Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/znuny@0?distro=trixie
Typedeb
Namespacedebian
Nameznuny
Version0
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version6.4.5-1
Latest_non_vulnerable_version6.5.19-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-12v6-61me-ffa1
vulnerability_id VCID-12v6-61me-ffa1
summary An issue was discovered in Znuny 7.0.1 through 7.0.16 where the ticket detail view in the customer front allows the execution of external JavaScript.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-32492
reference_id
reference_type
scores
0
value 0.0065
scoring_system epss
scoring_elements 0.70885
published_at 2026-04-18T12:55:00Z
1
value 0.0065
scoring_system epss
scoring_elements 0.70864
published_at 2026-04-11T12:55:00Z
2
value 0.0065
scoring_system epss
scoring_elements 0.70848
published_at 2026-04-12T12:55:00Z
3
value 0.0065
scoring_system epss
scoring_elements 0.70833
published_at 2026-04-13T12:55:00Z
4
value 0.0065
scoring_system epss
scoring_elements 0.70878
published_at 2026-04-16T12:55:00Z
5
value 0.0065
scoring_system epss
scoring_elements 0.70787
published_at 2026-04-02T12:55:00Z
6
value 0.0065
scoring_system epss
scoring_elements 0.70806
published_at 2026-04-04T12:55:00Z
7
value 0.0065
scoring_system epss
scoring_elements 0.70781
published_at 2026-04-07T12:55:00Z
8
value 0.0065
scoring_system epss
scoring_elements 0.70825
published_at 2026-04-08T12:55:00Z
9
value 0.0065
scoring_system epss
scoring_elements 0.70841
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-32492
1
reference_url https://znuny.com
reference_id znuny.com
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-05T15:52:23Z/
url https://znuny.com
2
reference_url https://www.znuny.org/en/advisories/zsa-2024-02
reference_id zsa-2024-02
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-05T15:52:23Z/
url https://www.znuny.org/en/advisories/zsa-2024-02
fixed_packages
0
url pkg:deb/debian/znuny@0?distro=trixie
purl pkg:deb/debian/znuny@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@0%3Fdistro=trixie
1
url pkg:deb/debian/znuny@6.5.1-1?distro=trixie
purl pkg:deb/debian/znuny@6.5.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-169g-wxmh-qqbw
1
vulnerability VCID-1mkr-c1ay-jygw
2
vulnerability VCID-2rbn-u9eg-sua7
3
vulnerability VCID-4sdd-c9p8-3fac
4
vulnerability VCID-cqx8-tegf-pfhh
5
vulnerability VCID-kfqh-mtw2-3feu
6
vulnerability VCID-kr13-v6jr-5kg6
7
vulnerability VCID-ndgh-dr9p-kqbu
8
vulnerability VCID-qysv-aehy-d7ay
9
vulnerability VCID-s8fu-wpk4-3ycc
10
vulnerability VCID-x1sc-wvc6-a3hz
11
vulnerability VCID-yrdb-btgm-p3cd
12
vulnerability VCID-zd8d-c1nk-g7a4
13
vulnerability VCID-zhfb-ajkc-5uc4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.1-1%3Fdistro=trixie
2
url pkg:deb/debian/znuny@6.5.15-2?distro=trixie
purl pkg:deb/debian/znuny@6.5.15-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4sdd-c9p8-3fac
1
vulnerability VCID-zd8d-c1nk-g7a4
2
vulnerability VCID-zhfb-ajkc-5uc4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.15-2%3Fdistro=trixie
3
url pkg:deb/debian/znuny@6.5.19-1?distro=trixie
purl pkg:deb/debian/znuny@6.5.19-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.19-1%3Fdistro=trixie
aliases CVE-2024-32492
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-12v6-61me-ffa1
1
url VCID-2yyp-zhcc-mbgq
vulnerability_id VCID-2yyp-zhcc-mbgq
summary Specially crafted string in OTRS system configuration can allow the execution of any system command.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-36100
reference_id
reference_type
scores
0
value 0.0072
scoring_system epss
scoring_elements 0.72417
published_at 2026-04-07T12:55:00Z
1
value 0.0072
scoring_system epss
scoring_elements 0.72423
