Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/qemu@6.0.0-r1?arch=x86_64&distroversion=v3.23&reponame=community
Typeapk
Namespacealpine
Nameqemu
Version6.0.0-r1
Qualifiers
arch x86_64
distroversion v3.23
reponame community
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version6.0.0-r2
Latest_non_vulnerable_version8.0.2-r1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-7w6v-ewcn-kkdz
vulnerability_id VCID-7w6v-ewcn-kkdz
summary Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape).
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3416.json
reference_id
reference_type
scores
0
value 3.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3416.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-3416
reference_id
reference_type
scores
0
value 6e-05
scoring_system epss
scoring_elements 0.00333
published_at 2026-04-01T12:55:00Z
1
value 6e-05
scoring_system epss
scoring_elements 0.00338
published_at 2026-04-02T12:55:00Z
2
value 6e-05
scoring_system epss
scoring_elements 0.00336
published_at 2026-04-04T12:55:00Z
3
value 6e-05
scoring_system epss
scoring_elements 0.00328
published_at 2026-04-07T12:55:00Z
4
value 6e-05
scoring_system epss
scoring_elements 0.00325
published_at 2026-04-11T12:55:00Z
5
value 6e-05
scoring_system epss
scoring_elements 0.00326
published_at 2026-04-09T12:55:00Z
6
value 6e-05
scoring_system epss
scoring_elements 0.00323
published_at 2026-04-12T12:55:00Z
7
value 6e-05
scoring_system epss
scoring_elements 0.00322
published_at 2026-04-18T12:55:00Z
8
value 6e-05
scoring_system epss
scoring_elements 0.00317
published_at 2026-04-16T12:55:00Z
9
value 6e-05
scoring_system epss
scoring_elements 0.00343
published_at 2026-04-24T12:55:00Z
10
value 6e-05
scoring_system epss
scoring_elements 0.00342
published_at 2026-04-26T12:55:00Z
11
value 6e-05
scoring_system epss
scoring_elements 0.00337
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-3416
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3416
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3416
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1932827
reference_id 1932827
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1932827
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=984448
reference_id 984448
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=984448
6
reference_url https://security.gentoo.org/glsa/202208-27
reference_id GLSA-202208-27
reference_type
scores
url https://security.gentoo.org/glsa/202208-27
7
reference_url https://access.redhat.com/errata/RHSA-2021:3061
reference_id RHSA-2021:3061
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3061
8
reference_url https://access.redhat.com/errata/RHSA-2021:3703
reference_id RHSA-2021:3703
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3703
9
reference_url https://usn.ubuntu.com/5010-1/
reference_id USN-5010-1
reference_type
scores
url https://usn.ubuntu.com/5010-1/
fixed_packages
0
url pkg:apk/alpine/qemu@6.0.0-r1?arch=x86_64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qemu@6.0.0-r1?arch=x86_64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qemu@6.0.0-r1%3Farch=x86_64&distroversion=v3.23&reponame=community
aliases CVE-2021-3416
risk_score 1.4
exploitability 0.5
weighted_severity 2.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7w6v-ewcn-kkdz
1
url VCID-eqp6-raqc-dkch
vulnerability_id VCID-eqp6-raqc-dkch
summary qemu: 9pfs: TOCTOU privilege escalation vulnerability
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20181.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20181.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-20181
reference_id
reference_type
scores
0
value 0.00055
scoring_system epss
scoring_elements 0.1716
published_at 2026-04-01T12:55:00Z
1
value 0.00055
scoring_system epss
scoring_elements 0.17325
published_at 2026-04-02T12:55:00Z
2
value 0.00055
scoring_system epss
scoring_elements 0.17373
published_at 2026-04-04T12:55:00Z
3
value 0.00055
scoring_system epss
scoring_elements 0.17152
published_at 2026-04-07T12:55:00Z
4
value 0.00055
scoring_system epss
scoring_elements 0.17244
published_at 2026-04-08T12:55:00Z
5
value 0.00055
scoring_system epss
scoring_elements 0.17301
published_at 2026-04-09T12:55:00Z
6
value 0.00055
scoring_system epss
scoring_elements 0.17315
published_at 2026-04-11T12:55:00Z
7
value 0.00055
scoring_system epss
scoring_elements 0.17266
published_at 2026-04-12T12:55:00Z
8
value 0.00055
scoring_system epss
scoring_elements 0.17207
published_at 2026-04-13T12:55:00Z
9
value 0.00055
scoring_system epss
scoring_elements 0.17146
published_at 2026-04-16T12:55:00Z
10
value 0.00055
scoring_system epss
scoring_elements 0.17151
published_at 2026-04-18T12:55:00Z
11
value 0.00055
