Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/klibc@2.0.9-r0?arch=x86&distroversion=edge&reponame=community
Typeapk
Namespacealpine
Nameklibc
Version2.0.9-r0
Qualifiers
arch x86
distroversion edge
reponame community
Subpath
Is_vulnerablefalse
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-36y6-h6vw-xkc1
vulnerability_id VCID-36y6-h6vw-xkc1
summary An issue was discovered in klibc before 2.0.9. An integer overflow in the cpio command may result in a NULL pointer dereference on 64-bit systems.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-31871
reference_id
reference_type
scores
0
value 0.01589
scoring_system epss
scoring_elements 0.81564
published_at 2026-04-01T12:55:00Z
1
value 0.01589
scoring_system epss
scoring_elements 0.81576
published_at 2026-04-02T12:55:00Z
2
value 0.01589
scoring_system epss
scoring_elements 0.81597
published_at 2026-04-04T12:55:00Z
3
value 0.01589
scoring_system epss
scoring_elements 0.81595
published_at 2026-04-07T12:55:00Z
4
value 0.01589
scoring_system epss
scoring_elements 0.81623
published_at 2026-04-08T12:55:00Z
5
value 0.01589
scoring_system epss
scoring_elements 0.81628
published_at 2026-04-13T12:55:00Z
6
value 0.01589
scoring_system epss
scoring_elements 0.81648
published_at 2026-04-11T12:55:00Z
7
value 0.01589
scoring_system epss
scoring_elements 0.81635
published_at 2026-04-12T12:55:00Z
8
value 0.01589
scoring_system epss
scoring_elements 0.81666
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-31871
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31871
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31871
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989505
reference_id 989505
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989505
3
reference_url https://usn.ubuntu.com/5379-1/
reference_id USN-5379-1
reference_type
scores
url https://usn.ubuntu.com/5379-1/
fixed_packages
0
url pkg:apk/alpine/klibc@2.0.9-r0?arch=x86&distroversion=edge&reponame=community
purl pkg:apk/alpine/klibc@2.0.9-r0?arch=x86&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/klibc@2.0.9-r0%3Farch=x86&distroversion=edge&reponame=community
aliases CVE-2021-31871
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-36y6-h6vw-xkc1
1
url VCID-exyu-7j28-43ga
vulnerability_id VCID-exyu-7j28-43ga
summary An issue was discovered in klibc before 2.0.9. Additions in the malloc() function may result in an integer overflow and a subsequent heap buffer overflow.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-31873
reference_id
reference_type
scores
0
value 0.00889
scoring_system epss
scoring_elements 0.75452
published_at 2026-04-01T12:55:00Z
1
value 0.00889
scoring_system epss
scoring_elements 0.75455
published_at 2026-04-02T12:55:00Z
2
value 0.00889
scoring_system epss
scoring_elements 0.75486
published_at 2026-04-04T12:55:00Z
3
value 0.00889
scoring_system epss
scoring_elements 0.75466
published_at 2026-04-07T12:55:00Z
4
value 0.00889
scoring_system epss
scoring_elements 0.75508
published_at 2026-04-08T12:55:00Z
5
value 0.00889
scoring_system epss
scoring_elements 0.75518
published_at 2026-04-09T12:55:00Z
6
value 0.00889
scoring_system epss
scoring_elements 0.75537
published_at 2026-04-11T12:55:00Z
7
value 0.00889
scoring_system epss
scoring_elements 0.75516
published_at 2026-04-12T12:55:00Z
8
value 0.00889
scoring_system epss
scoring_elements 0.75506
published_at 2026-04-13T12:55:00Z
9
value 0.00889
scoring_system epss
scoring_elements 0.75548
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-31873
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31873
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31873
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989505
reference_id 989505
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989505
3
reference_url https://usn.ubuntu.com/5379-1/
reference_id USN-5379-1
reference_type
scores
url https://usn.ubuntu.com/5379-1/
fixed_packages
0
url pkg:apk/alpine/klibc@2.0.9-r0?arch=x86&distroversion=edge&reponame=community
purl pkg:apk/alpine/klibc@2.0.9-r0?arch=x86&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/klibc@2.0.9-r0%3Farch=x86&distroversion=edge&reponame=community
aliases CVE-2021-31873
