Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/thunderbird@78.9.1-1?arch=el7_9
Typerpm
Namespaceredhat
Namethunderbird
Version78.9.1-1
Qualifiers
arch el7_9
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-3tmg-yvx8-5kdt
vulnerability_id VCID-3tmg-yvx8-5kdt
summary If a Thunderbird user has previously imported Alice's OpenPGP key, and Alice has extended the validity period of her key, but Alice's updated key has not yet been imported, an attacker may send an email containing a crafted version of Alice's key with an invalid subkey, Thunderbird might subsequently attempt to use the invalid subkey, and will fail to send encrypted email to Alice.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23991.json
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23991.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-23991
reference_id
reference_type
scores
0
value 0.00204
scoring_system epss
scoring_elements 0.42511
published_at 2026-04-01T12:55:00Z
1
value 0.00204
scoring_system epss
scoring_elements 0.42548
published_at 2026-04-21T12:55:00Z
2
value 0.00204
scoring_system epss
scoring_elements 0.42569
published_at 2026-04-13T12:55:00Z
3
value 0.00204
scoring_system epss
scoring_elements 0.42629
published_at 2026-04-16T12:55:00Z
4
value 0.00204
scoring_system epss
scoring_elements 0.42613
published_at 2026-04-18T12:55:00Z
5
value 0.00204
scoring_system epss
scoring_elements 0.42582
published_at 2026-04-02T12:55:00Z
6
value 0.00204
scoring_system epss
scoring_elements 0.42611
published_at 2026-04-04T12:55:00Z
7
value 0.00204
scoring_system epss
scoring_elements 0.42549
published_at 2026-04-07T12:55:00Z
8
value 0.00204
scoring_system epss
scoring_elements 0.42601
published_at 2026-04-08T12:55:00Z
9
value 0.00204
scoring_system epss
scoring_elements 0.42612
published_at 2026-04-09T12:55:00Z
10
value 0.00204
scoring_system epss
scoring_elements 0.42635
published_at 2026-04-11T12:55:00Z
11
value 0.00204
scoring_system epss
scoring_elements 0.42598
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-23991
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23961
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23961
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23991
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23991
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23992
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23992
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23993
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23993
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23994
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23995
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23995
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23998
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23998
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23999
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23999
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24002
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29945
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29946
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29948
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29948
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29949
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29949
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1948393
reference_id 1948393
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1948393
17
reference_url https://security.archlinux.org/AVG-1790
reference_id AVG-1790
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1790
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-13
reference_id mfsa2021-13
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-13
19
reference_url https://access.redhat.com/errata/RHSA-2021:1190
reference_id RHSA-2021:1190
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1190
20
reference_url https://access.redhat.com/errata/RHSA-2021:1192
reference_id RHSA-2021:1192
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1192
21
reference_url https://access.redhat.com/errata/RHSA-2021:1193
reference_id RHSA-2021:1193
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1193
22
reference_url https://access.redhat.com/errata/RHSA-2021:1201
reference_id RHSA-2021:1201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1201
23
reference_url https://usn.ubuntu.com/4995-1/
reference_id USN-4995-1
reference_type
scores
url https://usn.ubuntu.com/4995-1/
24
reference_url https://usn.ubuntu.com/4995-2/
reference_id USN-4995-2
reference_type
scores
url https://usn.ubuntu.com/4995-2/
fixed_packages
aliases CVE-2021-23991
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3tmg-yvx8-5kdt
1
url VCID-51na-65q7-mqd1
vulnerability_id VCID-51na-65q7-mqd1
summary Thunderbird unprotects a secret OpenPGP key prior to using it for a decryption, signing or key import task. If the task runs into a failure, the secret key may remain in memory in its unprotected state.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29950.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29950.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-29950
reference_id
reference_type
scores
0
value 0.00131
scoring_system epss
scoring_elements 0.32581
published_at 2026-04-01T12:55:00Z
1
value 0.00131
scoring_system epss
scoring_elements 0.32569
published_at 2026-04-21T12:55:00Z
2
value 0.00131
scoring_system epss
scoring_elements 0.32611
