Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/firefox@88.0-r0?arch=s390x&distroversion=v3.13&reponame=community
Typeapk
Namespacealpine
Namefirefox
Version88.0-r0
Qualifiers
arch s390x
distroversion v3.13
reponame community
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version88.0.1-r0
Latest_non_vulnerable_version89.0-r0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1e61-jk2b-aubw
vulnerability_id VCID-1e61-jk2b-aubw
summary
Multiple vulnerabilities have been found in Mozilla Firefox, the
    worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23994.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23994.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-23994
reference_id
reference_type
scores
0
value 0.00348
scoring_system epss
scoring_elements 0.57347
published_at 2026-04-13T12:55:00Z
1
value 0.00348
scoring_system epss
scoring_elements 0.57368
published_at 2026-04-18T12:55:00Z
2
value 0.00348
scoring_system epss
scoring_elements 0.57238
published_at 2026-04-01T12:55:00Z
3
value 0.00348
scoring_system epss
scoring_elements 0.57388
published_at 2026-04-11T12:55:00Z
4
value 0.00348
scoring_system epss
scoring_elements 0.57373
published_at 2026-04-16T12:55:00Z
5
value 0.00348
scoring_system epss
scoring_elements 0.57371
published_at 2026-04-08T12:55:00Z
6
value 0.00348
scoring_system epss
scoring_elements 0.57344
published_at 2026-04-04T12:55:00Z
7
value 0.00348
scoring_system epss
scoring_elements 0.5732
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-23994
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23961
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23961
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23991
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23991
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23992
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23992
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23993
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23993
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23994
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23995
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23995
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23998
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23998
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23999
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23999
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24002
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29945
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29946
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29948
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29948
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29949
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29949
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1951364
reference_id 1951364
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1951364
17
reference_url https://security.archlinux.org/ASA-202104-3
reference_id ASA-202104-3
reference_type
scores
url https://security.archlinux.org/ASA-202104-3
18
reference_url https://security.archlinux.org/ASA-202104-4
reference_id ASA-202104-4
reference_type
scores
url https://security.archlinux.org/ASA-202104-4
19
reference_url https://security.archlinux.org/AVG-1834
reference_id AVG-1834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1834
20
reference_url https://security.archlinux.org/AVG-1836
reference_id AVG-1836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1836
21
reference_url https://security.gentoo.org/glsa/202104-09
reference_id GLSA-202104-09
reference_type
scores
url https://security.gentoo.org/glsa/202104-09
22
reference_url https://security.gentoo.org/glsa/202104-10
reference_id GLSA-202104-10
reference_type
scores
url https://security.gentoo.org/glsa/202104-10
23
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-14
reference_id mfsa2021-14
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-14
24
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-15
reference_id mfsa2021-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-15
25
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-16
reference_id mfsa2021-16
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-16
26
reference_url https://access.redhat.com/errata/RHSA-2021:1350
reference_id RHSA-2021:1350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1350
27
reference_url https://access.redhat.com/errata/RHSA-2021:1351
reference_id RHSA-2021:1351
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1351
28
reference_url https://access.redhat.com/errata/RHSA-2021:1352
reference_id RHSA-2021:1352
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1352
29
reference_url https://access.redhat.com/errata/RHSA-2021:1353
reference_id RHSA-2021:1353
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1353
30
reference_url https://access.redhat.com/errata/RHSA-2021:1360
reference_id RHSA-2021:1360
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1360
31
reference_url https://access.redhat.com/errata/RHSA-2021:1361
reference_id RHSA-2021:1361
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1361
32
reference_url https://access.redhat.com/errata/RHSA-2021:1362
reference_id RHSA-2021:1362
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1362
33
reference_url https://access.redhat.com/errata/RHSA-2021:1363
reference_id RHSA-2021:1363
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1363
34
reference_url https://usn.ubuntu.com/4926-1/
reference_id USN-4926-1
reference_type
scores
url https://usn.ubuntu.com/4926-1/
35
reference_url https://usn.ubuntu.com/4995-1/
reference_id USN-4995-1
reference_type
scores
url https://usn.ubuntu.com/4995-1/
36
reference_url https://usn.ubuntu.com/4995-2/
reference_id USN-4995-2
reference_type
scores
url https://usn.ubuntu.com/4995-2/
fixed_packages
0
url pkg:apk/alpine/firefox@88.0-r0?arch=s390x&distroversion=v3.13&reponame=community
purl pkg:apk/alpine/firefox@88.0-r0?arch=s390x&distroversion=v3.13&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@88.0-r0%3Farch=s390x&distroversion=v3.13&reponame=community
aliases CVE-2021-23994
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1e61-jk2b-aubw
1
url VCID-2cd3-m37k-5ydh
vulnerability_id VCID-2cd3-m37k-5ydh
summary
Multiple vulnerabilities have been found in Mozilla Firefox, the
    worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29946.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29946.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-29946
reference_id
reference_type
scores
0
value 0.00163
scoring_system epss
scoring_elements 0.37272
published_at 2026-04-18T12:55:00Z
1
value 0.00163
scoring_system epss
scoring_elements 0.37279
published_at 2026-04-08T12:55:00Z
2
value 0.00163
scoring_system epss
scoring_elements 0.37293
published_at 2026-04-09T12:55:00Z
3
value 0.00163
scoring_system epss
scoring_elements 0.37304
published_at 2026-04-11T12:55:00Z
4
value 0.00163
scoring_system epss
scoring_elements 0.3727
published_at 2026-04-12T12:55:00Z
5
value 0.00163
scoring_system epss
