Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/firefox-esr@91.2.0-r0?arch=riscv64&distroversion=v3.23&reponame=community
Typeapk
Namespacealpine
Namefirefox-esr
Version91.2.0-r0
Qualifiers
arch riscv64
distroversion v3.23
reponame community
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version91.3.0-r0
Latest_non_vulnerable_version115.6.0-r0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1rj3-tt63-4yc1
vulnerability_id VCID-1rj3-tt63-4yc1
summary Through use of reportValidity() and window.open(), a plain-text validation message could have been overlaid on another origin, leading to possible user confusion and spoofing attacks.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-38497.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-38497.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-38497
reference_id
reference_type
scores
0
value 0.00197
scoring_system epss
scoring_elements 0.41705
published_at 2026-04-16T12:55:00Z
1
value 0.00197
scoring_system epss
scoring_elements 0.41672
published_at 2026-04-12T12:55:00Z
2
value 0.00197
scoring_system epss
scoring_elements 0.41657
published_at 2026-04-13T12:55:00Z
3
value 0.00198
scoring_system epss
scoring_elements 0.41896
published_at 2026-04-02T12:55:00Z
4
value 0.00198
scoring_system epss
scoring_elements 0.41831
published_at 2026-04-01T12:55:00Z
5
value 0.00198
scoring_system epss
scoring_elements 0.41924
published_at 2026-04-04T12:55:00Z
6
value 0.00198
scoring_system epss
scoring_elements 0.41851
published_at 2026-04-07T12:55:00Z
7
value 0.00198
scoring_system epss
scoring_elements 0.419
published_at 2026-04-08T12:55:00Z
8
value 0.00198
scoring_system epss
scoring_elements 0.41911
published_at 2026-04-09T12:55:00Z
9
value 0.00198
scoring_system epss
scoring_elements 0.41935
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-38497
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2011098
reference_id 2011098
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2011098
4
reference_url https://security.archlinux.org/AVG-2443
reference_id AVG-2443
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2443
5
reference_url https://security.archlinux.org/AVG-2459
reference_id AVG-2459
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2459
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-43
reference_id mfsa2021-43
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-43
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-45
reference_id mfsa2021-45
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-45
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-47
reference_id mfsa2021-47
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-47
9
reference_url https://access.redhat.com/errata/RHSA-2021:3755
reference_id RHSA-2021:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3755
10
reference_url https://access.redhat.com/errata/RHSA-2021:3756
reference_id RHSA-2021:3756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3756
11
reference_url https://access.redhat.com/errata/RHSA-2021:3757
reference_id RHSA-2021:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3757
12
reference_url https://access.redhat.com/errata/RHSA-2021:3791
reference_id RHSA-2021:3791
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3791
13
reference_url https://access.redhat.com/errata/RHSA-2021:3838
reference_id RHSA-2021:3838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3838
14
reference_url https://access.redhat.com/errata/RHSA-2021:3839
reference_id RHSA-2021:3839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3839
15
reference_url https://access.redhat.com/errata/RHSA-2021:3840
reference_id RHSA-2021:3840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3840
16
reference_url https://access.redhat.com/errata/RHSA-2021:3841
reference_id RHSA-2021:3841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3841
17
reference_url https://usn.ubuntu.com/5107-1/
reference_id USN-5107-1
reference_type
scores
url https://usn.ubuntu.com/5107-1/
18
reference_url https://usn.ubuntu.com/5132-1/
reference_id USN-5132-1
reference_type
scores
url https://usn.ubuntu.com/5132-1/
19
reference_url https://usn.ubuntu.com/5248-1/
reference_id USN-5248-1
reference_type
scores
url https://usn.ubuntu.com/5248-1/
fixed_packages
0
url pkg:apk/alpine/firefox-esr@91.2.0-r0?arch=riscv64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/firefox-esr@91.2.0-r0?arch=riscv64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@91.2.0-r0%3Farch=riscv64&distroversion=v3.23&reponame=community
aliases CVE-2021-38497
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1rj3-tt63-4yc1
1
url VCID-2k99-39yt-gkbe
vulnerability_id VCID-2k99-39yt-gkbe
summary During operations on MessageTasks, a task may have been removed while it was still scheduled, resulting in memory corruption and a potentially exploitable crash.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-38496.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-38496.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-38496
reference_id
reference_type
scores
0
value 0.0109
scoring_system epss
scoring_elements 0.77972
published_at 2026-04-16T12:55:00Z
1
value 0.0109
scoring_system epss
scoring_elements 0.77937
published_at 2026-04-13T12:55:00Z
2
value 0.0109
scoring_system epss
scoring_elements 0.77938
published_at 2026-04-12T12:55:00Z
3
value 0.0149
scoring_system epss
scoring_elements 0.81001
published_at 2026-04-02T12:55:00Z
4
value 0.0149
scoring_system epss
scoring_elements 0.80992
published_at 2026-04-01T12:55:00Z
5
value 0.0149
scoring_system epss
scoring_elements 0.81025
published_at 2026-04-04T12:55:00Z
6
value 0.0149
scoring_system epss
scoring_elements 0.81023
published_at 2026-04-07T12:55:00Z
7
value 0.0149
scoring_system epss
scoring_elements 0.81051
published_at 2026-04-08T12:55:00Z
8
value 0.0149
scoring_system epss
scoring_elements 0.81058
published_at 2026-04-09T12:55:00Z
9
value 0.0149
scoring_system epss
scoring_elements 0.81076
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-38496
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38496
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38496
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38500
