{"url":"http://public2.vulnerablecode.io/api/packages/928591?format=json","purl":"pkg:deb/debian/libslirp@4.4.0-1%2Bdeb11u2?distro=trixie","type":"deb","namespace":"debian","name":"libslirp","version":"4.4.0-1+deb11u2","qualifiers":{"distro":"trixie"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"4.6.1-1","latest_non_vulnerable_version":"4.9.1-1","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31748?format=json","vulnerability_id":"VCID-145f-vwpy-ukfg","summary":"Multiple vulnerabilities have been found in QEMU, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-7039.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-7039.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-7039","reference_id":"","reference_type":"","scores":[{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74514","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74519","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74546","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.7452","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74552","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74568","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.7459","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74571","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74563","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.746","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74607","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74599","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74635","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74641","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74643","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-7039"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15890","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15890"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7039","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7039"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1791551","reference_id":"1791551","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1791551"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=949084","reference_id":"949084","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=949084"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=949085","reference_id":"949085","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=949085"},{"reference_url":"https://security.gentoo.org/glsa/202005-02","reference_id":"GLSA-202005-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202005-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0348","reference_id":"RHSA-2020:0348","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0348"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0775","reference_id":"RHSA-2020:0775","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0775"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0889","reference_id":"RHSA-2020:0889","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0889"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1116","reference_id":"RHSA-2020:1116","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1116"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1150","reference_id":"RHSA-2020:1150","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1150"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1261","reference_id":"RHSA-2020:1261","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1261"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1296","reference_id":"RHSA-2020:1296","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1296"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1300","reference_id":"RHSA-2020:1300","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1300"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1344","reference_id":"RHSA-2020:1344","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1344"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1351","reference_id":"RHSA-2020:1351","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1351"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1352","reference_id":"RHSA-2020:1352","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1358","reference_id":"RHSA-2020:1358","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1358"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1360","reference_id":"RHSA-2020:1360","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1360"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2342","reference_id":"RHSA-2020:2342","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2342"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2730","reference_id":"RHSA-2020:2730","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2730"},{"reference_url":"https://usn.ubuntu.com/4283-1/","reference_id":"USN-4283-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4283-1/"},{"reference_url":"https://usn.ubuntu.com/4632-1/","reference_id":"USN-4632-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4632-1/"},{"reference_url":"https://usn.ubuntu.com/7094-1/","reference_id":"USN-7094-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7094-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928596?format=json","purl":"pkg:deb/debian/libslirp@4.1.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libslirp@4.1.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928591?format=json","purl":"pkg:deb/debian/libslirp@4.4.0-1%2Bdeb11u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libslirp@4.4.0-1%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928589?format=json","purl":"pkg:deb/debian/libslirp@4.7.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libslirp@4.7.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928593?format=json","purl":"pkg:deb/debian/libslirp@4.8.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libslirp@4.8.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928592?format=json","purl":"pkg:deb/debian/libslirp@4.9.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libslirp@4.9.1-1%3Fdistro=trixie"}],"aliases":["CVE-2020-7039"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-145f-vwpy-ukfg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40980?format=json","vulnerability_id":"VCID-1g7f-6q39-fyhx","summary":"Multiple vulnerabilities have been found in libslirp, the worst of\n    which could result in a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3593.json","reference_id":"","reference_type":"","scores":[{"value":"3.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3593.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3593","reference_id":"","reference_type":"","scores":[{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05868","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05994","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05954","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05988","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.059","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05934","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05923","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05816","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05841","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05819","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.0581","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05804","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05768","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05775","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05921","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3593"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3593","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3593"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1970487","reference_id":"1970487","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1970487"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989994","reference_id":"989994","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989994"},{"reference_url":"https://security.archlinux.org/ASA-202106-49","reference_id":"ASA-202106-49","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-49"},{"reference_url":"https://security.archlinux.org/AVG-2073","reference_id":"AVG-2073","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2073"},{"reference_url":"https://security.gentoo.org/glsa/202107-44","reference_id":"GLSA-202107-44","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-44"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4191","reference_id":"RHSA-2021:4191","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4191"},{"reference_url":"https://usn.ubuntu.com/5009-1/","reference_id":"USN-5009-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5009-1/"},{"reference_url":"https://usn.ubuntu.com/5009-2/","reference_id":"USN-5009-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5009-2/"},{"reference_url":"https://usn.ubuntu.com/5010-1/","reference_id":"USN-5010-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5010-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928591?format=json","purl":"pkg:deb/debian/libslirp@4.4.0-1%2Bdeb11u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libslirp@4.4.0-1%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928598?format=json","purl":"pkg:deb/debian/libslirp@4.6.