Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/librewolf@93.0-r0?arch=loongarch64&distroversion=v3.23&reponame=community
Typeapk
Namespacealpine
Namelibrewolf
Version93.0-r0
Qualifiers
arch loongarch64
distroversion v3.23
reponame community
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version94.0-r0
Latest_non_vulnerable_version119.0-r0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-16cw-k8f1-8kc4
vulnerability_id VCID-16cw-k8f1-8kc4
summary Mozilla developers and community members Julien Cristau, Christian Holler reported memory safety bugs present in Firefox 92. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-38499
reference_id
reference_type
scores
0
value 0.0042
scoring_system epss
scoring_elements 0.61989
published_at 2026-04-16T12:55:00Z
1
value 0.0042
scoring_system epss
scoring_elements 0.61816
published_at 2026-04-01T12:55:00Z
2
value 0.0042
scoring_system epss
scoring_elements 0.61968
published_at 2026-04-12T12:55:00Z
3
value 0.0042
scoring_system epss
scoring_elements 0.61947
published_at 2026-04-13T12:55:00Z
4
value 0.0042
scoring_system epss
scoring_elements 0.61889
published_at 2026-04-02T12:55:00Z
5
value 0.0042
scoring_system epss
scoring_elements 0.6192
published_at 2026-04-04T12:55:00Z
6
value 0.0042
scoring_system epss
scoring_elements 0.61891
published_at 2026-04-07T12:55:00Z
7
value 0.0042
scoring_system epss
scoring_elements 0.6194
published_at 2026-04-08T12:55:00Z
8
value 0.0042
scoring_system epss
scoring_elements 0.61958
published_at 2026-04-09T12:55:00Z
9
value 0.0042
scoring_system epss
scoring_elements 0.61979
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-38499
1
reference_url https://security.archlinux.org/AVG-2443
reference_id AVG-2443
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2443
2
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-43
reference_id mfsa2021-43
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-43
3
reference_url https://usn.ubuntu.com/5107-1/
reference_id USN-5107-1
reference_type
scores
url https://usn.ubuntu.com/5107-1/
fixed_packages
0
url pkg:apk/alpine/librewolf@93.0-r0?arch=loongarch64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/librewolf@93.0-r0?arch=loongarch64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/librewolf@93.0-r0%3Farch=loongarch64&distroversion=v3.23&reponame=community
aliases CVE-2021-38499
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-16cw-k8f1-8kc4
1
url VCID-1rj3-tt63-4yc1
vulnerability_id VCID-1rj3-tt63-4yc1
summary Through use of reportValidity() and window.open(), a plain-text validation message could have been overlaid on another origin, leading to possible user confusion and spoofing attacks.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-38497.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-38497.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-38497
reference_id
reference_type
scores
0
value 0.00197
scoring_system epss
scoring_elements 0.41705
published_at 2026-04-16T12:55:00Z
1
value 0.00197
scoring_system epss
scoring_elements 0.41672
published_at 2026-04-12T12:55:00Z
2
value 0.00197
scoring_system epss
scoring_elements 0.41657
published_at 2026-04-13T12:55:00Z
3
value 0.00198
scoring_system epss
scoring_elements 0.41896
published_at 2026-04-02T12:55:00Z
4
value 0.00198
scoring_system epss
scoring_elements 0.41831
published_at 2026-04-01T12:55:00Z
5
value 0.00198
scoring_system epss
scoring_elements 0.41924
published_at 2026-04-04T12:55:00Z
6
value 0.00198
scoring_system epss
scoring_elements 0.41851
published_at 2026-04-07T12:55:00Z
7
value 0.00198
scoring_system epss
scoring_elements 0.419
published_at 2026-04-08T12:55:00Z
8
value 0.00198
scoring_system epss
scoring_elements 0.41911
published_at 2026-04-09T12:55:00Z
9
value 0.00198
scoring_system epss
scoring_elements 0.41935
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-38497
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2011098
reference_id 2011098
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2011098
4
reference_url https://security.archlinux.org/AVG-2443
reference_id AVG-2443
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2443
5
reference_url https://security.archlinux.org/AVG-2459
reference_id AVG-2459
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2459
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-43
reference_id mfsa2021-43
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-43
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-45
reference_id mfsa2021-45
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-45
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-47
reference_id mfsa2021-47
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-47
9
reference_url https://access.redhat.com/errata/RHSA-2021:3755
reference_id RHSA-2021:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3755
10
reference_url https://access.redhat.com/errata/RHSA-2021:3756