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38502
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38503
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38504
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38506
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38506
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38507
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38507
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38508
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38508
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38509
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38509
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4126
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4126
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4129
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4129
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43528
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43528
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43529
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43529
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43534
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43534
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43535
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43535
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43536
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43536
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43537
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43537
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43538
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43538
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43539
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43539
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43541
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43541
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43542
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43542
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43543
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43543
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43545
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43546
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44538
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44538
27
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2011097
reference_id 2011097
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2011097
28
reference_url https://security.archlinux.org/AVG-2443
reference_id AVG-2443
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2443
29
reference_url https://security.archlinux.org/AVG-2459
reference_id AVG-2459
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2459
30
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-43
reference_id mfsa2021-43
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-43
31
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-44
reference_id mfsa2021-44
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-44
32
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-45
reference_id mfsa2021-45
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-45
33
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-47
reference_id mfsa2021-47
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-47
34
reference_url https://access.redhat.com/errata/RHSA-2021:3755
reference_id RHSA-2021:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3755
35
reference_url https://access.redhat.com/errata/RHSA-2021:3756
reference_id RHSA-2021:3756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3756
36
reference_url https://access.redhat.com/errata/RHSA-2021:3757
reference_id RHSA-2021:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3757
37
reference_url https://access.redhat.com/errata/RHSA-2021:3791
reference_id RHSA-2021:3791
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3791
38
reference_url https://access.redhat.com/errata/RHSA-2021:3838
reference_id RHSA-2021:3838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3838
39
reference_url https://access.redhat.com/errata/RHSA-2021:3839
reference_id RHSA-2021:3839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3839
40
reference_url https://access.redhat.com/errata/RHSA-2021:3840
reference_id RHSA-2021:3840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3840
41
reference_url https://access.redhat.com/errata/RHSA-2021:3841
reference_id RHSA-2021:3841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3841
42
reference_url https://usn.ubuntu.com/5107-1/
reference_id USN-5107-1
reference_type
scores
url https://usn.ubuntu.com/5107-1/
43
reference_url https://usn.ubuntu.com/5132-1/
reference_id USN-5132-1
reference_type
scores
url https://usn.ubuntu.com/5132-1/
44
reference_url https://usn.ubuntu.com/5248-1/
reference_id USN-5248-1
reference_type
scores
url https://usn.ubuntu.com/5248-1/
fixed_packages
0
url pkg:apk/alpine/firefox-esr@91.2.0-r0?arch=riscv64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/firefox-esr@91.2.0-r0?arch=riscv64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@91.2.0-r0%3Farch=riscv64&distroversion=v3.23&reponame=community
aliases CVE-2021-38496
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2k99-39yt-gkbe
2
url VCID-5qap-6r9b-6qbv
vulnerability_id VCID-5qap-6r9b-6qbv
summary Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-38493.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-38493.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-38493
reference_id
reference_type
scores
0
value 0.00418
scoring_system epss
scoring_elements 0.619
published_at 2026-04-16T12:55:00Z
1
value 0.00418
scoring_system epss
scoring_elements 0.61851
published_at 2026-04-08T12:55:00Z
2
value 0.00418
scoring_system epss
scoring_elements 0.61867
published_at 2026-04-09T12:55:00Z
3
value 0.00418
scoring_system epss
scoring_elements 0.61888
published_at 2026-04-11T12:55:00Z
4
value 0.00418
scoring_system epss
scoring_elements 0.61876
published_at 2026-04-12T12:55:00Z
5
value 0.00418
scoring_system epss