published_at 2026-04-12T12:55:00Z
3
value 0.00131
scoring_system epss
scoring_elements 0.32583
published_at 2026-04-13T12:55:00Z
4
value 0.00131
scoring_system epss
scoring_elements 0.32598
published_at 2026-04-18T12:55:00Z
5
value 0.00131
scoring_system epss
scoring_elements 0.32716
published_at 2026-04-02T12:55:00Z
6
value 0.00131
scoring_system epss
scoring_elements 0.32752
published_at 2026-04-04T12:55:00Z
7
value 0.00131
scoring_system epss
scoring_elements 0.32573
published_at 2026-04-07T12:55:00Z
8
value 0.00131
scoring_system epss
scoring_elements 0.32621
published_at 2026-04-16T12:55:00Z
9
value 0.00131
scoring_system epss
scoring_elements 0.32646
published_at 2026-04-09T12:55:00Z
10
value 0.00131
scoring_system epss
scoring_elements 0.32649
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-29950
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23981
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23982
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23982
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23984
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23984
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23987
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23987
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29950
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4127
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4127
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1951873
reference_id 1951873
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1951873
10
reference_url https://security.archlinux.org/AVG-1845
reference_id AVG-1845
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1845
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-17
reference_id mfsa2021-17
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-17
12
reference_url https://access.redhat.com/errata/RHSA-2021:1190
reference_id RHSA-2021:1190
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1190
13
reference_url https://access.redhat.com/errata/RHSA-2021:1192
reference_id RHSA-2021:1192
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1192
14
reference_url https://access.redhat.com/errata/RHSA-2021:1193
reference_id RHSA-2021:1193
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1193
15
reference_url https://access.redhat.com/errata/RHSA-2021:1201
reference_id RHSA-2021:1201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1201
16
reference_url https://usn.ubuntu.com/4936-1/
reference_id USN-4936-1
reference_type
scores
url https://usn.ubuntu.com/4936-1/
fixed_packages
aliases CVE-2021-29950
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-51na-65q7-mqd1
2
url VCID-7tj1-s8bv-e7hv
vulnerability_id VCID-7tj1-s8bv-e7hv
summary Thunderbird did not check if the user ID associated with an OpenPGP key has a valid self signature. An attacker may create a crafted version of an OpenPGP key, by either replacing the original user ID, or by adding another user ID. If Thunderbird imports and accepts the crafted key, the Thunderbird user may falsely conclude that the false user ID belongs to the correspondent.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23992.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23992.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-23992
reference_id
reference_type
scores
0
value 0.00087
scoring_system epss
scoring_elements 0.24962
published_at 2026-04-01T12:55:00Z
1
value 0.00087
scoring_system epss
scoring_elements 0.24873
published_at 2026-04-21T12:55:00Z
2
value 0.00087
scoring_system epss
scoring_elements 0.24889
published_at 2026-04-13T12:55:00Z
3
value 0.00087
scoring_system epss
scoring_elements 0.24902
published_at 2026-04-16T12:55:00Z
4
value 0.00087
scoring_system epss
scoring_elements 0.24896
published_at 2026-04-18T12:55:00Z
5
value 0.00087
scoring_system epss
scoring_elements 0.25041
published_at 2026-04-02T12:55:00Z
6
value 0.00087
scoring_system epss
scoring_elements 0.25079
published_at 2026-04-04T12:55:00Z
7
value 0.00087
scoring_system epss
scoring_elements 0.24854
published_at 2026-04-07T12:55:00Z
8
value 0.00087
scoring_system epss
scoring_elements 0.24923
published_at 2026-04-08T12:55:00Z
9
value 0.00087
scoring_system epss
scoring_elements 0.24969
published_at 2026-04-09T12:55:00Z
10
value 0.00087
scoring_system epss
scoring_elements 0.24984
published_at 2026-04-11T12:55:00Z
11
value 0.00087
scoring_system epss
scoring_elements 0.24944
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-23992
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23961
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23961
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23991
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23991
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23992
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23992
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23993
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23993
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23994
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23995
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23995
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23998
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23998
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23999
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23999
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24002