scoring_elements 0.37243
published_at 2026-04-13T12:55:00Z
6
value 0.00163
scoring_system epss
scoring_elements 0.37289
published_at 2026-04-16T12:55:00Z
7
value 0.00163
scoring_system epss
scoring_elements 0.37207
published_at 2026-04-01T12:55:00Z
8
value 0.00163
scoring_system epss
scoring_elements 0.37374
published_at 2026-04-02T12:55:00Z
9
value 0.00163
scoring_system epss
scoring_elements 0.374
published_at 2026-04-04T12:55:00Z
10
value 0.00163
scoring_system epss
scoring_elements 0.37228
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-29946
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23961
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23961
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23991
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23991
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23992
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23992
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23993
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23993
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23994
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23995
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23995
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23998
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23998
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23999
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23999
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24002
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29945
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29946
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29948
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29948
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29949
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29949
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1951371
reference_id 1951371
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1951371
17
reference_url https://security.archlinux.org/ASA-202104-3
reference_id ASA-202104-3
reference_type
scores
url https://security.archlinux.org/ASA-202104-3
18
reference_url https://security.archlinux.org/ASA-202104-4
reference_id ASA-202104-4
reference_type
scores
url https://security.archlinux.org/ASA-202104-4
19
reference_url https://security.archlinux.org/AVG-1834
reference_id AVG-1834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1834
20
reference_url https://security.archlinux.org/AVG-1836
reference_id AVG-1836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1836
21
reference_url https://security.gentoo.org/glsa/202104-09
reference_id GLSA-202104-09
reference_type
scores
url https://security.gentoo.org/glsa/202104-09
22
reference_url https://security.gentoo.org/glsa/202104-10
reference_id GLSA-202104-10
reference_type
scores
url https://security.gentoo.org/glsa/202104-10
23
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-14
reference_id mfsa2021-14
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-14
24
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-15
reference_id mfsa2021-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-15
25
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-16
reference_id mfsa2021-16
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-16
26
reference_url https://access.redhat.com/errata/RHSA-2021:1350
reference_id RHSA-2021:1350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1350
27
reference_url https://access.redhat.com/errata/RHSA-2021:1351
reference_id RHSA-2021:1351
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1351
28
reference_url https://access.redhat.com/errata/RHSA-2021:1352
reference_id RHSA-2021:1352
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1352
29
reference_url https://access.redhat.com/errata/RHSA-2021:1353
reference_id RHSA-2021:1353
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1353
30
reference_url https://access.redhat.com/errata/RHSA-2021:1360
reference_id RHSA-2021:1360
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1360
31
reference_url https://access.redhat.com/errata/RHSA-2021:1361
reference_id RHSA-2021:1361
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1361
32
reference_url https://access.redhat.com/errata/RHSA-2021:1362
reference_id RHSA-2021:1362
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1362
33
reference_url https://access.redhat.com/errata/RHSA-2021:1363
reference_id RHSA-2021:1363
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1363
34
reference_url https://usn.ubuntu.com/4926-1/
reference_id USN-4926-1
reference_type
scores
url https://usn.ubuntu.com/4926-1/
35
reference_url https://usn.ubuntu.com/4995-1/
reference_id USN-4995-1
reference_type
scores
url https://usn.ubuntu.com/4995-1/
36
reference_url https://usn.ubuntu.com/4995-2/
reference_id USN-4995-2
reference_type
scores
url https://usn.ubuntu.com/4995-2/
fixed_packages
0
url pkg:apk/alpine/firefox@88.0-r0?arch=s390x&distroversion=v3.13&reponame=community
purl pkg:apk/alpine/firefox@88.0-r0?arch=s390x&distroversion=v3.13&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@88.0-r0%3Farch=s390x&distroversion=v3.13&reponame=community
aliases CVE-2021-29946
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2cd3-m37k-5ydh
2
url VCID-2vdu-1jvt-5uf3
vulnerability_id VCID-2vdu-1jvt-5uf3
summary Lack of escaping allowed HTML injection when a webpage was viewed in Reader View. While a Content Security Policy prevents direct code execution, HTML injection is still possible.*Note: This issue only affected Firefox for Android. Other operating systems are unaffected.*
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-29944
reference_id
reference_type
scores
0
value 0.00377
scoring_system epss
scoring_elements 0.59353
published_at 2026-04-18T12:55:00Z
1
value 0.00377
scoring_system epss
scoring_elements 0.59204
published_at 2026-04-01T12:55:00Z
2
value 0.00377
scoring_system epss
scoring_elements 0.59314
published_at 2026-04-13T12:55:00Z
3
value 0.00377
scoring_system epss
scoring_elements 0.59347
published_at 2026-04-16T12:55:00Z
4
value 0.00377
scoring_system epss
scoring_elements 0.59278
published_at 2026-04-02T12:55:00Z
5
value 0.00377
scoring_system epss
scoring_elements 0.59301
published_at 2026-04-04T12:55:00Z
6
value 0.00377
scoring_system epss
scoring_elements 0.59265
published_at 2026-04-07T12:55:00Z
7
value 0.00377
scoring_system epss
scoring_elements 0.59316
published_at 2026-04-08T12:55:00Z
8
value 0.00377
scoring_system epss
scoring_elements 0.59329
published_at 2026-04-09T12:55:00Z
9
value 0.00377
scoring_system epss
scoring_elements 0.59348
published_at 2026-04-11T12:55:00Z
10
value 0.00377
scoring_system epss
scoring_elements 0.59331
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-29944
1
reference_url https://security.archlinux.org/AVG-1835
reference_id AVG-1835
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1835
2
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-16
reference_id mfsa2021-16
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-16
fixed_packages
0