scoring_elements 0.61856
published_at 2026-04-13T12:55:00Z
6
value 0.00418
scoring_system epss
scoring_elements 0.61727
published_at 2026-04-01T12:55:00Z
7
value 0.00418
scoring_system epss
scoring_elements 0.61801
published_at 2026-04-02T12:55:00Z
8
value 0.00418
scoring_system epss
scoring_elements 0.61832
published_at 2026-04-04T12:55:00Z
9
value 0.00418
scoring_system epss
scoring_elements 0.61802
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-38493
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38493
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38493
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2002119
reference_id 2002119
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2002119
5
reference_url https://security.archlinux.org/AVG-2344
reference_id AVG-2344
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2344
6
reference_url https://security.gentoo.org/glsa/202202-03
reference_id GLSA-202202-03
reference_type
scores
url https://security.gentoo.org/glsa/202202-03
7
reference_url https://security.gentoo.org/glsa/202208-14
reference_id GLSA-202208-14
reference_type
scores
url https://security.gentoo.org/glsa/202208-14
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-38
reference_id mfsa2021-38
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-38
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-39
reference_id mfsa2021-39
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-39
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-42
reference_id mfsa2021-42
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-42
11
reference_url https://access.redhat.com/errata/RHSA-2021:3494
reference_id RHSA-2021:3494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3494
12
reference_url https://access.redhat.com/errata/RHSA-2021:3495
reference_id RHSA-2021:3495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3495
13
reference_url https://access.redhat.com/errata/RHSA-2021:3496
reference_id RHSA-2021:3496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3496
14
reference_url https://access.redhat.com/errata/RHSA-2021:3497
reference_id RHSA-2021:3497
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3497
15
reference_url https://access.redhat.com/errata/RHSA-2021:3498
reference_id RHSA-2021:3498
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3498
16
reference_url https://access.redhat.com/errata/RHSA-2021:3499
reference_id RHSA-2021:3499
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3499
17
reference_url https://access.redhat.com/errata/RHSA-2021:3500
reference_id RHSA-2021:3500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3500
18
reference_url https://access.redhat.com/errata/RHSA-2021:3501
reference_id RHSA-2021:3501
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3501
19
reference_url https://usn.ubuntu.com/5074-1/
reference_id USN-5074-1
reference_type
scores
url https://usn.ubuntu.com/5074-1/
20
reference_url https://usn.ubuntu.com/5146-1/
reference_id USN-5146-1
reference_type
scores
url https://usn.ubuntu.com/5146-1/
fixed_packages
0
url pkg:apk/alpine/firefox-esr@91.2.0-r0?arch=riscv64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/firefox-esr@91.2.0-r0?arch=riscv64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@91.2.0-r0%3Farch=riscv64&distroversion=v3.23&reponame=community
aliases CVE-2021-38493
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5qap-6r9b-6qbv
3
url VCID-6fkp-5fzu-fydp
vulnerability_id VCID-6fkp-5fzu-fydp
summary Mozilla developers and community members Andreas Pehrson and Christian Holler reported memory safety bugs present in Thunderbird 91.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-38500.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-38500.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-38500
reference_id
reference_type
scores
0
value 0.0109
scoring_system epss
scoring_elements 0.77972
published_at 2026-04-16T12:55:00Z
1
value 0.0109
scoring_system epss
scoring_elements 0.77937
published_at 2026-04-13T12:55:00Z
2
value 0.0109
scoring_system epss
scoring_elements 0.77938
published_at 2026-04-12T12:55:00Z
3
value 0.0149
scoring_system epss
scoring_elements 0.81001
published_at 2026-04-02T12:55:00Z
4
value 0.0149
scoring_system epss
scoring_elements 0.80992
published_at 2026-04-01T12:55:00Z
5
value 0.0149
scoring_system epss
scoring_elements 0.81025
published_at 2026-04-04T12:55:00Z
6
value 0.0149
scoring_system epss
scoring_elements 0.81023
published_at 2026-04-07T12:55:00Z
7
value 0.0149
scoring_system epss
scoring_elements 0.81051
published_at 2026-04-08T12:55:00Z
8
value 0.0149
scoring_system epss
scoring_elements 0.81058
published_at 2026-04-09T12:55:00Z
9
value 0.0149
scoring_system epss
scoring_elements 0.81076
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-38500
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38496
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38496
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38500
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38502
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38503
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38504
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38506
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38506
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38507
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38507
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38508
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38508
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38509
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38509
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4126
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4126
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4129
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4129
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43528
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43528
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43529
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43529
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43534
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43534