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29945
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29946
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29948
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29948
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29949
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29949
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1948394
reference_id 1948394
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1948394
17
reference_url https://security.archlinux.org/AVG-1790
reference_id AVG-1790
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1790
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-13
reference_id mfsa2021-13
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-13
19
reference_url https://access.redhat.com/errata/RHSA-2021:1190
reference_id RHSA-2021:1190
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1190
20
reference_url https://access.redhat.com/errata/RHSA-2021:1192
reference_id RHSA-2021:1192
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1192
21
reference_url https://access.redhat.com/errata/RHSA-2021:1193
reference_id RHSA-2021:1193
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1193
22
reference_url https://access.redhat.com/errata/RHSA-2021:1201
reference_id RHSA-2021:1201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1201
23
reference_url https://usn.ubuntu.com/4995-1/
reference_id USN-4995-1
reference_type
scores
url https://usn.ubuntu.com/4995-1/
24
reference_url https://usn.ubuntu.com/4995-2/
reference_id USN-4995-2
reference_type
scores
url https://usn.ubuntu.com/4995-2/
fixed_packages
aliases CVE-2021-23992
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7tj1-s8bv-e7hv
3
url VCID-un8e-mz4v-t7ea
vulnerability_id VCID-un8e-mz4v-t7ea
summary When loading the shared library that provides the OTR protocol implementation, Thunderbird will initially attempt to open it using a filename that isn't distributed by Thunderbird. If a computer has already been infected with a malicious library of the alternative filename, and the malicious library has been copied to a directory that is contained in the search path for executable libraries, then Thunderbird will load the incorrect library.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29949.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29949.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-29949
reference_id
reference_type
scores
0
value 0.00063
scoring_system epss
scoring_elements 0.1951
published_at 2026-04-01T12:55:00Z
1
value 0.00063
scoring_system epss
scoring_elements 0.1943
published_at 2026-04-21T12:55:00Z
2
value 0.00063
scoring_system epss
scoring_elements 0.19448
published_at 2026-04-13T12:55:00Z
3
value 0.00063
scoring_system epss
scoring_elements 0.19409
published_at 2026-04-16T12:55:00Z
4
value 0.00063
scoring_system epss
scoring_elements 0.19417
published_at 2026-04-18T12:55:00Z
5
value 0.00063
scoring_system epss
scoring_elements 0.1965
published_at 2026-04-02T12:55:00Z
6
value 0.00063
scoring_system epss
scoring_elements 0.19698
published_at 2026-04-04T12:55:00Z
7
value 0.00063
scoring_system epss
scoring_elements 0.1942
published_at 2026-04-07T12:55:00Z
8
value 0.00063
scoring_system epss
scoring_elements 0.19498
published_at 2026-04-08T12:55:00Z
9
value 0.00063
scoring_system epss
scoring_elements 0.1955
published_at 2026-04-09T12:55:00Z
10
value 0.00063
scoring_system epss
scoring_elements 0.19553
published_at 2026-04-11T12:55:00Z
11
value 0.00063
scoring_system epss
scoring_elements 0.19506
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-29949
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23961
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23961
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23991
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23991
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23992
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23992
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23993
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23993
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23994
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23995
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23995
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23998
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23998
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23999
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23999
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24002
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29945
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29946
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29948
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29948
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29949
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29949
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1951872
reference_id 1951872
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1951872
17
reference_url https://security.archlinux.org/AVG-1790
reference_id AVG-1790
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1790
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-13
reference_id mfsa2021-13
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-13
19
reference_url https://access.redhat.com/errata/RHSA-2021:1190
reference_id RHSA-2021:1190
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1190
