Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/943987?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/943987?format=api", "purl": "pkg:deb/debian/znuny@0?distro=trixie", "type": "deb", "namespace": "debian", "name": "znuny", "version": "0", "qualifiers": { "distro": "trixie" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "6.4.5-1", "latest_non_vulnerable_version": "6.5.19-1", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/236440?format=api", "vulnerability_id": "VCID-12v6-61me-ffa1", "summary": "An issue was discovered in Znuny 7.0.1 through 7.0.16 where the ticket detail view in the customer front allows the execution of external JavaScript.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-32492", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0065", "scoring_system": "epss", "scoring_elements": "0.70865", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0065", "scoring_system": "epss", "scoring_elements": "0.70848", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0065", "scoring_system": "epss", "scoring_elements": "0.70833", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0065", "scoring_system": "epss", "scoring_elements": "0.70878", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0065", "scoring_system": "epss", "scoring_elements": "0.70885", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0065", "scoring_system": "epss", "scoring_elements": "0.70787", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0065", "scoring_system": "epss", "scoring_elements": "0.70806", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0065", "scoring_system": "epss", "scoring_elements": "0.70781", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0065", "scoring_system": "epss", "scoring_elements": "0.70825", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0065", "scoring_system": "epss", "scoring_elements": "0.70841", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0065", "scoring_system": "epss", "scoring_elements": "0.70864", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-32492" }, { "reference_url": "https://znuny.com", "reference_id": "znuny.com", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-05T15:52:23Z/" } ], "url": "https://znuny.com" }, { "reference_url": "https://www.znuny.org/en/advisories/zsa-2024-02", "reference_id": "zsa-2024-02", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-05T15:52:23Z/" } ], "url": "https://www.znuny.org/en/advisories/zsa-2024-02" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/943987?format=api", "purl": "pkg:deb/debian/znuny@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943986?format=api", "purl": "pkg:deb/debian/znuny@6.5.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-169g-wxmh-qqbw" }, { "vulnerability": "VCID-1mkr-c1ay-jygw" }, { "vulnerability": "VCID-2rbn-u9eg-sua7" }, { "vulnerability": "VCID-4sdd-c9p8-3fac" }, { "vulnerability": "VCID-cqx8-tegf-pfhh" }, { "vulnerability": "VCID-kfqh-mtw2-3feu" }, { "vulnerability": "VCID-kr13-v6jr-5kg6" }, { "vulnerability": "VCID-ndgh-dr9p-kqbu" }, { "vulnerability": "VCID-qysv-aehy-d7ay" }, { "vulnerability": "VCID-s8fu-wpk4-3ycc" }, { "vulnerability": "VCID-x1sc-wvc6-a3hz" }, { "vulnerability": "VCID-yrdb-btgm-p3cd" }, { "vulnerability": "VCID-zd8d-c1nk-g7a4" }, { "vulnerability": "VCID-zhfb-ajkc-5uc4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943989?format=api", "purl": "pkg:deb/debian/znuny@6.5.15-2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4sdd-c9p8-3fac" }, { "vulnerability": "VCID-zd8d-c1nk-g7a4" }, { "vulnerability": "VCID-zhfb-ajkc-5uc4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.15-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943988?format=api", "purl": "pkg:deb/debian/znuny@6.5.19-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.19-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2024-32492" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-12v6-61me-ffa1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/94823?format=api", "vulnerability_id": "VCID-2yyp-zhcc-mbgq", "summary": "Specially crafted string in OTRS system configuration can allow the execution of any system command.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-36100", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0072", "scoring_system": "epss", "scoring_elements": "0.72417", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0072", "scoring_system": "epss", "scoring_elements": "0.72423", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0072", "scoring_system": "epss", "scoring_elements": "0.7244", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0072", "scoring_system": "epss", "scoring_elements": "0.72456", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0072", "scoring_system": "epss", "scoring_elements": "0.72468", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0072", "scoring_system": "epss", "scoring_elements": "0.72492", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0072", "scoring_system": "epss", "scoring_elements": "0.72474", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