reference_id RHSA-2021:3756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3756
11
reference_url https://access.redhat.com/errata/RHSA-2021:3757
reference_id RHSA-2021:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3757
12
reference_url https://access.redhat.com/errata/RHSA-2021:3791
reference_id RHSA-2021:3791
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3791
13
reference_url https://access.redhat.com/errata/RHSA-2021:3838
reference_id RHSA-2021:3838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3838
14
reference_url https://access.redhat.com/errata/RHSA-2021:3839
reference_id RHSA-2021:3839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3839
15
reference_url https://access.redhat.com/errata/RHSA-2021:3840
reference_id RHSA-2021:3840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3840
16
reference_url https://access.redhat.com/errata/RHSA-2021:3841
reference_id RHSA-2021:3841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3841
17
reference_url https://usn.ubuntu.com/5107-1/
reference_id USN-5107-1
reference_type
scores
url https://usn.ubuntu.com/5107-1/
18
reference_url https://usn.ubuntu.com/5132-1/
reference_id USN-5132-1
reference_type
scores
url https://usn.ubuntu.com/5132-1/
19
reference_url https://usn.ubuntu.com/5248-1/
reference_id USN-5248-1
reference_type
scores
url https://usn.ubuntu.com/5248-1/
fixed_packages
0
url pkg:apk/alpine/librewolf@93.0-r0?arch=loongarch64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/librewolf@93.0-r0?arch=loongarch64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/librewolf@93.0-r0%3Farch=loongarch64&distroversion=v3.23&reponame=community
aliases CVE-2021-38497
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1rj3-tt63-4yc1
2
url VCID-2k99-39yt-gkbe
vulnerability_id VCID-2k99-39yt-gkbe
summary During operations on MessageTasks, a task may have been removed while it was still scheduled, resulting in memory corruption and a potentially exploitable crash.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-38496.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-38496.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-38496
reference_id
reference_type
scores
0
value 0.0109
scoring_system epss
scoring_elements 0.77972
published_at 2026-04-16T12:55:00Z
1
value 0.0109
scoring_system epss
scoring_elements 0.77937
published_at 2026-04-13T12:55:00Z
2
value 0.0109
scoring_system epss
scoring_elements 0.77938
published_at 2026-04-12T12:55:00Z
3
value 0.0149
scoring_system epss
scoring_elements 0.81001
published_at 2026-04-02T12:55:00Z
4
value 0.0149
scoring_system epss
scoring_elements 0.80992
published_at 2026-04-01T12:55:00Z
5
value 0.0149
scoring_system epss
scoring_elements 0.81025
published_at 2026-04-04T12:55:00Z
6
value 0.0149
scoring_system epss
scoring_elements 0.81023
published_at 2026-04-07T12:55:00Z
7
value 0.0149
scoring_system epss
scoring_elements 0.81051
published_at 2026-04-08T12:55:00Z
8
value 0.0149
scoring_system epss
scoring_elements 0.81058
published_at 2026-04-09T12:55:00Z
9
value 0.0149
scoring_system epss
scoring_elements 0.81076
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-38496
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38496
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38496
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38500
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38502
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38503
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38504
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38506
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38506
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38507
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38507
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38508
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38508
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38509
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38509
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4126
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4126
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4129
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4129
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43528
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43528
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43529
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43529
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43534
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43534
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43535
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43535
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43536
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43536
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43537
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43537
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43538