20
reference_url https://access.redhat.com/errata/RHSA-2021:1192
reference_id RHSA-2021:1192
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1192
21
reference_url https://access.redhat.com/errata/RHSA-2021:1193
reference_id RHSA-2021:1193
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1193
22
reference_url https://access.redhat.com/errata/RHSA-2021:1201
reference_id RHSA-2021:1201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1201
23
reference_url https://usn.ubuntu.com/4995-1/
reference_id USN-4995-1
reference_type
scores
url https://usn.ubuntu.com/4995-1/
24
reference_url https://usn.ubuntu.com/4995-2/
reference_id USN-4995-2
reference_type
scores
url https://usn.ubuntu.com/4995-2/
fixed_packages
aliases CVE-2021-29949
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-un8e-mz4v-t7ea
4
url VCID-yy95-yypj-cqbh
vulnerability_id VCID-yy95-yypj-cqbh
summary An attacker may perform a DoS attack to prevent a user from sending encrypted email to a correspondent. If an attacker creates a crafted OpenPGP key with a subkey that has an invalid self signature, and the Thunderbird user imports the crafted key, then Thunderbird may try to use the invalid subkey, but the RNP library rejects it from being used, causing encryption to fail.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23993.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23993.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-23993
reference_id
reference_type
scores
0
value 0.00051
scoring_system epss
scoring_elements 0.15893
published_at 2026-04-01T12:55:00Z
1
value 0.00051
scoring_system epss
scoring_elements 0.15775
published_at 2026-04-18T12:55:00Z
2
value 0.00051
scoring_system epss
scoring_elements 0.15764
published_at 2026-04-16T12:55:00Z
3
value 0.00051
scoring_system epss
scoring_elements 0.15957
published_at 2026-04-02T12:55:00Z
4
value 0.00051
scoring_system epss
scoring_elements 0.16021
published_at 2026-04-04T12:55:00Z
5
value 0.00051
scoring_system epss
scoring_elements 0.15821
published_at 2026-04-07T12:55:00Z
6
value 0.00051
scoring_system epss
scoring_elements 0.15906
published_at 2026-04-08T12:55:00Z
7
value 0.00051
scoring_system epss
scoring_elements 0.15968
published_at 2026-04-09T12:55:00Z
8
value 0.00051
scoring_system epss
scoring_elements 0.15947
published_at 2026-04-11T12:55:00Z
9
value 0.00051
scoring_system epss
scoring_elements 0.15841
published_at 2026-04-13T12:55:00Z
10
value 0.00051
scoring_system epss
scoring_elements 0.15909
published_at 2026-04-12T12:55:00Z
11
value 0.00065
scoring_system epss
scoring_elements 0.20118
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-23993
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23961
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23961
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23991
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23991
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23992
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23992
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23993
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23993
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23994
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23995
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23995
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23998
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23998
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23999
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23999
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24002
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29945
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29946
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29948
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29948
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29949
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29949
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1948395
reference_id 1948395
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1948395
17
reference_url https://security.archlinux.org/AVG-1790
reference_id AVG-1790
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1790
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-13
reference_id mfsa2021-13
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-13
19
reference_url https://access.redhat.com/errata/RHSA-2021:1190
reference_id RHSA-2021:1190
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1190
20
reference_url https://access.redhat.com/errata/RHSA-2021:1192
reference_id RHSA-2021:1192
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1192
21
reference_url https://access.redhat.com/errata/RHSA-2021:1193
reference_id RHSA-2021:1193
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1193
22
reference_url https://access.redhat.com/errata/RHSA-2021:1201
reference_id RHSA-2021:1201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1201
23
reference_url https://usn.ubuntu.com/4995-1/
reference_id USN-4995-1
reference_type
scores
url https://usn.ubuntu.com/4995-1/
24
reference_url https://usn.ubuntu.com/4995-2/
reference_id USN-4995-2
reference_type
scores
url https://usn.ubuntu.com/4995-2/
fixed_packages
aliases CVE-2021-23993
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yy95-yypj-cqbh
Fixing_vulnerabilities
Risk_score3.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/thunderbird@78.9.1-1%3Farch=el7_9