0072", "scoring_system": "epss", "scoring_elements": "0.72464", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0072", "scoring_system": "epss", "scoring_elements": "0.72506", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0072", "scoring_system": "epss", "scoring_elements": "0.72514", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0072", "scoring_system": "epss", "scoring_elements": "0.72504", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-36100" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36100", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36100" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/943987?format=api", "purl": "pkg:deb/debian/znuny@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943986?format=api", "purl": "pkg:deb/debian/znuny@6.5.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-169g-wxmh-qqbw" }, { "vulnerability": "VCID-1mkr-c1ay-jygw" }, { "vulnerability": "VCID-2rbn-u9eg-sua7" }, { "vulnerability": "VCID-4sdd-c9p8-3fac" }, { "vulnerability": "VCID-cqx8-tegf-pfhh" }, { "vulnerability": "VCID-kfqh-mtw2-3feu" }, { "vulnerability": "VCID-kr13-v6jr-5kg6" }, { "vulnerability": "VCID-ndgh-dr9p-kqbu" }, { "vulnerability": "VCID-qysv-aehy-d7ay" }, { "vulnerability": "VCID-s8fu-wpk4-3ycc" }, { "vulnerability": "VCID-x1sc-wvc6-a3hz" }, { "vulnerability": "VCID-yrdb-btgm-p3cd" }, { "vulnerability": "VCID-zd8d-c1nk-g7a4" }, { "vulnerability": "VCID-zhfb-ajkc-5uc4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943989?format=api", "purl": "pkg:deb/debian/znuny@6.5.15-2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4sdd-c9p8-3fac" }, { "vulnerability": "VCID-zd8d-c1nk-g7a4" }, { "vulnerability": "VCID-zhfb-ajkc-5uc4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.15-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943988?format=api", "purl": "pkg:deb/debian/znuny@6.5.19-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.19-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2021-36100" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2yyp-zhcc-mbgq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/94657?format=api", "vulnerability_id": "VCID-57jx-quzh-fubc", "summary": "Agents are able to list customer user emails without required permissions in the bulk action screen. This issue affects: OTRS AG ((OTRS)) Community Edition: 6.0.x version 6.0.1 and later versions. OTRS AG OTRS: 7.0.x versions prior to 7.0.27.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-21443", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.44548", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.44628", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.44648", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.44585", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.44637", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.44639", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.44655", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.44625", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.44626", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.4468", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.44672", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.44603", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-21443" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21443", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21443" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991593", "reference_id": "991593", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991593" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/943987?format=api", "purl": "pkg:deb/debian/znuny@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943986?format=api", "purl": "pkg:deb/debian/znuny@6.5.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-169g-wxmh-qqbw" }, { "vulnerability": "VCID-1mkr-c1ay-jygw" }, { "vulnerability": "VCID-2rbn-u9eg-sua7" }, { "vulnerability": "VCID-4sdd-c9p8-3fac" }, { "vulnerability": "VCID-cqx8-tegf-pfhh" }, { "vulnerability": "VCID-kfqh-mtw2-3feu" }, { "vulnerability": "VCID-kr13-v6jr-5kg6" }, { "vulnerability": "VCID-ndgh-dr9p-kqbu" }, { "vulnerability": "VCID-qysv-aehy-d7ay" }, { "vulnerability": "VCID-s8fu-wpk4-3ycc" }, { "vulnerability": "VCID-x1sc-wvc6-a3hz" }, { "vulnerability": "VCID-yrdb-btgm-p3cd" }, { "vulnerability": "VCID-zd8d-c1nk-g7a4" }, { "vulnerability": "VCID-zhfb-ajkc-5uc4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943989?format=api", "purl": "pkg:deb/debian/znuny@6.5.15-2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4sdd-c9p8-3fac" }, { "vulnerability": "VCID-zd8d-c1nk-g7a4" }, { "vulnerability": "VCID-zhfb-ajkc-5uc4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.15-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943988?format=api", "purl": "pkg:deb/debian/znuny@6.5.19-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.19-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2021-21443" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-57jx-quzh-fubc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/94654?format=api", "vulnerability_id": "VCID-9431-8f5f-rfct", "summary": "DoS attack can be performed when an email contains specially designed URL in the body. It can lead to the high CPU usage and cause low quality of service, or in extreme case bring the system to a halt. This issue affects: OTRS AG ((OTRS)) Community Edition 6.0.x version 6.0.1 and later versions. OTRS AG OTRS 7.0.x version 7.0.26 and prior versions; 8.0.x version 8.0.13 and prior versions.