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43535
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43535
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43536
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43536
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43537
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43537
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43538
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43538
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43539
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43539
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43541
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43541
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43542
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43542
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43543
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43543
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43545
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43546
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44538
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44538
27
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2011100
reference_id 2011100
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2011100
28
reference_url https://security.archlinux.org/AVG-2443
reference_id AVG-2443
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2443
29
reference_url https://security.archlinux.org/AVG-2459
reference_id AVG-2459
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2459
30
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-43
reference_id mfsa2021-43
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-43
31
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-44
reference_id mfsa2021-44
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-44
32
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-45
reference_id mfsa2021-45
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-45
33
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-47
reference_id mfsa2021-47
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-47
34
reference_url https://access.redhat.com/errata/RHSA-2021:3755
reference_id RHSA-2021:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3755
35
reference_url https://access.redhat.com/errata/RHSA-2021:3756
reference_id RHSA-2021:3756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3756
36
reference_url https://access.redhat.com/errata/RHSA-2021:3757
reference_id RHSA-2021:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3757
37
reference_url https://access.redhat.com/errata/RHSA-2021:3791
reference_id RHSA-2021:3791
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3791
38
reference_url https://access.redhat.com/errata/RHSA-2021:3838
reference_id RHSA-2021:3838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3838
39
reference_url https://access.redhat.com/errata/RHSA-2021:3839
reference_id RHSA-2021:3839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3839
40
reference_url https://access.redhat.com/errata/RHSA-2021:3840
reference_id RHSA-2021:3840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3840
41
reference_url https://access.redhat.com/errata/RHSA-2021:3841
reference_id RHSA-2021:3841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3841
42
reference_url https://usn.ubuntu.com/5107-1/
reference_id USN-5107-1
reference_type
scores
url https://usn.ubuntu.com/5107-1/
43
reference_url https://usn.ubuntu.com/5132-1/
reference_id USN-5132-1
reference_type
scores
url https://usn.ubuntu.com/5132-1/
44
reference_url https://usn.ubuntu.com/5248-1/
reference_id USN-5248-1
reference_type
scores
url https://usn.ubuntu.com/5248-1/
fixed_packages
0
url pkg:apk/alpine/firefox-esr@91.2.0-r0?arch=riscv64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/firefox-esr@91.2.0-r0?arch=riscv64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@91.2.0-r0%3Farch=riscv64&distroversion=v3.23&reponame=community
aliases CVE-2021-38500
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6fkp-5fzu-fydp
4
url VCID-74zp-pzc4-efhm
vulnerability_id VCID-74zp-pzc4-efhm
summary Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-38495.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-38495.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-38495
reference_id
reference_type
scores
0
value 0.00548
scoring_system epss
scoring_elements 0.67928
published_at 2026-04-16T12:55:00Z
1
value 0.00548
scoring_system epss
scoring_elements 0.67916
published_at 2026-04-09T12:55:00Z
2
value 0.00548
scoring_system epss
scoring_elements 0.6794
published_at 2026-04-11T12:55:00Z
3
value 0.00548
scoring_system epss
scoring_elements 0.67926
published_at 2026-04-12T12:55:00Z
4
value 0.00548
scoring_system epss
scoring_elements 0.6789
published_at 2026-04-13T12:55:00Z
5
value 0.00548
scoring_system epss
scoring_elements 0.67828
published_at 2026-04-01T12:55:00Z
6
value 0.00548
scoring_system epss
scoring_elements 0.67852
published_at 2026-04-07T12:55:00Z
7
value 0.00548
scoring_system epss
scoring_elements 0.67872
published_at 2026-04-04T12:55:00Z
8
value 0.00548
scoring_system epss
scoring_elements 0.67902
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-38495
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2002900
reference_id 2002900
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2002900
4
reference_url https://security.archlinux.org/AVG-2291
reference_id AVG-2291
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2291
5
reference_url https://security.gentoo.org/glsa/202202-03
reference_id GLSA-202202-03
reference_type
scores
url https://security.gentoo.org/glsa/202202-03
6
reference_url https://security.gentoo.org/glsa/202208-14
reference_id GLSA-202208-14
reference_type
scores
url https://security.gentoo.org/glsa/202208-14
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-40
reference_id mfsa2021-40
reference_type
scores
0
value low
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-40
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-41
reference_id mfsa2021-41
reference_type
scores
0
value low
