glsa/202208-24"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210827-0005/","reference_id":"ntap-20210827-0005","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T20:00:35Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210827-0005/"},{"reference_url":"https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=5adda61f62b77384718b4c0d8336ade8f2b4b35c","reference_id":"?p=glibc.git%3Ba=commit%3Bh=5adda61f62b77384718b4c0d8336ade8f2b4b35c","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T20:00:35Z/"}],"url":"https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=5adda61f62b77384718b4c0d8336ade8f2b4b35c"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4358","reference_id":"RHSA-2021:4358","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4358"},{"reference_url":"https://sourceware.org/glibc/wiki/Security%20Exceptions","reference_id":"Security%20Exceptions","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T20:00:35Z/"}],"url":"https://sourceware.org/glibc/wiki/Security%20Exceptions"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=28011","reference_id":"show_bug.cgi?id=28011","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T20:00:35Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=28011"},{"reference_url":"https://usn.ubuntu.com/5310-1/","reference_id":"USN-5310-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5310-1/"},{"reference_url":"https://usn.ubuntu.com/5699-1/","reference_id":"USN-5699-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5699-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/371812?format=json","purl":"pkg:alpm/archlinux/glibc@2.34-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/glibc@2.34-1"}],"aliases":["CVE-2021-35942"],"risk_score":4.1,"exploitability":"0.5","weighted_severity":"8.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ge24-a7a4-d3bn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79939?format=json","vulnerability_id":"VCID-nk5x-uhcf-7kan","summary":"glibc: conversion from ISO-2022-JP-3 with iconv may emit spurious NUL character on state reset","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43396.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43396.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-43396","reference_id":"","reference_type":"","scores":[{"value":"0.00597","scoring_system":"epss","scoring_elements":"0.69441","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00597","scoring_system":"epss","scoring_elements":"0.69463","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00597","scoring_system":"epss","scoring_elements":"0.69299","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00597","scoring_system":"epss","scoring_elements":"0.69311","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00597","scoring_system":"epss","scoring_elements":"0.69329","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00597","scoring_system":"epss","scoring_elements":"0.69309","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00597","scoring_system":"epss","scoring_elements":"0.69359","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00597","scoring_system":"epss","scoring_elements":"0.69376","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00597","scoring_system":"epss","scoring_elements":"0.69398","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00597","scoring_system":"epss","scoring_elements":"0.69383","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00597","scoring_system":"epss","scoring_elements":"0.69369","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00597","scoring_system":"epss","scoring_elements":"0.69407","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00597","scoring_system":"epss","scoring_elements":"0.69418","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00597","scoring_system":"epss","scoring_elements":"0.69399","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00597","scoring_system":"epss","scoring_elements":"0.6945","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00597","scoring_system":"epss","scoring_elements":"0.69458","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-43396"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43396","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43396"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2020652","reference_id":"2020652","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2020652"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=998622","reference_id":"998622","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=998622"},{"reference_url":"https://security.archlinux.org/AVG-1621","reference_id":"AVG-1621","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1621"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/371812?format=json","purl":"pkg:alpm/archlinux/glibc@2.34-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/glibc@2.34-1"}],"aliases":["CVE-2021-43396"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nk5x-uhcf-7kan"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62164?format=json","vulnerability_id":"VCID-pw6m-42j9-f7af","summary":"Multiple vulnerabilities have been discovered in the GNU C Library, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3998.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3998.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3998","reference_id":"","reference_type":"","scores":[{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41511","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41794","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41859","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41888","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41817","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41866","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41876","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.419","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41865","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41853","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41903","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41805","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41731","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41733","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41653","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3998"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2024633","reference_id":"2024633","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:59:39Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2024633"},{"reference_url":"https://www.openwall.com/lists/oss-security/2022/01/24/4","reference_id":"4","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:59:39Z/"}],"url":"https://www.openwall.com/lists/oss-security/2022/01/24/4"},{"reference_url":"https://security.archlinux.org/AVG-1621","reference_id":"AVG-1621","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1621"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2021-3998","reference_id":"CVE-2021-3998","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:59:39Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2021-3998"},{"reference_url":"https://security-tracker.debian.org/tracker/CVE-2021-3998","reference_id":"CVE-2021-3998","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:59:39Z/"}],"url":"https://security-tracker.debian.org/tracker/CVE-2021-3998"},{"reference_url":"https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=84d2d0fe20bdf94feed82b21b4d7d136db471f03","reference_id":"gitweb.cgi?p=glibc.git%3Bh=84d2d0fe20bdf94feed82b21b4d7d136db471f03","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:59:39Z/"}],"url":"https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=84d2d0fe20bdf94feed82b21b4d7d136db471f03"},{"reference_url":"https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=ee8d5e33adb284601c00c94687bc907e10aec9bb","reference_id":"gitweb.cgi?p=glibc.git%3Bh=ee8d5e33adb284601c00c94687bc907e10aec9bb","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:59:39Z/"}],"url":"https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=ee8d5e33adb284601c00c94687bc907e10aec9bb"},{"reference_url":"https://security.gentoo.org/glsa/202208-24","reference_id":"GLSA-202208-24","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-24"},{"reference_url":"https://security.netapp.com/advisory/ntap-20221020-0003/","reference_id":"ntap-20221020-0003","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:59:39Z/"}],"url":"https://security.netapp.com/advisory/ntap-20221020-0003/"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=28770","reference_id":"show_bug.cgi?id=28770","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:59:39Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=28770"},{"reference_url":"https://usn.ubuntu.com/5310-1/","reference_id":"USN-5310-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5310-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/371812?format=json","purl":"pkg:alpm/archlinux/glibc@2.34-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/glibc@2.34-1"}],"aliases":["CVE-2021-3998"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pw6m-42j9-f7af"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/43778?format=json","vulnerability_id":"VCID-zqx5-4rdk-1qa3","summary":"Multiple vulnerabilities in glibc could result in Denial of\n    Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-27645.json","reference_id":"","reference_type":"","scores":[{"value":"2.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-27645.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-27645","reference_id":"","reference_type":"","scores":[{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11077","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10952","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11096","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11176","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11232","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11242","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11209","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11184","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11048","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11057","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11189","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11124","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11079","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11015","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.1122","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11283","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-27645"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1932589","reference_id":"1932589","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1932589"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/","reference_id":"7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5","reference_type":"","scores":[{"value":"2.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:57:29Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983479","reference_id":"983479","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983479"},{"reference_url":"https://security.archlinux.org/AVG-1621","reference_id":"AVG-1621","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1621"},{"reference_url":"https://security.gentoo.org/glsa/202107-07","reference_id":"GLSA-202107-07","reference_type":"","scores":[{"value":"2.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:57:29Z/"}],"url":"https://security.gentoo.org/glsa/202107-07"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/","reference_id":"I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS","reference_type":"","scores":[{"value":"2.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:57:29Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4358","reference_id":"RHSA-2021:4358","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4358"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=27462","reference_id":"show_bug.cgi?id=27462","reference_type":"","scores":[{"value":"2.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:57:29Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=27462"},{"reference_url":"https://usn.ubuntu.com/5310-1/","reference_id":"USN-5310-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5310-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/371812?format=json","purl":"pkg:alpm/archlinux/glibc@2.34-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/glibc@2.34-1"}],"aliases":["CVE-2021-27645"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zqx5-4rdk-1qa3"}],"fixing_vulnerabilities":[],"risk_score":"4.1","resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/glibc@2.33-5"}