published_at 2026-04-02T12:55:00Z
2
value 0.0072
scoring_system epss
scoring_elements 0.7244
published_at 2026-04-04T12:55:00Z
3
value 0.0072
scoring_system epss
scoring_elements 0.72456
published_at 2026-04-08T12:55:00Z
4
value 0.0072
scoring_system epss
scoring_elements 0.72468
published_at 2026-04-09T12:55:00Z
5
value 0.0072
scoring_system epss
scoring_elements 0.72492
published_at 2026-04-11T12:55:00Z
6
value 0.0072
scoring_system epss
scoring_elements 0.72474
published_at 2026-04-12T12:55:00Z
7
value 0.0072
scoring_system epss
scoring_elements 0.72464
published_at 2026-04-13T12:55:00Z
8
value 0.0072
scoring_system epss
scoring_elements 0.72506
published_at 2026-04-16T12:55:00Z
9
value 0.0072
scoring_system epss
scoring_elements 0.72514
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-36100
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36100
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36100
fixed_packages
0
url pkg:deb/debian/znuny@0?distro=trixie
purl pkg:deb/debian/znuny@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@0%3Fdistro=trixie
1
url pkg:deb/debian/znuny@6.5.1-1?distro=trixie
purl pkg:deb/debian/znuny@6.5.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-169g-wxmh-qqbw
1
vulnerability VCID-1mkr-c1ay-jygw
2
vulnerability VCID-2rbn-u9eg-sua7
3
vulnerability VCID-4sdd-c9p8-3fac
4
vulnerability VCID-cqx8-tegf-pfhh
5
vulnerability VCID-kfqh-mtw2-3feu
6
vulnerability VCID-kr13-v6jr-5kg6
7
vulnerability VCID-ndgh-dr9p-kqbu
8
vulnerability VCID-qysv-aehy-d7ay
9
vulnerability VCID-s8fu-wpk4-3ycc
10
vulnerability VCID-x1sc-wvc6-a3hz
11
vulnerability VCID-yrdb-btgm-p3cd
12
vulnerability VCID-zd8d-c1nk-g7a4
13
vulnerability VCID-zhfb-ajkc-5uc4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.1-1%3Fdistro=trixie
2
url pkg:deb/debian/znuny@6.5.15-2?distro=trixie
purl pkg:deb/debian/znuny@6.5.15-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4sdd-c9p8-3fac
1
vulnerability VCID-zd8d-c1nk-g7a4
2
vulnerability VCID-zhfb-ajkc-5uc4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.15-2%3Fdistro=trixie
3
url pkg:deb/debian/znuny@6.5.19-1?distro=trixie
purl pkg:deb/debian/znuny@6.5.19-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.19-1%3Fdistro=trixie
aliases CVE-2021-36100
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2yyp-zhcc-mbgq
2
url VCID-57jx-quzh-fubc
vulnerability_id VCID-57jx-quzh-fubc
summary Agents are able to list customer user emails without required permissions in the bulk action screen. This issue affects: OTRS AG ((OTRS)) Community Edition: 6.0.x version 6.0.1 and later versions. OTRS AG OTRS: 7.0.x versions prior to 7.0.27.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-21443
reference_id
reference_type
scores
0
value 0.0022
scoring_system epss
scoring_elements 0.44548
published_at 2026-04-01T12:55:00Z
1
value 0.0022
scoring_system epss
scoring_elements 0.44628
published_at 2026-04-02T12:55:00Z
2
value 0.0022
scoring_system epss
scoring_elements 0.44648
published_at 2026-04-04T12:55:00Z
3
value 0.0022
scoring_system epss
scoring_elements 0.44585
published_at 2026-04-07T12:55:00Z
4
value 0.0022
scoring_system epss
scoring_elements 0.44637
published_at 2026-04-08T12:55:00Z
5
value 0.0022
scoring_system epss
scoring_elements 0.44639
published_at 2026-04-09T12:55:00Z
6
value 0.0022
scoring_system epss
scoring_elements 0.44655
published_at 2026-04-11T12:55:00Z
7
value 0.0022
scoring_system epss
scoring_elements 0.44625
published_at 2026-04-12T12:55:00Z
8
value 0.0022
scoring_system epss
scoring_elements 0.44626
published_at 2026-04-13T12:55:00Z
9
value 0.0022
scoring_system epss
scoring_elements 0.4468
published_at 2026-04-16T12:55:00Z
10
value 0.0022
scoring_system epss
scoring_elements 0.44672