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-41
9
reference_url https://usn.ubuntu.com/5248-1/
reference_id USN-5248-1
reference_type
scores
url https://usn.ubuntu.com/5248-1/
fixed_packages
0
url pkg:apk/alpine/firefox-esr@91.2.0-r0?arch=riscv64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/firefox-esr@91.2.0-r0?arch=riscv64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@91.2.0-r0%3Farch=riscv64&distroversion=v3.23&reponame=community
aliases CVE-2021-38495
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-74zp-pzc4-efhm
5
url VCID-7fvy-7hpe-kbej
vulnerability_id VCID-7fvy-7hpe-kbej
summary Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-38492.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-38492.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-38492
reference_id
reference_type
scores
0
value 0.00406
scoring_system epss
scoring_elements 0.61103
published_at 2026-04-16T12:55:00Z
1
value 0.00406
scoring_system epss
scoring_elements 0.61061
published_at 2026-04-13T12:55:00Z
2
value 0.00406
scoring_system epss
scoring_elements 0.61081
published_at 2026-04-12T12:55:00Z
3
value 0.00406
scoring_system epss
scoring_elements 0.61094
published_at 2026-04-11T12:55:00Z
4
value 0.00406
scoring_system epss
scoring_elements 0.60938
published_at 2026-04-01T12:55:00Z
5
value 0.00406
scoring_system epss
scoring_elements 0.61073
published_at 2026-04-09T12:55:00Z
6
value 0.00406
scoring_system epss
scoring_elements 0.61057
published_at 2026-04-08T12:55:00Z
7
value 0.00406
scoring_system epss
scoring_elements 0.61009
published_at 2026-04-07T12:55:00Z
8
value 0.00406
scoring_system epss
scoring_elements 0.61044
published_at 2026-04-04T12:55:00Z
9
value 0.00406
scoring_system epss
scoring_elements 0.61015
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-38492
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2002118
reference_id 2002118
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2002118
4
reference_url https://security.archlinux.org/AVG-2351
reference_id AVG-2351
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2351
5
reference_url https://security.archlinux.org/AVG-2353
reference_id AVG-2353
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2353
6
reference_url https://security.gentoo.org/glsa/202208-14
reference_id GLSA-202208-14
reference_type
scores
url https://security.gentoo.org/glsa/202208-14
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-38
reference_id mfsa2021-38
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-38
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-39
reference_id mfsa2021-39
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-39
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-40
reference_id mfsa2021-40
reference_type
scores
0
value low
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-40
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-41
reference_id mfsa2021-41
reference_type
scores
0
value low
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-41
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-42
reference_id mfsa2021-42
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-42
fixed_packages
0
url pkg:apk/alpine/firefox-esr@91.2.0-r0?arch=riscv64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/firefox-esr@91.2.0-r0?arch=riscv64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@91.2.0-r0%3Farch=riscv64&distroversion=v3.23&reponame=community
aliases CVE-2021-38492
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7fvy-7hpe-kbej
6
url VCID-9y48-sjn7-rqeu
vulnerability_id VCID-9y48-sjn7-rqeu
summary Mozilla developers and community members Kevin Brosnan, Mihai Alexandru Michis, and Christian Holler reported memory safety bugs present in Thunderbird 91.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-38501.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-38501.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-38501
reference_id
reference_type
scores
0
value 0.00505
scoring_system epss
scoring_elements 0.66236
published_at 2026-04-16T12:55:00Z
1
value 0.00505
scoring_system epss
scoring_elements 0.66231
published_at 2026-04-12T12:55:00Z
2
value 0.00505
scoring_system epss
scoring_elements 0.662
published_at 2026-04-13T12:55:00Z
3
value 0.00673
scoring_system epss
scoring_elements 0.71341
published_at 2026-04-02T12:55:00Z
4
value 0.00673
scoring_system epss
scoring_elements 0.71334
published_at 2026-04-01T12:55:00Z
5
value 0.00673
scoring_system epss
scoring_elements 0.7136
published_at 2026-04-04T12:55:00Z
6
value 0.00673
scoring_system epss
scoring_elements 0.71333
published_at 2026-04-07T12:55:00Z
7
value 0.00673
scoring_system epss
scoring_elements 0.71374
published_at 2026-04-08T12:55:00Z
8
value 0.00673
scoring_system epss
scoring_elements 0.71387
published_at 2026-04-09T12:55:00Z
9
value 0.00673
scoring_system epss
scoring_elements 0.7141
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-38501
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2011101
reference_id 2011101
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2011101
4
reference_url https://security.archlinux.org/AVG-2443
reference_id AVG-2443
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2443
5
reference_url https://security.archlinux.org/AVG-2459
reference_id AVG-2459
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2459
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-43
reference_id mfsa2021-43
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-43
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-45
reference_id mfsa2021-45
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-45
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-47
reference_id mfsa2021-47
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-47
9
reference_url https://access.redhat.com/errata/RHSA-2021:3755
reference_id RHSA-2021:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3755
10
reference_url https://access.redhat.com/errata/RHSA-2021:3756
reference_id RHSA-2021:3756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3756
11
reference_url https://access.redhat.com/errata/RHSA-2021:3757
reference_id RHSA-2021:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3757