url pkg:apk/alpine/firefox@88.0-r0?arch=s390x&distroversion=v3.13&reponame=community
purl pkg:apk/alpine/firefox@88.0-r0?arch=s390x&distroversion=v3.13&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@88.0-r0%3Farch=s390x&distroversion=v3.13&reponame=community
aliases CVE-2021-29944
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2vdu-1jvt-5uf3
3
url VCID-7ddz-65jt-pudk
vulnerability_id VCID-7ddz-65jt-pudk
summary Due to unexpected data type conversions, a use-after-free could have occurred when interacting with the font cache. We presume that with enough effort this could have been exploited to run arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-23997
reference_id
reference_type
scores
0
value 0.00204
scoring_system epss
scoring_elements 0.42584
published_at 2026-04-18T12:55:00Z
1
value 0.00204
scoring_system epss
scoring_elements 0.42483
published_at 2026-04-01T12:55:00Z
2
value 0.00204
scoring_system epss
scoring_elements 0.42567
published_at 2026-04-12T12:55:00Z
3
value 0.00204
scoring_system epss
scoring_elements 0.42539
published_at 2026-04-13T12:55:00Z
4
value 0.00204
scoring_system epss
scoring_elements 0.42599
published_at 2026-04-16T12:55:00Z
5
value 0.00204
scoring_system epss
scoring_elements 0.42554
published_at 2026-04-02T12:55:00Z
6
value 0.00204
scoring_system epss
scoring_elements 0.42583
published_at 2026-04-04T12:55:00Z
7
value 0.00204
scoring_system epss
scoring_elements 0.42521
published_at 2026-04-07T12:55:00Z
8
value 0.00204
scoring_system epss
scoring_elements 0.42573
published_at 2026-04-08T12:55:00Z
9
value 0.00204
scoring_system epss
scoring_elements 0.42582
published_at 2026-04-09T12:55:00Z
10
value 0.00204
scoring_system epss
scoring_elements 0.42604
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-23997
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://security.archlinux.org/ASA-202104-3
reference_id ASA-202104-3
reference_type
scores
url https://security.archlinux.org/ASA-202104-3
3
reference_url https://security.archlinux.org/AVG-1834
reference_id AVG-1834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1834
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-16
reference_id mfsa2021-16
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-16
5
reference_url https://usn.ubuntu.com/4926-1/
reference_id USN-4926-1
reference_type
scores
url https://usn.ubuntu.com/4926-1/
fixed_packages
0
url pkg:apk/alpine/firefox@88.0-r0?arch=s390x&distroversion=v3.13&reponame=community
purl pkg:apk/alpine/firefox@88.0-r0?arch=s390x&distroversion=v3.13&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@88.0-r0%3Farch=s390x&distroversion=v3.13&reponame=community
aliases CVE-2021-23997
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7ddz-65jt-pudk
4
url VCID-8jkx-ad5d-e7cd
vulnerability_id VCID-8jkx-ad5d-e7cd
summary A compromised content process could have performed session history manipulations it should not have been able to due to testing infrastructure that was not restricted to testing-only configurations.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-24001
reference_id
reference_type
scores
0
value 0.0027
scoring_system epss
scoring_elements 0.50551
published_at 2026-04-18T12:55:00Z
1
value 0.0027
scoring_system epss
scoring_elements 0.5041
published_at 2026-04-01T12:55:00Z
2
value 0.0027
scoring_system epss
scoring_elements 0.50503
published_at 2026-04-13T12:55:00Z
3
value 0.0027
scoring_system epss
scoring_elements 0.50546
published_at 2026-04-16T12:55:00Z
4
value 0.0027
scoring_system epss
scoring_elements 0.50466
published_at 2026-04-02T12:55:00Z
5
value 0.0027
scoring_system epss
scoring_elements 0.50494
published_at 2026-04-04T12:55:00Z
6
value 0.0027
scoring_system epss
scoring_elements 0.50448
published_at 2026-04-07T12:55:00Z
7
value 0.0027
scoring_system epss
scoring_elements 0.50502
published_at 2026-04-08T12:55:00Z
8
value 0.0027
scoring_system epss
scoring_elements 0.50499
published_at 2026-04-09T12:55:00Z
9
value 0.0027
scoring_system epss
scoring_elements 0.50541
published_at 2026-04-11T12:55:00Z
10
value 0.0027
scoring_system epss
scoring_elements 0.50518
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-24001
1
reference_url https://security.archlinux.org/ASA-202104-3
reference_id ASA-202104-3
reference_type
scores
url https://security.archlinux.org/ASA-202104-3
2
reference_url https://security.archlinux.org/AVG-1834
reference_id AVG-1834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1834
3
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-16
reference_id mfsa2021-16
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-16
4
reference_url https://usn.ubuntu.com/4926-1/
reference_id USN-4926-1
reference_type
scores
url https://usn.ubuntu.com/4926-1/
fixed_packages
0
url pkg:apk/alpine/firefox@88.0-r0?arch=s390x&distroversion=v3.13&reponame=community
purl pkg:apk/alpine/firefox@88.0-r0?arch=s390x&distroversion=v3.13&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@88.0-r0%3Farch=s390x&distroversion=v3.13&reponame=community
aliases CVE-2021-24001
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8jkx-ad5d-e7cd
5
url VCID-e38r-grgp-rfbn
vulnerability_id VCID-e38r-grgp-rfbn
summary
Multiple vulnerabilities have been found in Mozilla Firefox, the
    worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23998.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23998.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-23998
reference_id
reference_type
scores
0
value 0.00163
scoring_system epss
scoring_elements 0.37275
published_at 2026-04-16T12:55:00Z
1
value 0.00163
scoring_system epss
scoring_elements 0.37215
published_at 2026-04-07T12:55:00Z
2
value 0.00163
scoring_system epss
scoring_elements 0.37267
published_at 2026-04-08T12:55:00Z
3
value 0.00163
scoring_system epss
scoring_elements 0.3728
published_at 2026-04-09T12:55:00Z
4
value 0.00163
scoring_system epss
scoring_elements 0.37291
published_at 2026-04-11T12:55:00Z
5
value 0.00163
scoring_system epss
scoring_elements 0.37257
published_at 2026-04-18T12:55:00Z
6
value 0.00163
scoring_system epss
scoring_elements 0.37229
published_at 2026-04-13T12:55:00Z
7
value 0.00163
scoring_system epss
scoring_elements 0.37195
published_at 2026-04-01T12:55:00Z
8
value 0.00163
scoring_system epss
scoring_elements 0.37361
published_at 2026-04-02T12:55:00Z
9
value 0.00163
scoring_system epss
scoring_elements 0.37387
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-23998
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23961
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23961
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23991
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23991
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23992
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23992
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23993
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23993
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23994
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23995
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23995
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23998