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libslirp@4.6.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928589?format=json","purl":"pkg:deb/debian/libslirp@4.7.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libslirp@4.7.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928593?format=json","purl":"pkg:deb/debian/libslirp@4.8.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libslirp@4.8.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928592?format=json","purl":"pkg:deb/debian/libslirp@4.9.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libslirp@4.9.1-1%3Fdistro=trixie"}],"aliases":["CVE-2021-3593"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1g7f-6q39-fyhx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40979?format=json","vulnerability_id":"VCID-5ur6-6ec3-p7bt","summary":"Multiple vulnerabilities have been found in libslirp, the worst of\n    which could result in a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3592.json","reference_id":"","reference_type":"","scores":[{"value":"3.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3592.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3592","reference_id":"","reference_type":"","scores":[{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07033","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07056","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07047","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06987","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06972","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07106","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07072","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0703","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07062","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07068","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07174","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07219","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07198","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07054","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3592"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3592","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3592"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1970484","reference_id":"1970484","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1970484"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989993","reference_id":"989993","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989993"},{"reference_url":"https://security.archlinux.org/ASA-202106-49","reference_id":"ASA-202106-49","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-49"},{"reference_url":"https://security.archlinux.org/AVG-2073","reference_id":"AVG-2073","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2073"},{"reference_url":"https://security.gentoo.org/glsa/202107-44","reference_id":"GLSA-202107-44","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-44"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4191","reference_id":"RHSA-2021:4191","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4191"},{"reference_url":"https://usn.ubuntu.com/5009-1/","reference_id":"USN-5009-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5009-1/"},{"reference_url":"https://usn.ubuntu.com/5009-2/","reference_id":"USN-5009-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5009-2/"},{"reference_url":"https://usn.ubuntu.com/5010-1/","reference_id":"USN-5010-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5010-1/"},{"reference_url":"https://usn.ubuntu.com/7094-1/","reference_id":"USN-7094-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7094-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928591?format=json","purl":"pkg:deb/debian/libslirp@4.4.0-1%2Bdeb11u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libslirp@4.4.0-1%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928598?format=json","purl":"pkg:deb/debian/libslirp@4.6.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libslirp@4.6.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928589?format=json","purl":"pkg:deb/debian/libslirp@4.7.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libslirp@4.7.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928593?format=json","purl":"pkg:deb/debian/libslirp@4.8.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libslirp@4.8.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928592?format=json","purl":"pkg:deb/debian/libslirp@4.9.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libslirp@4.9.1-1%3Fdistro=trixie"}],"aliases":["CVE-2021-3592"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5ur6-6ec3-p7bt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80756?format=json","vulnerability_id":"VCID-6fs3-3a9w-xycq","summary":"QEMU: slirp: out-of-bounds access while processing ARP/NCSI packets","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-29130.json","reference_id":"","reference_type":"","scores":[{"value":"2.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-29130.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-29130","reference_id":"","reference_type":"","scores":[{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64386","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.6454","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64528","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64541","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.6444","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64471","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.6443","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64477","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64494","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64509","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64498","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64469","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64504","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64516","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64508","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-29130"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29130","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29130"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1902231","reference_id":"1902231","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1902231"},{"reference_url":"https://security.archlinux.org/ASA-202012-7","reference_id":"ASA-202012-7","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202012-7"},{"reference_url":"https://security.archlinux.org/AVG-1305","reference_id":"AVG-1305","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1305"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1762","reference_id":"RHSA-2021:1762","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1762"},{"reference_url":"https://usn.ubuntu.com/5009-1/","reference_id":"USN-5009-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5009-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928595?format=json","purl":"pkg:deb/debian/libslirp@4.4.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libslirp@4.4.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928591?format=json","purl":"pkg:deb/debian/libslirp@4.4.0-1%2Bdeb11u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libslirp@4.4.0-1%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928589?format=json","purl":"pkg:deb/debian/libslirp@4.7.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libslirp@4.7.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928593?format=json","purl":"pkg:deb/debian/libslirp@4.8.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libslirp@4.8.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928592?format=json","purl":"pkg:deb/debian/libslirp@4.9.