scoring_system epss
scoring_elements 0.17187
published_at 2026-04-21T12:55:00Z
12
value 0.00055
scoring_system epss
scoring_elements 0.17091
published_at 2026-04-24T12:55:00Z
13
value 0.00055
scoring_system epss
scoring_elements 0.17074
published_at 2026-04-26T12:55:00Z
14
value 0.00055
scoring_system epss
scoring_elements 0.17018
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-20181
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20181
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1927007
reference_id 1927007
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1927007
5
reference_url https://usn.ubuntu.com/4725-1/
reference_id USN-4725-1
reference_type
scores
url https://usn.ubuntu.com/4725-1/
fixed_packages
0
url pkg:apk/alpine/qemu@6.0.0-r1?arch=x86_64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qemu@6.0.0-r1?arch=x86_64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qemu@6.0.0-r1%3Farch=x86_64&distroversion=v3.23&reponame=community
aliases CVE-2021-20181
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-eqp6-raqc-dkch
2
url VCID-r51r-u7mq-93cy
vulnerability_id VCID-r51r-u7mq-93cy
summary QEMU: scsi: mptsas: use-after-free while processing io requests
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3392.json
reference_id
reference_type
scores
0
value 2.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3392.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-3392
reference_id
reference_type
scores
0
value 0.00027
scoring_system epss
scoring_elements 0.07325
published_at 2026-04-01T12:55:00Z
1
value 0.00027
scoring_system epss
scoring_elements 0.07437
published_at 2026-04-02T12:55:00Z
2
value 0.00027
scoring_system epss
scoring_elements 0.07479
published_at 2026-04-04T12:55:00Z
3
value 0.00027
scoring_system epss
scoring_elements 0.07461
published_at 2026-04-07T12:55:00Z
4
value 0.00027
scoring_system epss
scoring_elements 0.07519
published_at 2026-04-08T12:55:00Z
5
value 0.00027
scoring_system epss
scoring_elements 0.07541
published_at 2026-04-09T12:55:00Z
6
value 0.00027
scoring_system epss
scoring_elements 0.07543
published_at 2026-04-11T12:55:00Z
7
value 0.00027
scoring_system epss
scoring_elements 0.07529
published_at 2026-04-12T12:55:00Z
8
value 0.00027
scoring_system epss
scoring_elements 0.07516
published_at 2026-04-13T12:55:00Z
9
value 0.00027
scoring_system epss
scoring_elements 0.07438
published_at 2026-04-16T12:55:00Z
10
value 0.00027
scoring_system epss
scoring_elements 0.07428
published_at 2026-04-18T12:55:00Z
11
value 0.00027
scoring_system epss
scoring_elements 0.07557
published_at 2026-04-21T12:55:00Z
12
value 0.00027
scoring_system epss
scoring_elements 0.07517
published_at 2026-04-24T12:55:00Z
13
value 0.00027
scoring_system epss
scoring_elements 0.07507
published_at 2026-04-26T12:55:00Z
14
value 0.00027
scoring_system epss
scoring_elements 0.07476
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-3392
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3392
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3392
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1924042
reference_id 1924042
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1924042
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=984449
reference_id 984449
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=984449
6
reference_url https://usn.ubuntu.com/5010-1/
reference_id USN-5010-1
reference_type
scores
url https://usn.ubuntu.com/5010-1/
fixed_packages
0
url pkg:apk/alpine/qemu@6.0.0-r1?arch=x86_64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qemu@6.0.0-r1?arch=x86_64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qemu@6.0.0-r1%3Farch=x86_64&distroversion=v3.23&reponame=community
aliases CVE-2021-3392
risk_score 1.1
exploitability 0.5
weighted_severity 2.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r51r-u7mq-93cy
3
url VCID-uzxc-npak-yyc4
vulnerability_id VCID-uzxc-npak-yyc4
summary QEMU: net: eepro100: stack overflow via infinite recursion
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20255.json
reference_id
reference_type
scores
0
value 3.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20255.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-20255
reference_id
reference_type
scores
0
value 0.00167
scoring_system epss
scoring_elements 0.37716
published_at 2026-04-01T12:55:00Z
1
value 0.00167
scoring_system epss
scoring_elements 0.37897
published_at 2026-04-02T12:55:00Z
2
value 0.00167
scoring_system epss
scoring_elements 0.37922
published_at 2026-04-04T12:55:00Z
3
value 0.00167
scoring_system epss
scoring_elements 0.378
published_at 2026-04-07T12:55:00Z
4
value 0.00167
scoring_system epss
scoring_elements 0.3785
published_at 2026-04-08T12:55:00Z