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23998
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23999
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23999
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24002
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29945
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29946
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29948
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29948
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29949
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29949
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1951366
reference_id 1951366
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1951366
17
reference_url https://security.archlinux.org/ASA-202104-3
reference_id ASA-202104-3
reference_type
scores
url https://security.archlinux.org/ASA-202104-3
18
reference_url https://security.archlinux.org/ASA-202104-4
reference_id ASA-202104-4
reference_type
scores
url https://security.archlinux.org/ASA-202104-4
19
reference_url https://security.archlinux.org/AVG-1834
reference_id AVG-1834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1834
20
reference_url https://security.archlinux.org/AVG-1836
reference_id AVG-1836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1836
21
reference_url https://security.gentoo.org/glsa/202104-09
reference_id GLSA-202104-09
reference_type
scores
url https://security.gentoo.org/glsa/202104-09
22
reference_url https://security.gentoo.org/glsa/202104-10
reference_id GLSA-202104-10
reference_type
scores
url https://security.gentoo.org/glsa/202104-10
23
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-14
reference_id mfsa2021-14
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-14
24
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-15
reference_id mfsa2021-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-15
25
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-16
reference_id mfsa2021-16
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-16
26
reference_url https://access.redhat.com/errata/RHSA-2021:1350
reference_id RHSA-2021:1350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1350
27
reference_url https://access.redhat.com/errata/RHSA-2021:1351
reference_id RHSA-2021:1351
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1351
28
reference_url https://access.redhat.com/errata/RHSA-2021:1352
reference_id RHSA-2021:1352
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1352
29
reference_url https://access.redhat.com/errata/RHSA-2021:1353
reference_id RHSA-2021:1353
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1353
30
reference_url https://access.redhat.com/errata/RHSA-2021:1360
reference_id RHSA-2021:1360
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1360
31
reference_url https://access.redhat.com/errata/RHSA-2021:1361
reference_id RHSA-2021:1361
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1361
32
reference_url https://access.redhat.com/errata/RHSA-2021:1362
reference_id RHSA-2021:1362
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1362
33
reference_url https://access.redhat.com/errata/RHSA-2021:1363
reference_id RHSA-2021:1363
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1363
34
reference_url https://usn.ubuntu.com/4926-1/
reference_id USN-4926-1
reference_type
scores
url https://usn.ubuntu.com/4926-1/
35
reference_url https://usn.ubuntu.com/4995-1/
reference_id USN-4995-1
reference_type
scores
url https://usn.ubuntu.com/4995-1/
36
reference_url https://usn.ubuntu.com/4995-2/
reference_id USN-4995-2
reference_type
scores
url https://usn.ubuntu.com/4995-2/
fixed_packages
0
url pkg:apk/alpine/firefox@88.0-r0?arch=s390x&distroversion=v3.13&reponame=community
purl pkg:apk/alpine/firefox@88.0-r0?arch=s390x&distroversion=v3.13&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@88.0-r0%3Farch=s390x&distroversion=v3.13&reponame=community
aliases CVE-2021-23998
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e38r-grgp-rfbn
6
url VCID-e6xd-fmsu-jkgn
vulnerability_id VCID-e6xd-fmsu-jkgn
summary A race condition with requestPointerLock() and setTimeout() could have resulted in a user interacting with one tab when they believed they were on a separate tab. In conjunction with certain elements (such as <input type="file">) this could have led to an attack where a user was confused about the origin of the webpage and potentially disclosed information they did not intend to.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-24000
reference_id
reference_type
scores
0
value 0.00234
scoring_system epss
scoring_elements 0.46309
published_at 2026-04-18T12:55:00Z
1
value 0.00234
scoring_system epss
scoring_elements 0.46184
published_at 2026-04-01T12:55:00Z
2
value 0.00234
scoring_system epss
scoring_elements 0.46246
published_at 2026-04-12T12:55:00Z
3
value 0.00234
scoring_system epss
scoring_elements 0.46256
published_at 2026-04-13T12:55:00Z
4
value 0.00234
scoring_system epss
scoring_elements 0.46313
published_at 2026-04-16T12:55:00Z
5
value 0.00234
scoring_system epss
scoring_elements 0.46226
published_at 2026-04-02T12:55:00Z
6
value 0.00234
scoring_system epss
scoring_elements 0.46245
published_at 2026-04-04T12:55:00Z
7
value 0.00234
scoring_system epss
scoring_elements 0.46193
published_at 2026-04-07T12:55:00Z
8
value 0.00234
scoring_system epss
scoring_elements 0.46249
published_at 2026-04-08T12:55:00Z
9
value 0.00234
scoring_system epss
scoring_elements 0.46251
published_at 2026-04-09T12:55:00Z
10
value 0.00234
scoring_system epss
scoring_elements 0.46274
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-24000
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://security.archlinux.org/ASA-202104-3
reference_id ASA-202104-3
reference_type
scores
url https://security.archlinux.org/ASA-202104-3
3
reference_url https://security.archlinux.org/AVG-1834
reference_id AVG-1834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1834
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-16
reference_id mfsa2021-16
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-16
5
reference_url https://usn.ubuntu.com/4926-1/
reference_id USN-4926-1
reference_type
scores
url https://usn.ubuntu.com/4926-1/
fixed_packages
0
url pkg:apk/alpine/firefox@88.0-r0?arch=s390x&distroversion=v3.13&reponame=community
purl pkg:apk/alpine/firefox@88.0-r0?arch=s390x&distroversion=v3.13&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@88.0-r0%3Farch=s390x&distroversion=v3.13&reponame=community
aliases CVE-2021-24000
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e6xd-fmsu-jkgn
7
url VCID-ebus-cbbm-u3dn
vulnerability_id VCID-ebus-cbbm-u3dn
summary Mozilla developers and community members Ryan VanderMeulen, Sean Feng, Tyson Smith, Julian Seward, Christian Holler reported memory safety bugs present in Firefox 87. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-29947
reference_id
reference_type
scores
0
value 0.00348
scoring_system epss
scoring_elements 0.57367
published_at 2026-04-18T12:55:00Z
1
value 0.00348
scoring_system epss
scoring_elements 0.57236
published_at 2026-04-01T12:55:00Z