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-21443
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21443
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21443
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991593
reference_id 991593
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991593
fixed_packages
0
url pkg:deb/debian/znuny@0?distro=trixie
purl pkg:deb/debian/znuny@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@0%3Fdistro=trixie
1
url pkg:deb/debian/znuny@6.5.1-1?distro=trixie
purl pkg:deb/debian/znuny@6.5.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-169g-wxmh-qqbw
1
vulnerability VCID-1mkr-c1ay-jygw
2
vulnerability VCID-2rbn-u9eg-sua7
3
vulnerability VCID-4sdd-c9p8-3fac
4
vulnerability VCID-cqx8-tegf-pfhh
5
vulnerability VCID-kfqh-mtw2-3feu
6
vulnerability VCID-kr13-v6jr-5kg6
7
vulnerability VCID-ndgh-dr9p-kqbu
8
vulnerability VCID-qysv-aehy-d7ay
9
vulnerability VCID-s8fu-wpk4-3ycc
10
vulnerability VCID-x1sc-wvc6-a3hz
11
vulnerability VCID-yrdb-btgm-p3cd
12
vulnerability VCID-zd8d-c1nk-g7a4
13
vulnerability VCID-zhfb-ajkc-5uc4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.1-1%3Fdistro=trixie
2
url pkg:deb/debian/znuny@6.5.15-2?distro=trixie
purl pkg:deb/debian/znuny@6.5.15-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4sdd-c9p8-3fac
1
vulnerability VCID-zd8d-c1nk-g7a4
2
vulnerability VCID-zhfb-ajkc-5uc4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.15-2%3Fdistro=trixie
3
url pkg:deb/debian/znuny@6.5.19-1?distro=trixie
purl pkg:deb/debian/znuny@6.5.19-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.19-1%3Fdistro=trixie
aliases CVE-2021-21443
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-57jx-quzh-fubc
3
url VCID-9431-8f5f-rfct
vulnerability_id VCID-9431-8f5f-rfct
summary DoS attack can be performed when an email contains specially designed URL in the body. It can lead to the high CPU usage and cause low quality of service, or in extreme case bring the system to a halt. This issue affects: OTRS AG ((OTRS)) Community Edition 6.0.x version 6.0.1 and later versions. OTRS AG OTRS 7.0.x version 7.0.26 and prior versions; 8.0.x version 8.0.13 and prior versions.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-21439
reference_id
reference_type
scores
0
value 0.00348
scoring_system epss
scoring_elements 0.57232
published_at 2026-04-01T12:55:00Z
1
value 0.00348
scoring_system epss
scoring_elements 0.57314
published_at 2026-04-07T12:55:00Z
2
value 0.00348
scoring_system epss
scoring_elements 0.57337
published_at 2026-04-04T12:55:00Z
3
value 0.00348
scoring_system epss
scoring_elements 0.57365
published_at 2026-04-08T12:55:00Z
4
value 0.00348
scoring_system epss
scoring_elements 0.57367
published_at 2026-04-16T12:55:00Z
5
value 0.00348
scoring_system epss
scoring_elements 0.57382
published_at 2026-04-11T12:55:00Z
6
value 0.00348
scoring_system epss
scoring_elements 0.57362
published_at 2026-04-18T12:55:00Z
7
value 0.00348
scoring_system epss
scoring_elements 0.57341
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-21439
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21439
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21439
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989992
reference_id 989992
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989992
fixed_packages
0
url pkg:deb/debian/znuny@0?distro=trixie
purl pkg:deb/debian/znuny@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@0%3Fdistro=trixie
1
url pkg:deb/debian/znuny@6.5.1-1?distro=trixie
purl pkg:deb/debian/znuny@6.5.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-169g-wxmh-qqbw
1
vulnerability VCID-1mkr-c1ay-jygw
2
vulnerability VCID-2rbn-u9eg-sua7
3
vulnerability VCID-4sdd-c9p8-3fac
4
vulnerability VCID-cqx8-tegf-pfhh