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libslirp@4.9.1-1%3Fdistro=trixie"}],"aliases":["CVE-2020-29130"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6fs3-3a9w-xycq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40982?format=json","vulnerability_id":"VCID-6pkj-axqp-duf1","summary":"Multiple vulnerabilities have been found in libslirp, the worst of\n    which could result in a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3595.json","reference_id":"","reference_type":"","scores":[{"value":"3.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3595.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3595","reference_id":"","reference_type":"","scores":[{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06142","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06264","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06223","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06254","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06179","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.0621","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06192","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.0607","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06109","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06099","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06094","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06086","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06051","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.0606","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06209","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3595"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3595","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3595"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1970489","reference_id":"1970489","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1970489"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989996","reference_id":"989996","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989996"},{"reference_url":"https://security.archlinux.org/ASA-202106-49","reference_id":"ASA-202106-49","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-49"},{"reference_url":"https://security.archlinux.org/AVG-2073","reference_id":"AVG-2073","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2073"},{"reference_url":"https://security.gentoo.org/glsa/202107-44","reference_id":"GLSA-202107-44","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-44"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4191","reference_id":"RHSA-2021:4191","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4191"},{"reference_url":"https://usn.ubuntu.com/5009-1/","reference_id":"USN-5009-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5009-1/"},{"reference_url":"https://usn.ubuntu.com/5009-2/","reference_id":"USN-5009-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5009-2/"},{"reference_url":"https://usn.ubuntu.com/5010-1/","reference_id":"USN-5010-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5010-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928591?format=json","purl":"pkg:deb/debian/libslirp@4.4.0-1%2Bdeb11u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libslirp@4.4.0-1%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928598?format=json","purl":"pkg:deb/debian/libslirp@4.6.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libslirp@4.6.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928589?format=json","purl":"pkg:deb/debian/libslirp@4.7.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libslirp@4.7.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928593?format=json","purl":"pkg:deb/debian/libslirp@4.8.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libslirp@4.8.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928592?format=json","purl":"pkg:deb/debian/libslirp@4.9.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libslirp@4.9.1-1%3Fdistro=trixie"}],"aliases":["CVE-2021-3595"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6pkj-axqp-duf1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81243?format=json","vulnerability_id":"VCID-7zkh-xs1s-guh6","summary":"QEMU: slirp: networking out-of-bounds read information disclosure vulnerability","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10756.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10756.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-10756","reference_id":"","reference_type":"","scores":[{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06882","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06768","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06759","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06903","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06888","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0691","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06797","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06835","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0684","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06833","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06826","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.06998","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07052","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07032","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.06894","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-10756"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10756","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10756"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13361","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13361"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13362","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13362"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13659","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13659"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13754","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13754"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13765","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13765"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1835986","reference_id":"1835986","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1835986"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3586","reference_id":"RHSA-2020:3586","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3586"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4059","reference_id":"RHSA-2020:4059","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4059"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4694","reference_id":"RHSA-2020:4694","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4694"},{"reference_url":"https://usn.ubuntu.com/4437-1/","reference_id":"USN-4437-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4437-1/"},{"reference_url":"https://usn.ubuntu.com/4467-1/","reference_id":"USN-4467-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4467-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928590?format=json","purl":"pkg:deb/debian/libslirp@4.3.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libslirp@4.3.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928591?format=json","purl":"pkg:deb/debian/libslirp@4.4.0-1%2Bdeb11u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libslirp@4.4.0-1%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928589?format=json","purl":"pkg:deb/debian/libslirp@4.7.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libslirp@4.7.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928593?format=json","purl":"pkg:deb/debian/libslirp@4.8.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libslirp@4.8.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928592?format=json","purl":"pkg:deb/debian/libslirp@4.9.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libslirp@4.9.1-1%3Fdistro=trixie"}],"aliases":["CVE-2020-10756"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7zkh-xs1s-guh6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81469?format=json","vulnerability_id":"VCID-egyg-bbm9-8qea","summary":"QEMU: slirp: use-after-free in ip_reass() function in ip_input.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1983.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1983.