2
value 0.00348
scoring_system epss
scoring_elements 0.57366
published_at 2026-04-12T12:55:00Z
3
value 0.00348
scoring_system epss
scoring_elements 0.57345
published_at 2026-04-13T12:55:00Z
4
value 0.00348
scoring_system epss
scoring_elements 0.57372
published_at 2026-04-16T12:55:00Z
5
value 0.00348
scoring_system epss
scoring_elements 0.57318
published_at 2026-04-07T12:55:00Z
6
value 0.00348
scoring_system epss
scoring_elements 0.57341
published_at 2026-04-04T12:55:00Z
7
value 0.00348
scoring_system epss
scoring_elements 0.57369
published_at 2026-04-08T12:55:00Z
8
value 0.00348
scoring_system epss
scoring_elements 0.57371
published_at 2026-04-09T12:55:00Z
9
value 0.00348
scoring_system epss
scoring_elements 0.57386
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-29947
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://security.archlinux.org/ASA-202104-3
reference_id ASA-202104-3
reference_type
scores
url https://security.archlinux.org/ASA-202104-3
3
reference_url https://security.archlinux.org/AVG-1834
reference_id AVG-1834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1834
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-16
reference_id mfsa2021-16
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-16
5
reference_url https://usn.ubuntu.com/4926-1/
reference_id USN-4926-1
reference_type
scores
url https://usn.ubuntu.com/4926-1/
fixed_packages
0
url pkg:apk/alpine/firefox@88.0-r0?arch=s390x&distroversion=v3.13&reponame=community
purl pkg:apk/alpine/firefox@88.0-r0?arch=s390x&distroversion=v3.13&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@88.0-r0%3Farch=s390x&distroversion=v3.13&reponame=community
aliases CVE-2021-29947
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ebus-cbbm-u3dn
8
url VCID-qq5h-5k45-rycm
vulnerability_id VCID-qq5h-5k45-rycm
summary
Multiple vulnerabilities have been found in Mozilla Firefox, the
    worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23995.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23995.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-23995
reference_id
reference_type
scores
0
value 0.01035
scoring_system epss
scoring_elements 0.7742
published_at 2026-04-18T12:55:00Z
1
value 0.01035
scoring_system epss
scoring_elements 0.77337
published_at 2026-04-07T12:55:00Z
2
value 0.01035
scoring_system epss
scoring_elements 0.77368
published_at 2026-04-08T12:55:00Z
3
value 0.01035
scoring_system epss
scoring_elements 0.77377
published_at 2026-04-09T12:55:00Z
4
value 0.01035
scoring_system epss
scoring_elements 0.77404
published_at 2026-04-11T12:55:00Z
5
value 0.01035
scoring_system epss
scoring_elements 0.77383
published_at 2026-04-12T12:55:00Z
6
value 0.01035
scoring_system epss
scoring_elements 0.7738
published_at 2026-04-13T12:55:00Z
7
value 0.01035
scoring_system epss
scoring_elements 0.77322
published_at 2026-04-01T12:55:00Z
8
value 0.01035
scoring_system epss
scoring_elements 0.77328
published_at 2026-04-02T12:55:00Z
9
value 0.01035
scoring_system epss
scoring_elements 0.77357
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-23995
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23961
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23961
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23991
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23991
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23992
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23992
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23993
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23993
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23994
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23995
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23995
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23998
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23998
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23999
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23999
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24002
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29945
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29946
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29948
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29948
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29949
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29949
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1951365
reference_id 1951365
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1951365
17
reference_url https://security.archlinux.org/ASA-202104-3
reference_id ASA-202104-3
reference_type
scores
url https://security.archlinux.org/ASA-202104-3
18
reference_url https://security.archlinux.org/ASA-202104-4
reference_id ASA-202104-4
reference_type
scores
url https://security.archlinux.org/ASA-202104-4
19
reference_url https://security.archlinux.org/AVG-1834
reference_id AVG-1834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1834
20
reference_url https://security.archlinux.org/AVG-1836
reference_id AVG-1836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1836
21
reference_url https://security.gentoo.org/glsa/202104-09
reference_id GLSA-202104-09
reference_type
scores
url https://security.gentoo.org/glsa/202104-09
22
reference_url https://security.gentoo.org/glsa/202104-10
reference_id GLSA-202104-10
reference_type
scores
url https://security.gentoo.org/glsa/202104-10
23
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-14
reference_id mfsa2021-14
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-14
24
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-15
reference_id mfsa2021-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-15
25
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-16
reference_id mfsa2021-16
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-16
26
reference_url https://access.redhat.com/errata/RHSA-2021:1350
reference_id RHSA-2021:1350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1350
27
reference_url https://access.redhat.com/errata/RHSA-2021:1351
reference_id RHSA-2021:1351
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1351
28
reference_url https://access.redhat.com/errata/RHSA-2021:1352
reference_id RHSA-2021:1352
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1352
29
reference_url https://access.redhat.com/errata/RHSA-2021:1353
reference_id RHSA-2021:1353
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1353
30
reference_url https://access.redhat.com/errata/RHSA-2021:1360
reference_id RHSA-2021:1360
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1360
31
reference_url https://access.redhat.com/errata/RHSA-2021:1361
reference_id RHSA-2021:1361
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1361
32
reference_url https://access.redhat.com/errata/RHSA-2021:1362
reference_id RHSA-2021:1362
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1362
33
reference_url https://access.redhat.com/errata/RHSA-2021:1363
reference_id RHSA-2021:1363
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1363
34
reference_url https://usn.ubuntu.com/4926-1/