5
vulnerability VCID-kfqh-mtw2-3feu
6
vulnerability VCID-kr13-v6jr-5kg6
7
vulnerability VCID-ndgh-dr9p-kqbu
8
vulnerability VCID-qysv-aehy-d7ay
9
vulnerability VCID-s8fu-wpk4-3ycc
10
vulnerability VCID-x1sc-wvc6-a3hz
11
vulnerability VCID-yrdb-btgm-p3cd
12
vulnerability VCID-zd8d-c1nk-g7a4
13
vulnerability VCID-zhfb-ajkc-5uc4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.1-1%3Fdistro=trixie
2
url pkg:deb/debian/znuny@6.5.15-2?distro=trixie
purl pkg:deb/debian/znuny@6.5.15-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4sdd-c9p8-3fac
1
vulnerability VCID-zd8d-c1nk-g7a4
2
vulnerability VCID-zhfb-ajkc-5uc4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.15-2%3Fdistro=trixie
3
url pkg:deb/debian/znuny@6.5.19-1?distro=trixie
purl pkg:deb/debian/znuny@6.5.19-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.19-1%3Fdistro=trixie
aliases CVE-2021-21439
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9431-8f5f-rfct
4
url VCID-u3ed-wmjx-9fcq
vulnerability_id VCID-u3ed-wmjx-9fcq
summary Generated Support Bundles contains private S/MIME and PGP keys if containing folder is not hidden. This issue affects: OTRS AG ((OTRS)) Community Edition 6.0.x version 6.0.1 and later versions. OTRS AG OTRS 7.0.x version 7.0.27 and prior versions; 8.0.x version 8.0.14 and prior versions.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-21440
reference_id
reference_type
scores
0
value 0.00179
scoring_system epss
scoring_elements 0.394
published_at 2026-04-01T12:55:00Z
1
value 0.00179
scoring_system epss
scoring_elements 0.39563
published_at 2026-04-02T12:55:00Z
2
value 0.00179
scoring_system epss
scoring_elements 0.39586
published_at 2026-04-04T12:55:00Z
3
value 0.00179
scoring_system epss
scoring_elements 0.39501
published_at 2026-04-07T12:55:00Z
4
value 0.00179
scoring_system epss
scoring_elements 0.39556
published_at 2026-04-08T12:55:00Z
5
value 0.00179
scoring_system epss
scoring_elements 0.39572
published_at 2026-04-09T12:55:00Z
6
value 0.00179
scoring_system epss
scoring_elements 0.39582
published_at 2026-04-11T12:55:00Z
7
value 0.00179
scoring_system epss
scoring_elements 0.39544
published_at 2026-04-12T12:55:00Z
8
value 0.00179
scoring_system epss
scoring_elements 0.39528
published_at 2026-04-13T12:55:00Z
9
value 0.00179
scoring_system epss
scoring_elements 0.39578
published_at 2026-04-16T12:55:00Z
10
value 0.00179
scoring_system epss
scoring_elements 0.39549
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-21440
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21440
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991593
reference_id 991593
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991593
fixed_packages
0
url pkg:deb/debian/znuny@0?distro=trixie
purl pkg:deb/debian/znuny@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@0%3Fdistro=trixie
1
url pkg:deb/debian/znuny@6.5.1-1?distro=trixie
purl pkg:deb/debian/znuny@6.5.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-169g-wxmh-qqbw
1
vulnerability VCID-1mkr-c1ay-jygw
2
vulnerability VCID-2rbn-u9eg-sua7
3
vulnerability VCID-4sdd-c9p8-3fac
4
vulnerability VCID-cqx8-tegf-pfhh
5
vulnerability VCID-kfqh-mtw2-3feu
6
vulnerability VCID-kr13-v6jr-5kg6
7
vulnerability VCID-ndgh-dr9p-kqbu
8
vulnerability VCID-qysv-aehy-d7ay
9
vulnerability VCID-s8fu-wpk4-3ycc
10
vulnerability VCID-x1sc-wvc6-a3hz
11
vulnerability VCID-yrdb-btgm-p3cd
12
vulnerability VCID-zd8d-c1nk-g7a4
13
vulnerability VCID-zhfb-ajkc-5uc4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.1-1%3Fdistro=trixie
2
url pkg:deb/debian/znuny@6.5.15-2?distro=trixie
purl pkg:deb/debian/znuny@6.5.15-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4sdd-c9p8-3fac
1
vulnerability VCID-zd8d-c1nk-g7a4
2