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-1983","reference_id":"","reference_type":"","scores":[{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.34973","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35317","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35083","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35062","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00202","scoring_system":"epss","scoring_elements":"0.42299","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00202","scoring_system":"epss","scoring_elements":"0.42307","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00202","scoring_system":"epss","scoring_elements":"0.42315","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00202","scoring_system":"epss","scoring_elements":"0.42338","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00202","scoring_system":"epss","scoring_elements":"0.42301","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00202","scoring_system":"epss","scoring_elements":"0.42273","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00202","scoring_system":"epss","scoring_elements":"0.42323","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00207","scoring_system":"epss","scoring_elements":"0.43138","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00207","scoring_system":"epss","scoring_elements":"0.43052","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00207","scoring_system":"epss","scoring_elements":"0.43077","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00207","scoring_system":"epss","scoring_elements":"0.43111","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-1983"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12068","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12068"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15034","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15034"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20382","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20382"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11947","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11947"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1983","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1983"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1829825","reference_id":"1829825","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1829825"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3053","reference_id":"RHSA-2020:3053","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3053"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4079","reference_id":"RHSA-2020:4079","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4079"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4290","reference_id":"RHSA-2020:4290","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4290"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4676","reference_id":"RHSA-2020:4676","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4676"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0346","reference_id":"RHSA-2021:0346","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0346"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0459","reference_id":"RHSA-2021:0459","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0459"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0934","reference_id":"RHSA-2021:0934","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0934"},{"reference_url":"https://usn.ubuntu.com/4372-1/","reference_id":"USN-4372-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4372-1/"},{"reference_url":"https://usn.ubuntu.com/7094-1/","reference_id":"USN-7094-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7094-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928594?format=json","purl":"pkg:deb/debian/libslirp@4.2.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libslirp@4.2.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928591?format=json","purl":"pkg:deb/debian/libslirp@4.4.0-1%2Bdeb11u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libslirp@4.4.0-1%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928589?format=json","purl":"pkg:deb/debian/libslirp@4.7.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libslirp@4.7.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928593?format=json","purl":"pkg:deb/debian/libslirp@4.8.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libslirp@4.8.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928592?format=json","purl":"pkg:deb/debian/libslirp@4.9.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libslirp@4.9.1-1%3Fdistro=trixie"}],"aliases":["CVE-2020-1983"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-egyg-bbm9-8qea"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40981?format=json","vulnerability_id":"VCID-ffd9-9wm1-rffs","summary":"Multiple vulnerabilities have been found in libslirp, the worst of\n    which could result in a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3594.json","reference_id":"","reference_type":"","scores":[{"value":"3.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3594.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3594","reference_id":"","reference_type":"","scores":[{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07906","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07864","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.0785","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.0801","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07972","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07937","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07969","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07991","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07978","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.0796","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07945","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08161","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08215","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08071","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3594"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1970491","reference_id":"1970491","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1970491"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989995","reference_id":"989995","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989995"},{"reference_url":"https://security.archlinux.org/ASA-202106-49","reference_id":"ASA-202106-49","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-49"},{"reference_url":"https://security.archlinux.org/AVG-2073","reference_id":"AVG-2073","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2073"},{"reference_url":"https://security.gentoo.org/glsa/202107-44","reference_id":"GLSA-202107-44","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-44"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4191","reference_id":"RHSA-2021:4191","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4191"},{"reference_url":"https://usn.ubuntu.com/5009-1/","reference_id":"USN-5009-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5009-1/"},{"reference_url":"https://usn.ubuntu.com/5009-2/","reference_id":"USN-5009-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5009-2/"},{"reference_url":"https://usn.ubuntu.com/5010-1/","reference_id":"USN-5010-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5010-1/"},{"reference_url":"https://usn.ubuntu.com/7094-1/","reference_id":"USN-7094-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7094-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928591?format=json","purl":"pkg:deb/debian/libslirp@4.4.0-1%2Bdeb11u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libslirp@4.4.0-1%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928598?format=json","purl":"pkg:deb/debian/libslirp@4.6.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libslirp@4.6.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928589?format=json","purl":"pkg:deb/debian/libslirp@4.7.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libslirp@4.7.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928593?format=json","purl":"pkg:deb/debian/libslirp@4.8.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libslirp@4.8.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928592?format=json","purl":"pkg:deb/debian/libslirp@4.9.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libslirp@4.9.1-1%3Fdistro=trixie"}],"aliases":["CVE-2021-3594"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ffd9-9wm1-rffs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34658?format=json","vulnerability_id":"VCID-gqtx-g1cs-6ybn","summary":"Multiple vulnerabilities have been found in QEMU, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8608.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8608.