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43538
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43539
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43539
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43541
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43541
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43542
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43542
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43543
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43543
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43545
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43546
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44538
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44538
27
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2011097
reference_id 2011097
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2011097
28
reference_url https://security.archlinux.org/AVG-2443
reference_id AVG-2443
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2443
29
reference_url https://security.archlinux.org/AVG-2459
reference_id AVG-2459
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2459
30
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-43
reference_id mfsa2021-43
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-43
31
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-44
reference_id mfsa2021-44
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-44
32
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-45
reference_id mfsa2021-45
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-45
33
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-47
reference_id mfsa2021-47
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-47
34
reference_url https://access.redhat.com/errata/RHSA-2021:3755
reference_id RHSA-2021:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3755
35
reference_url https://access.redhat.com/errata/RHSA-2021:3756
reference_id RHSA-2021:3756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3756
36
reference_url https://access.redhat.com/errata/RHSA-2021:3757
reference_id RHSA-2021:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3757
37
reference_url https://access.redhat.com/errata/RHSA-2021:3791
reference_id RHSA-2021:3791
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3791
38
reference_url https://access.redhat.com/errata/RHSA-2021:3838
reference_id RHSA-2021:3838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3838
39
reference_url https://access.redhat.com/errata/RHSA-2021:3839
reference_id RHSA-2021:3839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3839
40
reference_url https://access.redhat.com/errata/RHSA-2021:3840
reference_id RHSA-2021:3840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3840
41
reference_url https://access.redhat.com/errata/RHSA-2021:3841
reference_id RHSA-2021:3841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3841
42
reference_url https://usn.ubuntu.com/5107-1/
reference_id USN-5107-1
reference_type
scores
url https://usn.ubuntu.com/5107-1/
43
reference_url https://usn.ubuntu.com/5132-1/
reference_id USN-5132-1
reference_type
scores
url https://usn.ubuntu.com/5132-1/
44
reference_url https://usn.ubuntu.com/5248-1/
reference_id USN-5248-1
reference_type
scores
url https://usn.ubuntu.com/5248-1/
fixed_packages
0
url pkg:apk/alpine/librewolf@93.0-r0?arch=loongarch64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/librewolf@93.0-r0?arch=loongarch64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/librewolf@93.0-r0%3Farch=loongarch64&distroversion=v3.23&reponame=community
aliases CVE-2021-38496
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2k99-39yt-gkbe
3
url VCID-6fkp-5fzu-fydp
vulnerability_id VCID-6fkp-5fzu-fydp
summary Mozilla developers and community members Andreas Pehrson and Christian Holler reported memory safety bugs present in Thunderbird 91.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-38500.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-38500.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-38500
reference_id
reference_type
scores
0
value 0.0109
scoring_system epss
scoring_elements 0.77972
published_at 2026-04-16T12:55:00Z
1
value 0.0109
scoring_system epss
scoring_elements 0.77937
published_at 2026-04-13T12:55:00Z
2
value 0.0109
scoring_system epss
scoring_elements 0.77938
published_at 2026-04-12T12:55:00Z
3
value 0.0149
scoring_system epss
scoring_elements 0.81001
published_at 2026-04-02T12:55:00Z
4
value 0.0149
scoring_system epss
scoring_elements 0.80992
published_at 2026-04-01T12:55:00Z
5
value 0.0149
scoring_system epss
scoring_elements 0.81025
published_at 2026-04-04T12:55:00Z
6
value 0.0149
scoring_system epss
scoring_elements 0.81023
published_at 2026-04-07T12:55:00Z
7
value 0.0149
scoring_system epss
scoring_elements 0.81051
published_at 2026-04-08T12:55:00Z
8
value 0.0149
scoring_system epss