vulnerability VCID-zhfb-ajkc-5uc4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.15-2%3Fdistro=trixie
3
url pkg:deb/debian/znuny@6.5.19-1?distro=trixie
purl pkg:deb/debian/znuny@6.5.19-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.19-1%3Fdistro=trixie
aliases CVE-2021-21440
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u3ed-wmjx-9fcq
5
url VCID-u8xm-v9ek-yuar
vulnerability_id VCID-u8xm-v9ek-yuar
summary There is a XSS vulnerability in the ticket overview screens. It's possible to collect various information by having an e-mail shown in the overview screen. Attack can be performed by sending specially crafted e-mail to the system and it doesn't require any user intraction. This issue affects: OTRS AG ((OTRS)) Community Edition 6.0.x version 6.0.1 and later versions. OTRS AG OTRS 7.0.x version 7.0.26 and prior versions.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-21441
reference_id
reference_type
scores
0
value 0.00296
scoring_system epss
scoring_elements 0.52823
published_at 2026-04-01T12:55:00Z
1
value 0.00296
scoring_system epss
scoring_elements 0.5285
published_at 2026-04-02T12:55:00Z
2
value 0.00296
scoring_system epss
scoring_elements 0.52876
published_at 2026-04-04T12:55:00Z
3
value 0.00296
scoring_system epss
scoring_elements 0.52844
published_at 2026-04-07T12:55:00Z
4
value 0.00296
scoring_system epss
scoring_elements 0.52895
published_at 2026-04-08T12:55:00Z
5
value 0.00296
scoring_system epss
scoring_elements 0.52889
published_at 2026-04-09T12:55:00Z
6
value 0.00296
scoring_system epss
scoring_elements 0.52939
published_at 2026-04-11T12:55:00Z
7
value 0.00296
scoring_system epss
scoring_elements 0.52923
published_at 2026-04-12T12:55:00Z
8
value 0.00296
scoring_system epss
scoring_elements 0.52907
published_at 2026-04-13T12:55:00Z
9
value 0.00296
scoring_system epss
scoring_elements 0.52944
published_at 2026-04-16T12:55:00Z
10
value 0.00296
scoring_system epss
scoring_elements 0.52951
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-21441
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21441
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21441
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989992
reference_id 989992
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989992
fixed_packages
0
url pkg:deb/debian/znuny@0?distro=trixie
purl pkg:deb/debian/znuny@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@0%3Fdistro=trixie
1
url pkg:deb/debian/znuny@6.5.1-1?distro=trixie
purl pkg:deb/debian/znuny@6.5.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-169g-wxmh-qqbw
1
vulnerability VCID-1mkr-c1ay-jygw
2
vulnerability VCID-2rbn-u9eg-sua7
3
vulnerability VCID-4sdd-c9p8-3fac
4
vulnerability VCID-cqx8-tegf-pfhh
5
vulnerability VCID-kfqh-mtw2-3feu
6
vulnerability VCID-kr13-v6jr-5kg6
7
vulnerability VCID-ndgh-dr9p-kqbu
8
vulnerability VCID-qysv-aehy-d7ay
9
vulnerability VCID-s8fu-wpk4-3ycc
10
vulnerability VCID-x1sc-wvc6-a3hz
11
vulnerability VCID-yrdb-btgm-p3cd
12
vulnerability VCID-zd8d-c1nk-g7a4
13
vulnerability VCID-zhfb-ajkc-5uc4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.1-1%3Fdistro=trixie
2
url pkg:deb/debian/znuny@6.5.15-2?distro=trixie
purl pkg:deb/debian/znuny@6.5.15-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4sdd-c9p8-3fac
1
vulnerability VCID-zd8d-c1nk-g7a4
2
vulnerability VCID-zhfb-ajkc-5uc4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.15-2%3Fdistro=trixie
3
url pkg:deb/debian/znuny@6.5.19-1?distro=trixie
purl pkg:deb/debian/znuny@6.5.19-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.19-1%3Fdistro=trixie
aliases CVE-2021-21441
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u8xm-v9ek-yuar
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@0%3Fdistro=trixie