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-21439", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00348", "scoring_system": "epss", "scoring_elements": "0.57232", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00348", "scoring_system": "epss", "scoring_elements": "0.57314", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00348", "scoring_system": "epss", "scoring_elements": "0.57337", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00348", "scoring_system": "epss", "scoring_elements": "0.57365", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00348", "scoring_system": "epss", "scoring_elements": "0.57367", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00348", "scoring_system": "epss", "scoring_elements": "0.57382", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00348", "scoring_system": "epss", "scoring_elements": "0.57362", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00348", "scoring_system": "epss", "scoring_elements": "0.57341", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-21439" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21439", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21439" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989992", "reference_id": "989992", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989992" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/943987?format=api", "purl": "pkg:deb/debian/znuny@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943986?format=api", "purl": "pkg:deb/debian/znuny@6.5.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-169g-wxmh-qqbw" }, { "vulnerability": "VCID-1mkr-c1ay-jygw" }, { "vulnerability": "VCID-2rbn-u9eg-sua7" }, { "vulnerability": "VCID-4sdd-c9p8-3fac" }, { "vulnerability": "VCID-cqx8-tegf-pfhh" }, { "vulnerability": "VCID-kfqh-mtw2-3feu" }, { "vulnerability": "VCID-kr13-v6jr-5kg6" }, { "vulnerability": "VCID-ndgh-dr9p-kqbu" }, { "vulnerability": "VCID-qysv-aehy-d7ay" }, { "vulnerability": "VCID-s8fu-wpk4-3ycc" }, { "vulnerability": "VCID-x1sc-wvc6-a3hz" }, { "vulnerability": "VCID-yrdb-btgm-p3cd" }, { "vulnerability": "VCID-zd8d-c1nk-g7a4" }, { "vulnerability": "VCID-zhfb-ajkc-5uc4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943989?format=api", "purl": "pkg:deb/debian/znuny@6.5.15-2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4sdd-c9p8-3fac" }, { "vulnerability": "VCID-zd8d-c1nk-g7a4" }, { "vulnerability": "VCID-zhfb-ajkc-5uc4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.15-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943988?format=api", "purl": "pkg:deb/debian/znuny@6.5.19-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.19-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2021-21439" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9431-8f5f-rfct" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/94655?format=api", "vulnerability_id": "VCID-u3ed-wmjx-9fcq", "summary": "Generated Support Bundles contains private S/MIME and PGP keys if containing folder is not hidden. This issue affects: OTRS AG ((OTRS)) Community Edition 6.0.x version 6.0.1 and later versions. OTRS AG OTRS 7.0.x version 7.0.27 and prior versions; 8.0.x version 8.0.14 and prior versions.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-21440", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.394", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39563", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39586", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39501", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39556", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39572", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39582", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39544", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39528", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39578", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39549", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39465", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-21440" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21440", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21440" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991593", "reference_id": "991593", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991593" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/943987?format=api", "purl": "pkg:deb/debian/znuny@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943986?format=api", "purl": "pkg:deb/debian/znuny@6.5.