scoring_elements 0.81058
published_at 2026-04-09T12:55:00Z
9
value 0.0149
scoring_system epss
scoring_elements 0.81076
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-38500
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38496
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38496
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38500
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38502
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38503
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38504
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38506
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38506
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38507
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38507
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38508
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38508
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38509
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38509
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4126
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4126
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4129
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4129
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43528
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43528
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43529
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43529
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43534
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43534
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43535
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43535
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43536
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43536
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43537
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43537
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43538
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43538
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43539
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43539
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43541
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43541
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43542
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43542
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43543
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43543
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43545
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43546
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44538
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44538
27
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2011100
reference_id 2011100
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2011100
28
reference_url https://security.archlinux.org/AVG-2443
reference_id AVG-2443
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2443
29
reference_url https://security.archlinux.org/AVG-2459
reference_id AVG-2459
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2459
30
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-43
reference_id mfsa2021-43
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-43
31
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-44
reference_id mfsa2021-44
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-44
32
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-45
reference_id mfsa2021-45
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-45
33
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-47
reference_id mfsa2021-47
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-47
34
reference_url https://access.redhat.com/errata/RHSA-2021:3755
reference_id RHSA-2021:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3755
35
reference_url https://access.redhat.com/errata/RHSA-2021:3756
reference_id RHSA-2021:3756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3756
36
reference_url https://access.redhat.com/errata/RHSA-2021:3757
reference_id RHSA-2021:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3757
37
reference_url https://access.redhat.com/errata/RHSA-2021:3791
reference_id RHSA-2021:3791
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3791
38
reference_url https://access.redhat.com/errata/RHSA-2021:3838
reference_id RHSA-2021:3838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3838
39
reference_url https://access.redhat.com/errata/RHSA-2021:3839
reference_id RHSA-2021:3839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3839
40
reference_url https://access.redhat.com/errata/RHSA-2021:3840
reference_id RHSA-2021:3840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3840
41
reference_url https://access.redhat.com/errata/RHSA-2021:3841
reference_id RHSA-2021:3841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3841
42