reference_id USN-4926-1
reference_type
scores
url https://usn.ubuntu.com/4926-1/
35
reference_url https://usn.ubuntu.com/4995-1/
reference_id USN-4995-1
reference_type
scores
url https://usn.ubuntu.com/4995-1/
36
reference_url https://usn.ubuntu.com/4995-2/
reference_id USN-4995-2
reference_type
scores
url https://usn.ubuntu.com/4995-2/
fixed_packages
0
url pkg:apk/alpine/firefox@88.0-r0?arch=s390x&distroversion=v3.13&reponame=community
purl pkg:apk/alpine/firefox@88.0-r0?arch=s390x&distroversion=v3.13&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@88.0-r0%3Farch=s390x&distroversion=v3.13&reponame=community
aliases CVE-2021-23995
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qq5h-5k45-rycm
9
url VCID-rmzq-gwbe-qyba
vulnerability_id VCID-rmzq-gwbe-qyba
summary By utilizing 3D CSS in conjunction with Javascript, content could have been rendered outside the webpage's viewport, resulting in a spoofing attack that could have been used for phishing or other attacks on a user.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-23996
reference_id
reference_type
scores
0
value 0.0027
scoring_system epss
scoring_elements 0.50551
published_at 2026-04-18T12:55:00Z
1
value 0.0027
scoring_system epss
scoring_elements 0.5041
published_at 2026-04-01T12:55:00Z
2
value 0.0027
scoring_system epss
scoring_elements 0.50503
published_at 2026-04-13T12:55:00Z
3
value 0.0027
scoring_system epss
scoring_elements 0.50546
published_at 2026-04-16T12:55:00Z
4
value 0.0027
scoring_system epss
scoring_elements 0.50466
published_at 2026-04-02T12:55:00Z
5
value 0.0027
scoring_system epss
scoring_elements 0.50494
published_at 2026-04-04T12:55:00Z
6
value 0.0027
scoring_system epss
scoring_elements 0.50448
published_at 2026-04-07T12:55:00Z
7
value 0.0027
scoring_system epss
scoring_elements 0.50502
published_at 2026-04-08T12:55:00Z
8
value 0.0027
scoring_system epss
scoring_elements 0.50499
published_at 2026-04-09T12:55:00Z
9
value 0.0027
scoring_system epss
scoring_elements 0.50541
published_at 2026-04-11T12:55:00Z
10
value 0.0027
scoring_system epss
scoring_elements 0.50518
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-23996
1
reference_url https://security.archlinux.org/ASA-202104-3
reference_id ASA-202104-3
reference_type
scores
url https://security.archlinux.org/ASA-202104-3
2
reference_url https://security.archlinux.org/AVG-1834
reference_id AVG-1834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1834
3
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-16
reference_id mfsa2021-16
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-16
4
reference_url https://usn.ubuntu.com/4926-1/
reference_id USN-4926-1
reference_type
scores
url https://usn.ubuntu.com/4926-1/
fixed_packages
0
url pkg:apk/alpine/firefox@88.0-r0?arch=s390x&distroversion=v3.13&reponame=community
purl pkg:apk/alpine/firefox@88.0-r0?arch=s390x&distroversion=v3.13&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@88.0-r0%3Farch=s390x&distroversion=v3.13&reponame=community
aliases CVE-2021-23996
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rmzq-gwbe-qyba
10
url VCID-tjtk-gghp-1kdf
vulnerability_id VCID-tjtk-gghp-1kdf
summary
Multiple vulnerabilities have been found in Mozilla Firefox, the
    worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23999.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23999.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-23999
reference_id
reference_type
scores
0
value 0.00152
scoring_system epss
scoring_elements 0.35924
published_at 2026-04-18T12:55:00Z
1
value 0.00152
scoring_system epss
scoring_elements 0.35931
published_at 2026-04-08T12:55:00Z
2
value 0.00152
scoring_system epss
scoring_elements 0.35954
published_at 2026-04-09T12:55:00Z
3
value 0.00152
scoring_system epss
scoring_elements 0.3596
published_at 2026-04-11T12:55:00Z
4
value 0.00152
scoring_system epss
scoring_elements 0.35921
published_at 2026-04-12T12:55:00Z
5
value 0.00152
scoring_system epss
scoring_elements 0.35897
published_at 2026-04-13T12:55:00Z
6
value 0.00152
scoring_system epss
scoring_elements 0.35937
published_at 2026-04-16T12:55:00Z
7
value 0.00152
scoring_system epss
scoring_elements 0.35828
published_at 2026-04-01T12:55:00Z
8
value 0.00152
scoring_system epss
scoring_elements 0.36018
published_at 2026-04-02T12:55:00Z
9
value 0.00152
scoring_system epss
scoring_elements 0.36049
published_at 2026-04-04T12:55:00Z
10
value 0.00152
scoring_system epss
scoring_elements 0.3588
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-23999
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23961
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23961
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23991
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23991
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23992
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23992
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23993
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23993
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23994
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23995
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23995
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23998
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23998
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23999
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23999
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24002
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29945
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29946
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29948
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29948
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29949
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29949
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1951368
reference_id 1951368
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1951368
17
reference_url https://security.archlinux.org/ASA-202104-3
reference_id ASA-202104-3
reference_type
scores
url https://security.archlinux.org/ASA-202104-3
18
reference_url https://security.archlinux.org/ASA-202104-4
reference_id ASA-202104-4
reference_type
scores
url https://security.archlinux.org/ASA-202104-4
19
reference_url https://security.archlinux.org/AVG-1834
reference_id AVG-1834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1834
20
reference_url https://security.archlinux.org/AVG-1836
reference_id AVG-1836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1836
21
reference_url https://security.gentoo.org/glsa/202104-09
reference_id GLSA-202104-09
reference_type
scores
url https://security.gentoo.org/glsa/202104-09
22
reference_url https://security.gentoo.org/glsa/202104-10
reference_id GLSA-202104-10
reference_type
scores
url https://security.gentoo.org/glsa/202104-10
23
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-14
reference_id mfsa2021-14
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-14
24
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-15
reference_id mfsa2021-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-15