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-exyu-7j28-43ga
2
url VCID-s96y-8z6t-3yff
vulnerability_id VCID-s96y-8z6t-3yff
summary An issue was discovered in klibc before 2.0.9. Multiple possible integer overflows in the cpio command on 32-bit systems may result in a buffer overflow or other security impact.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-31872
reference_id
reference_type
scores
0
value 0.01173
scoring_system epss
scoring_elements 0.78639
published_at 2026-04-01T12:55:00Z
1
value 0.01173
scoring_system epss
scoring_elements 0.78645
published_at 2026-04-02T12:55:00Z
2
value 0.01173
scoring_system epss
scoring_elements 0.78675
published_at 2026-04-04T12:55:00Z
3
value 0.01173
scoring_system epss
scoring_elements 0.78656
published_at 2026-04-07T12:55:00Z
4
value 0.01173
scoring_system epss
scoring_elements 0.78682
published_at 2026-04-08T12:55:00Z
5
value 0.01173
scoring_system epss
scoring_elements 0.78688
published_at 2026-04-09T12:55:00Z
6
value 0.01173
scoring_system epss
scoring_elements 0.78713
published_at 2026-04-11T12:55:00Z
7
value 0.01173
scoring_system epss
scoring_elements 0.78695
published_at 2026-04-12T12:55:00Z
8
value 0.01173
scoring_system epss
scoring_elements 0.78687
published_at 2026-04-13T12:55:00Z
9
value 0.01173
scoring_system epss
scoring_elements 0.78716
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-31872
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31872
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31872
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989505
reference_id 989505
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989505
3
reference_url https://usn.ubuntu.com/5379-1/
reference_id USN-5379-1
reference_type
scores
url https://usn.ubuntu.com/5379-1/
fixed_packages
0
url pkg:apk/alpine/klibc@2.0.9-r0?arch=x86&distroversion=edge&reponame=community
purl pkg:apk/alpine/klibc@2.0.9-r0?arch=x86&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/klibc@2.0.9-r0%3Farch=x86&distroversion=edge&reponame=community
aliases CVE-2021-31872
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s96y-8z6t-3yff
3
url VCID-z6ae-emwm-wkb3
vulnerability_id VCID-z6ae-emwm-wkb3
summary An issue was discovered in klibc before 2.0.9. Multiplication in the calloc() function may result in an integer overflow and a subsequent heap buffer overflow.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-31870
reference_id
reference_type
scores
0
value 0.01279
scoring_system epss
scoring_elements 0.79518
published_at 2026-04-01T12:55:00Z
1
value 0.01279
scoring_system epss
scoring_elements 0.79524
published_at 2026-04-02T12:55:00Z
2
value 0.01279
scoring_system epss
scoring_elements 0.79547
published_at 2026-04-04T12:55:00Z
3
value 0.01279
scoring_system epss
scoring_elements 0.79534
published_at 2026-04-07T12:55:00Z
4
value 0.01279
scoring_system epss
scoring_elements 0.79562
published_at 2026-04-08T12:55:00Z
5
value 0.01279
scoring_system epss
scoring_elements 0.7957
published_at 2026-04-09T12:55:00Z
6
value 0.01279
scoring_system epss
scoring_elements 0.79592
published_at 2026-04-11T12:55:00Z
7
value 0.01279
scoring_system epss
scoring_elements 0.79575
published_at 2026-04-12T12:55:00Z
8
value 0.01279
scoring_system epss
scoring_elements 0.79567
published_at 2026-04-13T12:55:00Z
9
value 0.01279
scoring_system epss
scoring_elements 0.79597
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-31870
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31870
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989505
reference_id 989505
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989505
3
reference_url https://usn.ubuntu.com/5379-1/
reference_id USN-5379-1
reference_type
scores
url https://usn.ubuntu.com/5379-1/
fixed_packages
0
url pkg:apk/alpine/klibc@2.0.9-r0?arch=x86&distroversion=edge&reponame=community
purl pkg:apk/alpine/klibc@2.0.9-r0?arch=x86&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/klibc@2.0.9-r0%3Farch=x86&distroversion=edge&reponame=community
aliases CVE-2021-31870
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z6ae-emwm-wkb3
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/klibc@2.0.9-r0%3Farch=x86&distroversion=edge&reponame=community