reference_url https://usn.ubuntu.com/5107-1/
reference_id USN-5107-1
reference_type
scores
url https://usn.ubuntu.com/5107-1/
43
reference_url https://usn.ubuntu.com/5132-1/
reference_id USN-5132-1
reference_type
scores
url https://usn.ubuntu.com/5132-1/
44
reference_url https://usn.ubuntu.com/5248-1/
reference_id USN-5248-1
reference_type
scores
url https://usn.ubuntu.com/5248-1/
fixed_packages
0
url pkg:apk/alpine/librewolf@93.0-r0?arch=loongarch64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/librewolf@93.0-r0?arch=loongarch64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/librewolf@93.0-r0%3Farch=loongarch64&distroversion=v3.23&reponame=community
aliases CVE-2021-38500
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6fkp-5fzu-fydp
4
url VCID-9y48-sjn7-rqeu
vulnerability_id VCID-9y48-sjn7-rqeu
summary Mozilla developers and community members Kevin Brosnan, Mihai Alexandru Michis, and Christian Holler reported memory safety bugs present in Thunderbird 91.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-38501.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-38501.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-38501
reference_id
reference_type
scores
0
value 0.00505
scoring_system epss
scoring_elements 0.66236
published_at 2026-04-16T12:55:00Z
1
value 0.00505
scoring_system epss
scoring_elements 0.66231
published_at 2026-04-12T12:55:00Z
2
value 0.00505
scoring_system epss
scoring_elements 0.662
published_at 2026-04-13T12:55:00Z
3
value 0.00673
scoring_system epss
scoring_elements 0.71341
published_at 2026-04-02T12:55:00Z
4
value 0.00673
scoring_system epss
scoring_elements 0.71334
published_at 2026-04-01T12:55:00Z
5
value 0.00673
scoring_system epss
scoring_elements 0.7136
published_at 2026-04-04T12:55:00Z
6
value 0.00673
scoring_system epss
scoring_elements 0.71333
published_at 2026-04-07T12:55:00Z
7
value 0.00673
scoring_system epss
scoring_elements 0.71374
published_at 2026-04-08T12:55:00Z
8
value 0.00673
scoring_system epss
scoring_elements 0.71387
published_at 2026-04-09T12:55:00Z
9
value 0.00673
scoring_system epss
scoring_elements 0.7141
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-38501
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2011101
reference_id 2011101
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2011101
4
reference_url https://security.archlinux.org/AVG-2443
reference_id AVG-2443
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2443
5
reference_url https://security.archlinux.org/AVG-2459
reference_id AVG-2459
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2459
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-43
reference_id mfsa2021-43
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-43
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-45
reference_id mfsa2021-45
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-45
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-47
reference_id mfsa2021-47
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-47
9
reference_url https://access.redhat.com/errata/RHSA-2021:3755
reference_id RHSA-2021:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3755
10
reference_url https://access.redhat.com/errata/RHSA-2021:3756
reference_id RHSA-2021:3756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3756
11
reference_url https://access.redhat.com/errata/RHSA-2021:3757
reference_id RHSA-2021:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3757
12
reference_url https://access.redhat.com/errata/RHSA-2021:3791
reference_id RHSA-2021:3791
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3791
13
reference_url https://access.redhat.com/errata/RHSA-2021:3838
reference_id RHSA-2021:3838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3838
14
reference_url https://access.redhat.com/errata/RHSA-2021:3839
reference_id RHSA-2021:3839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3839
15
reference_url https://access.redhat.com/errata/RHSA-2021:3840
reference_id RHSA-2021:3840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3840
16
reference_url https://access.redhat.com/errata/RHSA-2021:3841
reference_id RHSA-2021:3841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3841
17
reference_url https://usn.ubuntu.com/5107-1/
reference_id USN-5107-1
reference_type
scores
url https://usn.ubuntu.com/5107-1/
18
reference_url https://usn.ubuntu.com/5132-1/
reference_id USN-5132-1
reference_type
scores
url https://usn.ubuntu.com/5132-1/
19
reference_url https://usn.ubuntu.com/5248-1/
reference_id USN-5248-1
reference_type
scores
url https://usn.ubuntu.com/5248-1/
fixed_packages
0
url pkg:apk/alpine/librewolf@93.0-r0?arch=loongarch64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/librewolf@93.0-r0?arch=loongarch64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/librewolf@93.0-r0%3Farch=loongarch64&distroversion=v3.23&reponame=community
aliases CVE-2021-38501
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9y48-sjn7-rqeu
