Search for vulnerabilities
Vulnerability details: VCID-mrk9-59jc-6yg3
Vulnerability ID VCID-mrk9-59jc-6yg3
Aliases CVE-2021-3481
Summary A flaw was found in Qt. An out-of-bounds read vulnerability was found in QRadialFetchSimd in qt/qtbase/src/gui/painting/qdrawhelper_p.h in Qt/Qtbase. While rendering and displaying a crafted Scalable Vector Graphics (SVG) file this flaw may lead to an unauthorized memory access. The highest threat from this vulnerability is to data confidentiality and the application availability.
Status Published
Exploitability 0.5
Weighted Severity 6.4
Risk 3.2
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
cvssv3 7.1 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3481.json
epss 0.00035 https://api.first.org/data/v1/epss?cve=CVE-2021-3481
epss 0.00035 https://api.first.org/data/v1/epss?cve=CVE-2021-3481
epss 0.00035 https://api.first.org/data/v1/epss?cve=CVE-2021-3481
epss 0.00035 https://api.first.org/data/v1/epss?cve=CVE-2021-3481
epss 0.00035 https://api.first.org/data/v1/epss?cve=CVE-2021-3481
epss 0.00035 https://api.first.org/data/v1/epss?cve=CVE-2021-3481
epss 0.00035 https://api.first.org/data/v1/epss?cve=CVE-2021-3481
epss 0.00035 https://api.first.org/data/v1/epss?cve=CVE-2021-3481
epss 0.00035 https://api.first.org/data/v1/epss?cve=CVE-2021-3481
epss 0.00035 https://api.first.org/data/v1/epss?cve=CVE-2021-3481
epss 0.00035 https://api.first.org/data/v1/epss?cve=CVE-2021-3481
epss 0.00035 https://api.first.org/data/v1/epss?cve=CVE-2021-3481
epss 0.00035 https://api.first.org/data/v1/epss?cve=CVE-2021-3481
epss 0.00035 https://api.first.org/data/v1/epss?cve=CVE-2021-3481
epss 0.00035 https://api.first.org/data/v1/epss?cve=CVE-2021-3481
epss 0.00035 https://api.first.org/data/v1/epss?cve=CVE-2021-3481
epss 0.00035 https://api.first.org/data/v1/epss?cve=CVE-2021-3481
epss 0.00035 https://api.first.org/data/v1/epss?cve=CVE-2021-3481
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2021-3481
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2021-3481
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2021-3481
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2021-3481
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2021-3481
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2021-3481
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2021-3481
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2021-3481
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2021-3481
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2021-3481
cvssv3.1 5.4 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1 7.1 https://nvd.nist.gov/vuln/detail/CVE-2021-3481
archlinux Medium https://security.archlinux.org/AVG-1768
archlinux Medium https://security.archlinux.org/AVG-1769
No exploits are available.
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3481.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2021-3481
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.08559
EPSS Score 0.00035
Published At July 30, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T08:39:40.612131+00:00 Ubuntu USN Importer Import https://usn.ubuntu.com/5241-1/ 37.0.0