12
reference_url https://access.redhat.com/errata/RHSA-2021:3791
reference_id RHSA-2021:3791
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3791
13
reference_url https://access.redhat.com/errata/RHSA-2021:3838
reference_id RHSA-2021:3838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3838
14
reference_url https://access.redhat.com/errata/RHSA-2021:3839
reference_id RHSA-2021:3839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3839
15
reference_url https://access.redhat.com/errata/RHSA-2021:3840
reference_id RHSA-2021:3840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3840
16
reference_url https://access.redhat.com/errata/RHSA-2021:3841
reference_id RHSA-2021:3841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3841
17
reference_url https://usn.ubuntu.com/5107-1/
reference_id USN-5107-1
reference_type
scores
url https://usn.ubuntu.com/5107-1/
18
reference_url https://usn.ubuntu.com/5132-1/
reference_id USN-5132-1
reference_type
scores
url https://usn.ubuntu.com/5132-1/
19
reference_url https://usn.ubuntu.com/5248-1/
reference_id USN-5248-1
reference_type
scores
url https://usn.ubuntu.com/5248-1/
fixed_packages
0
url pkg:apk/alpine/firefox-esr@91.2.0-r0?arch=riscv64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/firefox-esr@91.2.0-r0?arch=riscv64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@91.2.0-r0%3Farch=riscv64&distroversion=v3.23&reponame=community
aliases CVE-2021-38501
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9y48-sjn7-rqeu
7
url VCID-hhu1-cgcx-nfev
vulnerability_id VCID-hhu1-cgcx-nfev
summary During process shutdown, a document could have caused a use-after-free of a languages service object, leading to memory corruption and a potentially exploitable crash.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-38498.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-38498.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-38498
reference_id
reference_type
scores
0
value 0.00272
scoring_system epss
scoring_elements 0.50665
published_at 2026-04-11T12:55:00Z
1
value 0.00272
scoring_system epss
scoring_elements 0.50623
published_at 2026-04-09T12:55:00Z
2
value 0.00272
scoring_system epss
scoring_elements 0.50536
published_at 2026-04-01T12:55:00Z
3
value 0.00272
scoring_system epss
scoring_elements 0.50626
published_at 2026-04-08T12:55:00Z
4
value 0.00272
scoring_system epss
scoring_elements 0.50572
published_at 2026-04-07T12:55:00Z
5
value 0.00272
scoring_system epss
scoring_elements 0.50592
published_at 2026-04-02T12:55:00Z
6
value 0.00272
scoring_system epss
scoring_elements 0.50619
published_at 2026-04-04T12:55:00Z
7
value 0.007
scoring_system epss
scoring_elements 0.72034
published_at 2026-04-16T12:55:00Z
8
value 0.007
scoring_system epss
scoring_elements 0.72008
published_at 2026-04-12T12:55:00Z
9
value 0.007
scoring_system epss
scoring_elements 0.71993
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-38498
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2011099
reference_id 2011099
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2011099
4
reference_url https://security.archlinux.org/AVG-2443
reference_id AVG-2443
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2443
5
reference_url https://security.archlinux.org/AVG-2459
reference_id AVG-2459
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2459
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-43
reference_id mfsa2021-43
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-43
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-45
reference_id mfsa2021-45
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-45
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-47
reference_id mfsa2021-47
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-47
9
reference_url https://access.redhat.com/errata/RHSA-2021:3755
reference_id RHSA-2021:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3755
10
reference_url https://access.redhat.com/errata/RHSA-2021:3756
reference_id RHSA-2021:3756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3756
11
reference_url https://access.redhat.com/errata/RHSA-2021:3757
reference_id RHSA-2021:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3757
12
reference_url https://access.redhat.com/errata/RHSA-2021:3791
reference_id RHSA-2021:3791
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3791
13
reference_url https://access.redhat.com/errata/RHSA-2021:3838
reference_id RHSA-2021:3838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3838
14
reference_url https://access.redhat.com/errata/RHSA-2021:3839
reference_id RHSA-2021:3839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3839
15
reference_url https://access.redhat.com/errata/RHSA-2021:3840
reference_id RHSA-2021:3840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3840
16
reference_url https://access.redhat.com/errata/RHSA-2021:3841
reference_id RHSA-2021:3841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3841
17
reference_url https://usn.ubuntu.com/5107-1/
reference_id USN-5107-1
reference_type
scores
url https://usn.ubuntu.com/5107-1/
18
reference_url https://usn.ubuntu.com/5132-1/
reference_id USN-5132-1
reference_type
scores
url https://usn.ubuntu.com/5132-1/
19
reference_url https://usn.ubuntu.com/5248-1/
reference_id USN-5248-1
reference_type
scores
url https://usn.ubuntu.com/5248-1/
fixed_packages
0
url pkg:apk/alpine/firefox-esr@91.2.0-r0?arch=riscv64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/firefox-esr@91.2.0-r0?arch=riscv64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@91.2.0-r0%3Farch=riscv64&distroversion=v3.23&reponame=community
aliases CVE-2021-38498
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hhu1-cgcx-nfev
8
url VCID-vtjf-sufh-p3h4
vulnerability_id VCID-vtjf-sufh-p3h4
summary
crossbeam-deque Data Race before v0.7.4 and v0.8.1
### Impact

In the affected version of this crate, the result of the race condition is that one or more tasks in the worker queue can be popped twice instead of other tasks that are forgotten and never popped. If tasks are allocated on the heap, this can cause double free and a memory leak. If not, this still can cause a logical bug.