25
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-16
reference_id mfsa2021-16
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-16
26
reference_url https://access.redhat.com/errata/RHSA-2021:1350
reference_id RHSA-2021:1350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1350
27
reference_url https://access.redhat.com/errata/RHSA-2021:1351
reference_id RHSA-2021:1351
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1351
28
reference_url https://access.redhat.com/errata/RHSA-2021:1352
reference_id RHSA-2021:1352
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1352
29
reference_url https://access.redhat.com/errata/RHSA-2021:1353
reference_id RHSA-2021:1353
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1353
30
reference_url https://access.redhat.com/errata/RHSA-2021:1360
reference_id RHSA-2021:1360
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1360
31
reference_url https://access.redhat.com/errata/RHSA-2021:1361
reference_id RHSA-2021:1361
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1361
32
reference_url https://access.redhat.com/errata/RHSA-2021:1362
reference_id RHSA-2021:1362
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1362
33
reference_url https://access.redhat.com/errata/RHSA-2021:1363
reference_id RHSA-2021:1363
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1363
34
reference_url https://usn.ubuntu.com/4926-1/
reference_id USN-4926-1
reference_type
scores
url https://usn.ubuntu.com/4926-1/
35
reference_url https://usn.ubuntu.com/4995-1/
reference_id USN-4995-1
reference_type
scores
url https://usn.ubuntu.com/4995-1/
36
reference_url https://usn.ubuntu.com/4995-2/
reference_id USN-4995-2
reference_type
scores
url https://usn.ubuntu.com/4995-2/
fixed_packages
0
url pkg:apk/alpine/firefox@88.0-r0?arch=s390x&distroversion=v3.13&reponame=community
purl pkg:apk/alpine/firefox@88.0-r0?arch=s390x&distroversion=v3.13&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@88.0-r0%3Farch=s390x&distroversion=v3.13&reponame=community
aliases CVE-2021-23999
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tjtk-gghp-1kdf
11
url VCID-vt2f-abwe-4ba2
vulnerability_id VCID-vt2f-abwe-4ba2
summary
Multiple vulnerabilities have been found in Mozilla Firefox, the
    worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-24002.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-24002.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-24002
reference_id
reference_type
scores
0
value 0.00457
scoring_system epss
scoring_elements 0.63954
published_at 2026-04-18T12:55:00Z
1
value 0.00457
scoring_system epss
scoring_elements 0.63926
published_at 2026-04-08T12:55:00Z
2
value 0.00457
scoring_system epss
scoring_elements 0.63943
published_at 2026-04-09T12:55:00Z
3
value 0.00457
scoring_system epss
scoring_elements 0.63955
published_at 2026-04-11T12:55:00Z
4
value 0.00457
scoring_system epss
scoring_elements 0.63942
published_at 2026-04-12T12:55:00Z
5
value 0.00457
scoring_system epss
scoring_elements 0.63909
published_at 2026-04-13T12:55:00Z
6
value 0.00457
scoring_system epss
scoring_elements 0.63944
published_at 2026-04-16T12:55:00Z
7
value 0.00457
scoring_system epss
scoring_elements 0.63832
published_at 2026-04-01T12:55:00Z
8
value 0.00457
scoring_system epss
scoring_elements 0.63891
published_at 2026-04-02T12:55:00Z
9
value 0.00457
scoring_system epss
scoring_elements 0.63918
published_at 2026-04-04T12:55:00Z
10
value 0.00457
scoring_system epss
scoring_elements 0.63875
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-24002
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23961
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23961
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23991
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23991
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23992
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23992
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23993
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23993
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23994
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23995
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23995
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23998
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23998
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23999
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23999
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24002
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29945
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29946
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29948
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29948
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29949
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29949
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1951369
reference_id 1951369
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1951369
17
reference_url https://security.archlinux.org/ASA-202104-3
reference_id ASA-202104-3
reference_type
scores
url https://security.archlinux.org/ASA-202104-3
18
reference_url https://security.archlinux.org/ASA-202104-4
reference_id ASA-202104-4
reference_type
scores
url https://security.archlinux.org/ASA-202104-4
19
reference_url https://security.archlinux.org/AVG-1834
reference_id AVG-1834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1834
20
reference_url https://security.archlinux.org/AVG-1836
reference_id AVG-1836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1836
21
reference_url https://security.gentoo.org/glsa/202104-09
reference_id GLSA-202104-09
reference_type
scores
url https://security.gentoo.org/glsa/202104-09
22
reference_url https://security.gentoo.org/glsa/202104-10
reference_id GLSA-202104-10
reference_type
scores
url https://security.gentoo.org/glsa/202104-10
23
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-14
reference_id mfsa2021-14
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-14
24
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-15
reference_id mfsa2021-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-15
25
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-16
reference_id mfsa2021-16
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-16
26
reference_url https://access.redhat.com/errata/RHSA-2021:1350
reference_id RHSA-2021:1350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1350
27
reference_url https://access.redhat.com/errata/RHSA-2021:1351
reference_id RHSA-2021:1351
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1351
28
reference_url https://access.redhat.com/errata/RHSA-2021:1352
reference_id RHSA-2021:1352
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1352
29
reference_url https://access.redhat.com/errata/RHSA-2021:1353
reference_id RHSA-2021:1353
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1353
30
reference_url https://access.redhat.com/errata/RHSA-2021:1360
reference_id RHSA-2021:1360
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1360
31
reference_url https://access.redhat.com/errata/RHSA-2021:1361