5
url VCID-hhu1-cgcx-nfev
vulnerability_id VCID-hhu1-cgcx-nfev
summary During process shutdown, a document could have caused a use-after-free of a languages service object, leading to memory corruption and a potentially exploitable crash.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-38498.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-38498.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-38498
reference_id
reference_type
scores
0
value 0.00272
scoring_system epss
scoring_elements 0.50665
published_at 2026-04-11T12:55:00Z
1
value 0.00272
scoring_system epss
scoring_elements 0.50623
published_at 2026-04-09T12:55:00Z
2
value 0.00272
scoring_system epss
scoring_elements 0.50536
published_at 2026-04-01T12:55:00Z
3
value 0.00272
scoring_system epss
scoring_elements 0.50626
published_at 2026-04-08T12:55:00Z
4
value 0.00272
scoring_system epss
scoring_elements 0.50572
published_at 2026-04-07T12:55:00Z
5
value 0.00272
scoring_system epss
scoring_elements 0.50592
published_at 2026-04-02T12:55:00Z
6
value 0.00272
scoring_system epss
scoring_elements 0.50619
published_at 2026-04-04T12:55:00Z
7
value 0.007
scoring_system epss
scoring_elements 0.72034
published_at 2026-04-16T12:55:00Z
8
value 0.007
scoring_system epss
scoring_elements 0.72008
published_at 2026-04-12T12:55:00Z
9
value 0.007
scoring_system epss
scoring_elements 0.71993
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-38498
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2011099
reference_id 2011099
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2011099
4
reference_url https://security.archlinux.org/AVG-2443
reference_id AVG-2443
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2443
5
reference_url https://security.archlinux.org/AVG-2459
reference_id AVG-2459
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2459
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-43
reference_id mfsa2021-43
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-43
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-45
reference_id mfsa2021-45
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-45
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-47
reference_id mfsa2021-47
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-47
9
reference_url https://access.redhat.com/errata/RHSA-2021:3755
reference_id RHSA-2021:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3755
10
reference_url https://access.redhat.com/errata/RHSA-2021:3756
reference_id RHSA-2021:3756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3756
11
reference_url https://access.redhat.com/errata/RHSA-2021:3757
reference_id RHSA-2021:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3757
12
reference_url https://access.redhat.com/errata/RHSA-2021:3791
reference_id RHSA-2021:3791
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3791
13
reference_url https://access.redhat.com/errata/RHSA-2021:3838
reference_id RHSA-2021:3838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3838
14
reference_url https://access.redhat.com/errata/RHSA-2021:3839
reference_id RHSA-2021:3839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3839
15
reference_url https://access.redhat.com/errata/RHSA-2021:3840
reference_id RHSA-2021:3840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3840
16
reference_url https://access.redhat.com/errata/RHSA-2021:3841
reference_id RHSA-2021:3841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3841
17
reference_url https://usn.ubuntu.com/5107-1/
reference_id USN-5107-1
reference_type
scores
url https://usn.ubuntu.com/5107-1/
18
reference_url https://usn.ubuntu.com/5132-1/
reference_id USN-5132-1
reference_type
scores
url https://usn.ubuntu.com/5132-1/
19
reference_url https://usn.ubuntu.com/5248-1/
reference_id USN-5248-1
reference_type
scores
url https://usn.ubuntu.com/5248-1/
fixed_packages
0
url pkg:apk/alpine/librewolf@93.0-r0?arch=loongarch64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/librewolf@93.0-r0?arch=loongarch64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/librewolf@93.0-r0%3Farch=loongarch64&distroversion=v3.23&reponame=community
aliases CVE-2021-38498
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hhu1-cgcx-nfev
6
url VCID-vtjf-sufh-p3h4
vulnerability_id VCID-vtjf-sufh-p3h4
summary
crossbeam-deque Data Race before v0.7.4 and v0.8.1
### Impact

In the affected version of this crate, the result of the race condition is that one or more tasks in the worker queue can be popped twice instead of other tasks that are forgotten and never popped. If tasks are allocated on the heap, this can cause double free and a memory leak. If not, this still can cause a logical bug.

Crates using `Stealer::steal`, `Stealer::steal_batch`, or `Stealer::steal_batch_and_pop` are affected by this issue.

### Patches

This has been fixed in crossbeam-deque 0.8.1 and 0.7.4.

### Credits

This issue was reported and fixed by Maor Kleinberger.