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-8608","reference_id":"","reference_type":"","scores":[{"value":"0.01501","scoring_system":"epss","scoring_elements":"0.81079","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01501","scoring_system":"epss","scoring_elements":"0.81088","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01501","scoring_system":"epss","scoring_elements":"0.81113","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01501","scoring_system":"epss","scoring_elements":"0.8114","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01501","scoring_system":"epss","scoring_elements":"0.81146","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01501","scoring_system":"epss","scoring_elements":"0.81165","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01501","scoring_system":"epss","scoring_elements":"0.81151","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01501","scoring_system":"epss","scoring_elements":"0.81144","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01501","scoring_system":"epss","scoring_elements":"0.81181","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01501","scoring_system":"epss","scoring_elements":"0.81183","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01501","scoring_system":"epss","scoring_elements":"0.81203","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01501","scoring_system":"epss","scoring_elements":"0.81211","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01501","scoring_system":"epss","scoring_elements":"0.81216","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-8608"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8608","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8608"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1798453","reference_id":"1798453","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1798453"},{"reference_url":"https://security.gentoo.org/glsa/202003-66","reference_id":"GLSA-202003-66","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-66"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0889","reference_id":"RHSA-2020:0889","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0889"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1208","reference_id":"RHSA-2020:1208","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1208"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1209","reference_id":"RHSA-2020:1209","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1209"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1261","reference_id":"RHSA-2020:1261","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1261"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1292","reference_id":"RHSA-2020:1292","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1292"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1300","reference_id":"RHSA-2020:1300","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1300"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1351","reference_id":"RHSA-2020:1351","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1351"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1352","reference_id":"RHSA-2020:1352","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1379","reference_id":"RHSA-2020:1379","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1379"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1403","reference_id":"RHSA-2020:1403","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1403"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2342","reference_id":"RHSA-2020:2342","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2342"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2730","reference_id":"RHSA-2020:2730","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2730"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2773","reference_id":"RHSA-2020:2773","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2773"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2774","reference_id":"RHSA-2020:2774","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2774"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2844","reference_id":"RHSA-2020:2844","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2844"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3040","reference_id":"RHSA-2020:3040","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3040"},{"reference_url":"https://usn.ubuntu.com/4283-1/","reference_id":"USN-4283-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4283-1/"},{"reference_url":"https://usn.ubuntu.com/4632-1/","reference_id":"USN-4632-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4632-1/"},{"reference_url":"https://usn.ubuntu.com/7094-1/","reference_id":"USN-7094-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7094-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928597?format=json","purl":"pkg:deb/debian/libslirp@4.2.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libslirp@4.2.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928591?format=json","purl":"pkg:deb/debian/libslirp@4.4.0-1%2Bdeb11u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libslirp@4.4.0-1%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928589?format=json","purl":"pkg:deb/debian/libslirp@4.7.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libslirp@4.7.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928593?format=json","purl":"pkg:deb/debian/libslirp@4.8.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libslirp@4.8.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928592?format=json","purl":"pkg:deb/debian/libslirp@4.9.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libslirp@4.9.1-1%3Fdistro=trixie"}],"aliases":["CVE-2020-8608"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gqtx-g1cs-6ybn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80755?format=json","vulnerability_id":"VCID-t2y3-nbz8-jqa7","summary":"QEMU: slirp: out-of-bounds access while processing ARP/NCSI packets","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-29129.json","reference_id":"","reference_type":"","scores":[{"value":"2.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-29129.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-29129","reference_id":"","reference_type":"","scores":[{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.50965","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.50997","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.5103","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51037","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51018","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51043","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51057","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51054","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51097","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51075","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51058","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51103","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51081","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-29129"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29129","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29129"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1902231","reference_id":"1902231","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1902231"},{"reference_url":"https://security.archlinux.org/ASA-202012-7","reference_id":"ASA-202012-7","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202012-7"},{"reference_url":"https://security.archlinux.org/AVG-1305","reference_id":"AVG-1305","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1305"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1762","reference_id":"RHSA-2021:1762","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1762"},{"reference_url":"https://usn.ubuntu.com/5009-1/","reference_id":"USN-5009-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5009-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928595?format=json","purl":"pkg:deb/debian/libslirp@4.4.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libslirp@4.4.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928591?format=json","purl":"pkg:deb/debian/libslirp@4.4.0-1%2Bdeb11u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libslirp@4.4.0-1%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928589?format=json","purl":"pkg:deb/debian/libslirp@4.7.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libslirp@4.7.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928593?format=json","purl":"pkg:deb/debian/libslirp@4.8.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libslirp@4.8.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928592?format=json","purl":"pkg:deb/debian/libslirp@4.9.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libslirp@4.9.1-1%3Fdistro=trixie"}],"aliases":["CVE-2020-29129"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t2y3-nbz8-jqa7"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libslirp@4.4.0-1%252Bdeb11u2%3Fdistro=trixie"}