Crates using `Stealer::steal`, `Stealer::steal_batch`, or `Stealer::steal_batch_and_pop` are affected by this issue.

### Patches

This has been fixed in crossbeam-deque 0.8.1 and 0.7.4.

### Credits

This issue was reported and fixed by Maor Kleinberger.

### License

This advisory is in the public domain.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-32810.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-32810.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-32810
reference_id
reference_type
scores
0
value 0.01079
scoring_system epss
scoring_elements 0.77787
published_at 2026-04-07T12:55:00Z
1
value 0.01079
scoring_system epss
scoring_elements 0.77847
published_at 2026-04-11T12:55:00Z
2
value 0.01079
scoring_system epss
scoring_elements 0.7782
published_at 2026-04-09T12:55:00Z
3
value 0.01079
scoring_system epss
scoring_elements 0.77815
published_at 2026-04-08T12:55:00Z
4
value 0.01079
scoring_system epss
scoring_elements 0.77804
published_at 2026-04-04T12:55:00Z
5
value 0.01079
scoring_system epss
scoring_elements 0.77777
published_at 2026-04-02T12:55:00Z
6
value 0.01079
scoring_system epss
scoring_elements 0.7777
published_at 2026-04-01T12:55:00Z
7
value 0.01094
scoring_system epss
scoring_elements 0.78013
published_at 2026-04-16T12:55:00Z
8
value 0.01094
scoring_system epss
scoring_elements 0.77979
published_at 2026-04-13T12:55:00Z
9
value 0.01094
scoring_system epss
scoring_elements 0.7798
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-32810
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32810
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32810
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/crossbeam-rs/crossbeam
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/crossbeam-rs/crossbeam
5
reference_url https://github.com/crossbeam-rs/crossbeam/security/advisories/GHSA-pqqp-xmhj-wgcw
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/crossbeam-rs/crossbeam/security/advisories/GHSA-pqqp-xmhj-wgcw
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7EZILHZDRGDPOBQ4KTW3E5PPMKLHGH5N
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7EZILHZDRGDPOBQ4KTW3E5PPMKLHGH5N
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7EZILHZDRGDPOBQ4KTW3E5PPMKLHGH5N/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7EZILHZDRGDPOBQ4KTW3E5PPMKLHGH5N/
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AWHNNBJCU4EHA2X5ZAMJMGLDUYS5FEPP
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AWHNNBJCU4EHA2X5ZAMJMGLDUYS5FEPP
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AWHNNBJCU4EHA2X5ZAMJMGLDUYS5FEPP/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AWHNNBJCU4EHA2X5ZAMJMGLDUYS5FEPP/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYBSLIYFANZLCYWOGTIYZUM26TJRH7WU
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYBSLIYFANZLCYWOGTIYZUM26TJRH7WU
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYBSLIYFANZLCYWOGTIYZUM26TJRH7WU/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYBSLIYFANZLCYWOGTIYZUM26TJRH7WU/
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CY5T3FCE4MUYSPKEWICLVJBBODGJ6SZE
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CY5T3FCE4MUYSPKEWICLVJBBODGJ6SZE
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CY5T3FCE4MUYSPKEWICLVJBBODGJ6SZE/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CY5T3FCE4MUYSPKEWICLVJBBODGJ6SZE/
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EW5B2VTDVMJ6B3DA4VLMAMW2GGDCE2BK
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EW5B2VTDVMJ6B3DA4VLMAMW2GGDCE2BK
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EW5B2VTDVMJ6B3DA4VLMAMW2GGDCE2BK/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EW5B2VTDVMJ6B3DA4VLMAMW2GGDCE2BK/
16
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LCIBFGBSL3JSVJQTNEDEIMZGZF23N2KE
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LCIBFGBSL3JSVJQTNEDEIMZGZF23N2KE
17
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LCIBFGBSL3JSVJQTNEDEIMZGZF23N2KE/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LCIBFGBSL3JSVJQTNEDEIMZGZF23N2KE/
18
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCLMH7B7B2MF55ET4NQNPH7JWISFX4RT
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCLMH7B7B2MF55ET4NQNPH7JWISFX4RT
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCLMH7B7B2MF55ET4NQNPH7JWISFX4RT/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCLMH7B7B2MF55ET4NQNPH7JWISFX4RT/
20
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RRPKBRXCRNGNMVFQPFD4LM3QKPEMBQQR
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RRPKBRXCRNGNMVFQPFD4LM3QKPEMBQQR
21
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RRPKBRXCRNGNMVFQPFD4LM3QKPEMBQQR/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RRPKBRXCRNGNMVFQPFD4LM3QKPEMBQQR/
22
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFUBWBYCPSSXTJGEAQ67CJUNQJBOCM26
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFUBWBYCPSSXTJGEAQ67CJUNQJBOCM26
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFUBWBYCPSSXTJGEAQ67CJUNQJBOCM26/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFUBWBYCPSSXTJGEAQ67CJUNQJBOCM26/
24