### License

This advisory is in the public domain.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-32810.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-32810.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-32810
reference_id
reference_type
scores
0
value 0.01079
scoring_system epss
scoring_elements 0.77787
published_at 2026-04-07T12:55:00Z
1
value 0.01079
scoring_system epss
scoring_elements 0.77847
published_at 2026-04-11T12:55:00Z
2
value 0.01079
scoring_system epss
scoring_elements 0.7782
published_at 2026-04-09T12:55:00Z
3
value 0.01079
scoring_system epss
scoring_elements 0.77815
published_at 2026-04-08T12:55:00Z
4
value 0.01079
scoring_system epss
scoring_elements 0.77804
published_at 2026-04-04T12:55:00Z
5
value 0.01079
scoring_system epss
scoring_elements 0.77777
published_at 2026-04-02T12:55:00Z
6
value 0.01079
scoring_system epss
scoring_elements 0.7777
published_at 2026-04-01T12:55:00Z
7
value 0.01094
scoring_system epss
scoring_elements 0.78013
published_at 2026-04-16T12:55:00Z
8
value 0.01094
scoring_system epss
scoring_elements 0.77979
published_at 2026-04-13T12:55:00Z
9
value 0.01094
scoring_system epss
scoring_elements 0.7798
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-32810
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32810
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32810
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/crossbeam-rs/crossbeam
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/crossbeam-rs/crossbeam
5
reference_url https://github.com/crossbeam-rs/crossbeam/security/advisories/GHSA-pqqp-xmhj-wgcw
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/crossbeam-rs/crossbeam/security/advisories/GHSA-pqqp-xmhj-wgcw
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7EZILHZDRGDPOBQ4KTW3E5PPMKLHGH5N
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7EZILHZDRGDPOBQ4KTW3E5PPMKLHGH5N
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7EZILHZDRGDPOBQ4KTW3E5PPMKLHGH5N/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7EZILHZDRGDPOBQ4KTW3E5PPMKLHGH5N/
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AWHNNBJCU4EHA2X5ZAMJMGLDUYS5FEPP
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AWHNNBJCU4EHA2X5ZAMJMGLDUYS5FEPP
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AWHNNBJCU4EHA2X5ZAMJMGLDUYS5FEPP/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AWHNNBJCU4EHA2X5ZAMJMGLDUYS5FEPP/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYBSLIYFANZLCYWOGTIYZUM26TJRH7WU
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYBSLIYFANZLCYWOGTIYZUM26TJRH7WU
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYBSLIYFANZLCYWOGTIYZUM26TJRH7WU/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYBSLIYFANZLCYWOGTIYZUM26TJRH7WU/
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CY5T3FCE4MUYSPKEWICLVJBBODGJ6SZE
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CY5T3FCE4MUYSPKEWICLVJBBODGJ6SZE
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CY5T3FCE4MUYSPKEWICLVJBBODGJ6SZE/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CY5T3FCE4MUYSPKEWICLVJBBODGJ6SZE/
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EW5B2VTDVMJ6B3DA4VLMAMW2GGDCE2BK
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EW5B2VTDVMJ6B3DA4VLMAMW2GGDCE2BK
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EW5B2VTDVMJ6B3DA4VLMAMW2GGDCE2BK/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EW5B2VTDVMJ6B3DA4VLMAMW2GGDCE2BK/
16
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LCIBFGBSL3JSVJQTNEDEIMZGZF23N2KE
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LCIBFGBSL3JSVJQTNEDEIMZGZF23N2KE
17
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LCIBFGBSL3JSVJQTNEDEIMZGZF23N2KE/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LCIBFGBSL3JSVJQTNEDEIMZGZF23N2KE/
18
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCLMH7B7B2MF55ET4NQNPH7JWISFX4RT
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCLMH7B7B2MF55ET4NQNPH7JWISFX4RT
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCLMH7B7B2MF55ET4NQNPH7JWISFX4RT/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCLMH7B7B2MF55ET4NQNPH7JWISFX4RT/
20
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RRPKBRXCRNGNMVFQPFD4LM3QKPEMBQQR
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RRPKBRXCRNGNMVFQPFD4LM3QKPEMBQQR
21
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RRPKBRXCRNGNMVFQPFD4LM3QKPEMBQQR/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RRPKBRXCRNGNMVFQPFD4LM3QKPEMBQQR/
22
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFUBWBYCPSSXTJGEAQ67CJUNQJBOCM26
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFUBWBYCPSSXTJGEAQ67CJUNQJBOCM26
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFUBWBYCPSSXTJGEAQ67CJUNQJBOCM26/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFUBWBYCPSSXTJGEAQ67CJUNQJBOCM26/
24
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3LSN3B43TJSFIOB3QLPBI3RCHRU5BLO
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3LSN3B43TJSFIOB3QLPBI3RCHRU5BLO