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-169g-wxmh-qqbw" }, { "vulnerability": "VCID-1mkr-c1ay-jygw" }, { "vulnerability": "VCID-2rbn-u9eg-sua7" }, { "vulnerability": "VCID-4sdd-c9p8-3fac" }, { "vulnerability": "VCID-cqx8-tegf-pfhh" }, { "vulnerability": "VCID-kfqh-mtw2-3feu" }, { "vulnerability": "VCID-kr13-v6jr-5kg6" }, { "vulnerability": "VCID-ndgh-dr9p-kqbu" }, { "vulnerability": "VCID-qysv-aehy-d7ay" }, { "vulnerability": "VCID-s8fu-wpk4-3ycc" }, { "vulnerability": "VCID-x1sc-wvc6-a3hz" }, { "vulnerability": "VCID-yrdb-btgm-p3cd" }, { "vulnerability": "VCID-zd8d-c1nk-g7a4" }, { "vulnerability": "VCID-zhfb-ajkc-5uc4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943989?format=api", "purl": "pkg:deb/debian/znuny@6.5.15-2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4sdd-c9p8-3fac" }, { "vulnerability": "VCID-zd8d-c1nk-g7a4" }, { "vulnerability": "VCID-zhfb-ajkc-5uc4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.15-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943988?format=api", "purl": "pkg:deb/debian/znuny@6.5.19-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.19-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2021-21440" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-u3ed-wmjx-9fcq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/94656?format=api", "vulnerability_id": "VCID-u8xm-v9ek-yuar", "summary": "There is a XSS vulnerability in the ticket overview screens. It's possible to collect various information by having an e-mail shown in the overview screen. Attack can be performed by sending specially crafted e-mail to the system and it doesn't require any user intraction. This issue affects: OTRS AG ((OTRS)) Community Edition 6.0.x version 6.0.1 and later versions. OTRS AG OTRS 7.0.x version 7.0.26 and prior versions.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-21441", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00296", "scoring_system": "epss", "scoring_elements": "0.52823", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00296", "scoring_system": "epss", "scoring_elements": "0.5285", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00296", "scoring_system": "epss", "scoring_elements": "0.52876", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00296", "scoring_system": "epss", "scoring_elements": "0.52844", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00296", "scoring_system": "epss", "scoring_elements": "0.52895", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00296", "scoring_system": "epss", "scoring_elements": "0.52889", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00296", "scoring_system": "epss", "scoring_elements": "0.52939", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00296", "scoring_system": "epss", "scoring_elements": "0.52923", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00296", "scoring_system": "epss", "scoring_elements": "0.52907", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00296", "scoring_system": "epss", "scoring_elements": "0.52944", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00296", "scoring_system": "epss", "scoring_elements": "0.52951", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00296", "scoring_system": "epss", "scoring_elements": "0.52934", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-21441" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21441", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21441" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989992", "reference_id": "989992", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989992" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/943987?format=api", "purl": "pkg:deb/debian/znuny@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943986?format=api", "purl": "pkg:deb/debian/znuny@6.5.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-169g-wxmh-qqbw" }, { "vulnerability": "VCID-1mkr-c1ay-jygw" }, { "vulnerability": "VCID-2rbn-u9eg-sua7" }, { "vulnerability": "VCID-4sdd-c9p8-3fac" }, { "vulnerability": "VCID-cqx8-tegf-pfhh" }, { "vulnerability": "VCID-kfqh-mtw2-3feu" }, { "vulnerability": "VCID-kr13-v6jr-5kg6" }, { "vulnerability": "VCID-ndgh-dr9p-kqbu" }, { "vulnerability": "VCID-qysv-aehy-d7ay" }, { "vulnerability": "VCID-s8fu-wpk4-3ycc" }, { "vulnerability": "VCID-x1sc-wvc6-a3hz" }, { "vulnerability": "VCID-yrdb-btgm-p3cd" }, { "vulnerability": "VCID-zd8d-c1nk-g7a4" }, { "vulnerability": "VCID-zhfb-ajkc-5uc4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943989?format=api", "purl": "pkg:deb/debian/znuny@6.5.15-2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4sdd-c9p8-3fac" }, { "vulnerability": "VCID-zd8d-c1nk-g7a4" }, { "vulnerability": "VCID-zhfb-ajkc-5uc4" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.15-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943988?format=api", "purl": "pkg:deb/debian/znuny@6.5.19-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.19-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2021-21441" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-u8xm-v9ek-yuar" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@0%3Fdistro=trixie" }