5
value 0.00167
scoring_system epss
scoring_elements 0.37863
published_at 2026-04-09T12:55:00Z
6
value 0.00167
scoring_system epss
scoring_elements 0.37878
published_at 2026-04-11T12:55:00Z
7
value 0.00167
scoring_system epss
scoring_elements 0.37841
published_at 2026-04-12T12:55:00Z
8
value 0.00167
scoring_system epss
scoring_elements 0.37816
published_at 2026-04-13T12:55:00Z
9
value 0.00181
scoring_system epss
scoring_elements 0.39773
published_at 2026-04-21T12:55:00Z
10
value 0.00181
scoring_system epss
scoring_elements 0.39881
published_at 2026-04-16T12:55:00Z
11
value 0.00181
scoring_system epss
scoring_elements 0.39853
published_at 2026-04-18T12:55:00Z
12
value 0.00181
scoring_system epss
scoring_elements 0.39593
published_at 2026-04-24T12:55:00Z
13
value 0.00181
scoring_system epss
scoring_elements 0.39582
published_at 2026-04-26T12:55:00Z
14
value 0.00206
scoring_system epss
scoring_elements 0.42686
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-20255
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20255
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20255
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1930646
reference_id 1930646
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1930646
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=984451
reference_id 984451
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=984451
fixed_packages
0
url pkg:apk/alpine/qemu@6.0.0-r1?arch=x86_64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qemu@6.0.0-r1?arch=x86_64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qemu@6.0.0-r1%3Farch=x86_64&distroversion=v3.23&reponame=community
aliases CVE-2021-20255
risk_score 1.4
exploitability 0.5
weighted_severity 2.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uzxc-npak-yyc4
4
url VCID-vvaj-skpn-u3ar
vulnerability_id VCID-vvaj-skpn-u3ar
summary Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape).
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3409.json
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3409.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-3409
reference_id
reference_type
scores
0
value 0.00053
scoring_system epss
scoring_elements 0.16897
published_at 2026-04-02T12:55:00Z
1
value 0.00053
scoring_system epss
scoring_elements 0.16727
published_at 2026-04-01T12:55:00Z
2
value 0.00188
scoring_system epss
scoring_elements 0.40602
published_at 2026-04-08T12:55:00Z
3
value 0.00188
scoring_system epss
scoring_elements 0.40612
published_at 2026-04-09T12:55:00Z
4
value 0.00188
scoring_system epss
scoring_elements 0.40593
published_at 2026-04-12T12:55:00Z
5
value 0.00188
scoring_system epss
scoring_elements 0.40573
published_at 2026-04-13T12:55:00Z
6
value 0.00188
scoring_system epss
scoring_elements 0.4062
published_at 2026-04-16T12:55:00Z
7
value 0.00188
scoring_system epss
scoring_elements 0.4059
published_at 2026-04-18T12:55:00Z
8
value 0.00188
scoring_system epss
scoring_elements 0.40512
published_at 2026-04-21T12:55:00Z
9
value 0.00188
scoring_system epss
scoring_elements 0.4041
published_at 2026-04-24T12:55:00Z
10
value 0.00188
scoring_system epss
scoring_elements 0.40397
published_at 2026-04-26T12:55:00Z
11
value 0.00188
scoring_system epss
scoring_elements 0.40316
published_at 2026-04-29T12:55:00Z
12
value 0.00188
scoring_system epss
scoring_elements 0.4063
published_at 2026-04-11T12:55:00Z
13
value 0.00188
scoring_system epss
scoring_elements 0.40552
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-3409
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3409
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3409
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1928146
reference_id 1928146
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1928146
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986795
reference_id 986795
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986795
6
reference_url https://security.gentoo.org/glsa/202208-27
reference_id GLSA-202208-27
reference_type
scores
url https://security.gentoo.org/glsa/202208-27
7
reference_url https://usn.ubuntu.com/5010-1/
reference_id USN-5010-1
reference_type
scores
url https://usn.ubuntu.com/5010-1/
fixed_packages
0
url pkg:apk/alpine/qemu@6.0.0-r1?arch=x86_64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qemu@6.0.0-r1?arch=x86_64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qemu@6.0.0-r1%3Farch=x86_64&distroversion=v3.23&reponame=community
aliases CVE-2021-3409
risk_score 2.5
exploitability 0.5
weighted_severity 5.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vvaj-skpn-u3ar
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/qemu@6.0.0-r1%3Farch=x86_64&distroversion=v3.23&reponame=community