25
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3LSN3B43TJSFIOB3QLPBI3RCHRU5BLO/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3LSN3B43TJSFIOB3QLPBI3RCHRU5BLO/
26
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VQZIEJQBV3S72BHD5GKJQF3NVYNRV5CF
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VQZIEJQBV3S72BHD5GKJQF3NVYNRV5CF
27
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VQZIEJQBV3S72BHD5GKJQF3NVYNRV5CF/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VQZIEJQBV3S72BHD5GKJQF3NVYNRV5CF/
28
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WGB2H35CTZDHOV3VLC5BM6VFGURLLVRP
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WGB2H35CTZDHOV3VLC5BM6VFGURLLVRP
29
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WGB2H35CTZDHOV3VLC5BM6VFGURLLVRP/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WGB2H35CTZDHOV3VLC5BM6VFGURLLVRP/
30
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFBZWCLG7AGLJO4A7K5IMJVPLSWZ5TJP
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFBZWCLG7AGLJO4A7K5IMJVPLSWZ5TJP
31
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFBZWCLG7AGLJO4A7K5IMJVPLSWZ5TJP/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFBZWCLG7AGLJO4A7K5IMJVPLSWZ5TJP/
32
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQDIBB7VR3ER52FMSMNJPAWNDO5SITCE
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQDIBB7VR3ER52FMSMNJPAWNDO5SITCE
33
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQDIBB7VR3ER52FMSMNJPAWNDO5SITCE/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQDIBB7VR3ER52FMSMNJPAWNDO5SITCE/
34
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-32810
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2021-32810
35
reference_url https://rustsec.org/advisories/RUSTSEC-2021-0093.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://rustsec.org/advisories/RUSTSEC-2021-0093.html
36
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1990342
reference_id 1990342
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1990342
37
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=993146
reference_id 993146
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=993146
38
reference_url https://security.archlinux.org/AVG-2443
reference_id AVG-2443
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2443
39
reference_url https://security.archlinux.org/AVG-2459
reference_id AVG-2459
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2459
40
reference_url https://github.com/advisories/GHSA-pqqp-xmhj-wgcw
reference_id GHSA-pqqp-xmhj-wgcw
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-pqqp-xmhj-wgcw
41
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-43
reference_id mfsa2021-43
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-43
42
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-45
reference_id mfsa2021-45
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-45
43
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-47
reference_id mfsa2021-47
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-47
44
reference_url https://access.redhat.com/errata/RHSA-2021:3755
reference_id RHSA-2021:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3755
45
reference_url https://access.redhat.com/errata/RHSA-2021:3756
reference_id RHSA-2021:3756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3756
46
reference_url https://access.redhat.com/errata/RHSA-2021:3757
reference_id RHSA-2021:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3757
47
reference_url https://access.redhat.com/errata/RHSA-2021:3791
reference_id RHSA-2021:3791
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3791
48
reference_url https://access.redhat.com/errata/RHSA-2021:3838
reference_id RHSA-2021:3838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3838
49
reference_url https://access.redhat.com/errata/RHSA-2021:3839
reference_id RHSA-2021:3839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3839
50
reference_url https://access.redhat.com/errata/RHSA-2021:3840
reference_id RHSA-2021:3840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3840
51
reference_url https://access.redhat.com/errata/RHSA-2021:3841
reference_id RHSA-2021:3841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3841
52
reference_url https://usn.ubuntu.com/5107-1/
reference_id USN-5107-1
reference_type
scores
url https://usn.ubuntu.com/5107-1/
53
reference_url https://usn.ubuntu.com/5132-1/
reference_id USN-5132-1
reference_type
scores
url https://usn.ubuntu.com/5132-1/
fixed_packages
0
url pkg:apk/alpine/librewolf@93.0-r0?arch=loongarch64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/librewolf@93.0-r0?arch=loongarch64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/librewolf@93.0-r0%3Farch=loongarch64&distroversion=v3.23&reponame=community
aliases CVE-2021-32810, GHSA-pqqp-xmhj-wgcw
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vtjf-sufh-p3h4
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/librewolf@93.0-r0%3Farch=loongarch64&distroversion=v3.23&reponame=community