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3LSN3B43TJSFIOB3QLPBI3RCHRU5BLO
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3LSN3B43TJSFIOB3QLPBI3RCHRU5BLO
25
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3LSN3B43TJSFIOB3QLPBI3RCHRU5BLO/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3LSN3B43TJSFIOB3QLPBI3RCHRU5BLO/
26
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VQZIEJQBV3S72BHD5GKJQF3NVYNRV5CF
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VQZIEJQBV3S72BHD5GKJQF3NVYNRV5CF
27
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VQZIEJQBV3S72BHD5GKJQF3NVYNRV5CF/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VQZIEJQBV3S72BHD5GKJQF3NVYNRV5CF/
28
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WGB2H35CTZDHOV3VLC5BM6VFGURLLVRP
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WGB2H35CTZDHOV3VLC5BM6VFGURLLVRP
29
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WGB2H35CTZDHOV3VLC5BM6VFGURLLVRP/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WGB2H35CTZDHOV3VLC5BM6VFGURLLVRP/
30
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFBZWCLG7AGLJO4A7K5IMJVPLSWZ5TJP
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFBZWCLG7AGLJO4A7K5IMJVPLSWZ5TJP
31
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFBZWCLG7AGLJO4A7K5IMJVPLSWZ5TJP/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFBZWCLG7AGLJO4A7K5IMJVPLSWZ5TJP/
32
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQDIBB7VR3ER52FMSMNJPAWNDO5SITCE
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQDIBB7VR3ER52FMSMNJPAWNDO5SITCE
33
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQDIBB7VR3ER52FMSMNJPAWNDO5SITCE/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQDIBB7VR3ER52FMSMNJPAWNDO5SITCE/
34
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-32810
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2021-32810
35
reference_url https://rustsec.org/advisories/RUSTSEC-2021-0093.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://rustsec.org/advisories/RUSTSEC-2021-0093.html
36
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1990342
reference_id 1990342
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1990342
37
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=993146
reference_id 993146
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=993146
38
reference_url https://security.archlinux.org/AVG-2443
reference_id AVG-2443
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2443
39
reference_url https://security.archlinux.org/AVG-2459
reference_id AVG-2459
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2459
40
reference_url https://github.com/advisories/GHSA-pqqp-xmhj-wgcw
reference_id GHSA-pqqp-xmhj-wgcw
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-pqqp-xmhj-wgcw
41
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-43
reference_id mfsa2021-43
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-43
42
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-45
reference_id mfsa2021-45
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-45
43
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-47
reference_id mfsa2021-47
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-47
44
reference_url https://access.redhat.com/errata/RHSA-2021:3755
reference_id RHSA-2021:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3755
45
reference_url https://access.redhat.com/errata/RHSA-2021:3756
reference_id RHSA-2021:3756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3756
46
reference_url https://access.redhat.com/errata/RHSA-2021:3757
reference_id RHSA-2021:3757
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3757
47
reference_url https://access.redhat.com/errata/RHSA-2021:3791
reference_id RHSA-2021:3791
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3791
48
reference_url https://access.redhat.com/errata/RHSA-2021:3838
reference_id RHSA-2021:3838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3838
49
reference_url https://access.redhat.com/errata/RHSA-2021:3839
reference_id RHSA-2021:3839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3839
50
reference_url https://access.redhat.com/errata/RHSA-2021:3840
reference_id RHSA-2021:3840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3840
51
reference_url https://access.redhat.com/errata/RHSA-2021:3841
reference_id RHSA-2021:3841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3841
52
reference_url https://usn.ubuntu.com/5107-1/
reference_id USN-5107-1
reference_type
scores
url https://usn.ubuntu.com/5107-1/
53
reference_url https://usn.ubuntu.com/5132-1/
reference_id USN-5132-1
reference_type
scores
url https://usn.ubuntu.com/5132-1/
fixed_packages
0
url pkg:apk/alpine/firefox-esr@91.2.0-r0?arch=riscv64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/firefox-esr@91.2.0-r0?arch=riscv64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@91.2.0-r0%3Farch=riscv64&distroversion=v3.23&reponame=community
aliases CVE-2021-32810, GHSA-pqqp-xmhj-wgcw
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vtjf-sufh-p3h4
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@91.2.0-r0%3Farch=riscv64&distroversion=v3.23&reponame=community