reference_id RHSA-2021:1361
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1361
32
reference_url https://access.redhat.com/errata/RHSA-2021:1362
reference_id RHSA-2021:1362
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1362
33
reference_url https://access.redhat.com/errata/RHSA-2021:1363
reference_id RHSA-2021:1363
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1363
34
reference_url https://usn.ubuntu.com/4926-1/
reference_id USN-4926-1
reference_type
scores
url https://usn.ubuntu.com/4926-1/
35
reference_url https://usn.ubuntu.com/4995-1/
reference_id USN-4995-1
reference_type
scores
url https://usn.ubuntu.com/4995-1/
36
reference_url https://usn.ubuntu.com/4995-2/
reference_id USN-4995-2
reference_type
scores
url https://usn.ubuntu.com/4995-2/
fixed_packages
0
url pkg:apk/alpine/firefox@88.0-r0?arch=s390x&distroversion=v3.13&reponame=community
purl pkg:apk/alpine/firefox@88.0-r0?arch=s390x&distroversion=v3.13&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@88.0-r0%3Farch=s390x&distroversion=v3.13&reponame=community
aliases CVE-2021-24002
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vt2f-abwe-4ba2
12
url VCID-vtwu-x1vt-x3bq
vulnerability_id VCID-vtwu-x1vt-x3bq
summary
Multiple vulnerabilities have been found in Mozilla Firefox, the
    worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29945.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29945.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-29945
reference_id
reference_type
scores
0
value 0.00409
scoring_system epss
scoring_elements 0.61283
published_at 2026-04-18T12:55:00Z
1
value 0.00409
scoring_system epss
scoring_elements 0.61237
published_at 2026-04-08T12:55:00Z
2
value 0.00409
scoring_system epss
scoring_elements 0.61251
published_at 2026-04-09T12:55:00Z
3
value 0.00409
scoring_system epss
scoring_elements 0.61272
published_at 2026-04-11T12:55:00Z
4
value 0.00409
scoring_system epss
scoring_elements 0.61258
published_at 2026-04-12T12:55:00Z
5
value 0.00409
scoring_system epss
scoring_elements 0.61239
published_at 2026-04-13T12:55:00Z
6
value 0.00409
scoring_system epss
scoring_elements 0.61279
published_at 2026-04-16T12:55:00Z
7
value 0.00409
scoring_system epss
scoring_elements 0.61116
published_at 2026-04-01T12:55:00Z
8
value 0.00409
scoring_system epss
scoring_elements 0.61194
published_at 2026-04-02T12:55:00Z
9
value 0.00409
scoring_system epss
scoring_elements 0.61222
published_at 2026-04-04T12:55:00Z
10
value 0.00409
scoring_system epss
scoring_elements 0.61189
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-29945
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23961
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23961
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23991
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23991
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23992
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23992
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23993
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23993
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23994
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23995
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23995
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23998
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23998
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23999
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23999
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24002
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29945
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29946
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29948
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29948
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29949
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29949
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1951370
reference_id 1951370
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1951370
17
reference_url https://security.archlinux.org/AVG-1835
reference_id AVG-1835
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1835
18
reference_url https://security.archlinux.org/AVG-1837
reference_id AVG-1837
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1837
19
reference_url https://security.gentoo.org/glsa/202104-09
reference_id GLSA-202104-09
reference_type
scores
url https://security.gentoo.org/glsa/202104-09
20
reference_url https://security.gentoo.org/glsa/202104-10
reference_id GLSA-202104-10
reference_type
scores
url https://security.gentoo.org/glsa/202104-10
21
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-14
reference_id mfsa2021-14
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-14
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-15
reference_id mfsa2021-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-15
23
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-16
reference_id mfsa2021-16
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-16
24
reference_url https://access.redhat.com/errata/RHSA-2021:1350
reference_id RHSA-2021:1350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1350
25
reference_url https://access.redhat.com/errata/RHSA-2021:1351
reference_id RHSA-2021:1351
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1351
26
reference_url https://access.redhat.com/errata/RHSA-2021:1352
reference_id RHSA-2021:1352
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1352
27
reference_url https://access.redhat.com/errata/RHSA-2021:1353
reference_id RHSA-2021:1353
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1353
28
reference_url https://access.redhat.com/errata/RHSA-2021:1360
reference_id RHSA-2021:1360
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1360
29
reference_url https://access.redhat.com/errata/RHSA-2021:1361
reference_id RHSA-2021:1361
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1361
30
reference_url https://access.redhat.com/errata/RHSA-2021:1362
reference_id RHSA-2021:1362
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1362
31
reference_url https://access.redhat.com/errata/RHSA-2021:1363
reference_id RHSA-2021:1363
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1363
32
reference_url https://usn.ubuntu.com/4926-1/
reference_id USN-4926-1
reference_type
scores
url https://usn.ubuntu.com/4926-1/
33
reference_url https://usn.ubuntu.com/4995-1/
reference_id USN-4995-1
reference_type
scores
url https://usn.ubuntu.com/4995-1/
34
reference_url https://usn.ubuntu.com/4995-2/
reference_id USN-4995-2
reference_type
scores
url https://usn.ubuntu.com/4995-2/
fixed_packages
0
url pkg:apk/alpine/firefox@88.0-r0?arch=s390x&distroversion=v3.13&reponame=community
purl pkg:apk/alpine/firefox@88.0-r0?arch=s390x&distroversion=v3.13&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@88.0-r0%3Farch=s390x&distroversion=v3.13&reponame=community
aliases CVE-2021-29945
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vtwu-x1vt-x3bq
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@88.0-r0%3Farch=s390x&distroversion=v3.13&reponame=community