Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/371184?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/371184?format=api", "purl": "pkg:alpm/archlinux/vivaldi@4.0.2312.24-1", "type": "alpm", "namespace": "archlinux", "name": "vivaldi", "version": "4.0.2312.24-1", "qualifiers": {}, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": "4.0.2312.25-1", "latest_non_vulnerable_version": "5.0.2497.30-1", "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49448?format=api", "vulnerability_id": "VCID-164n-utpb-2kbu", "summary": "Multiple vulnerabillities have been found in Chromium and Google\n Chrome, the worst of which could allow remote attackers to execute\n arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30544", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0032", "scoring_system": "epss", "scoring_elements": "0.55109", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0032", "scoring_system": "epss", "scoring_elements": "0.55117", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0032", "scoring_system": "epss", "scoring_elements": "0.55129", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0032", "scoring_system": "epss", "scoring_elements": "0.54965", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0032", "scoring_system": "epss", "scoring_elements": "0.55067", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0032", "scoring_system": "epss", "scoring_elements": "0.55092", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0032", "scoring_system": "epss", "scoring_elements": "0.55068", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0032", "scoring_system": "epss", "scoring_elements": "0.55118", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30544" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30544", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30544" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/ASA-202106-31", "reference_id": "ASA-202106-31", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202106-31" }, { "reference_url": "https://security.archlinux.org/ASA-202106-32", "reference_id": "ASA-202106-32", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202106-32" }, { "reference_url": "https://security.archlinux.org/AVG-2057", "reference_id": "AVG-2057", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2057" }, { "reference_url": "https://security.archlinux.org/AVG-2058", "reference_id": "AVG-2058", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2058" }, { "reference_url": "https://security.gentoo.org/glsa/202107-06", "reference_id": "GLSA-202107-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-06" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371185?format=api", "purl": "pkg:alpm/archlinux/vivaldi@4.0.2312.25-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/vivaldi@4.0.2312.25-1" } ], "aliases": [ "CVE-2021-30544" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-164n-utpb-2kbu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49450?format=api", "vulnerability_id": "VCID-1xad-pgff-w3ad", "summary": "Multiple vulnerabillities have been found in Chromium and Google\n Chrome, the worst of which could allow remote attackers to execute\n arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30546", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00665", "scoring_system": "epss", "scoring_elements": "0.71258", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00665", "scoring_system": "epss", "scoring_elements": "0.71228", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00665", "scoring_system": "epss", "scoring_elements": "0.71212", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00665", "scoring_system": "epss", "scoring_elements": "0.71163", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00665", "scoring_system": "epss", "scoring_elements": "0.71173", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00665", "scoring_system": "epss", "scoring_elements": "0.7119", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00665", "scoring_system": "epss", "scoring_elements": "0.71165", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00665", "scoring_system": "epss", "scoring_elements": "0.71207", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00665", "scoring_system": "epss", "scoring_elements": "0.7122", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00665", "scoring_system": "epss", "scoring_elements": "0.71243", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30546" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30546", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30546" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/ASA-202106-31", "reference_id": "ASA-202106-31", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202106-31" }, { "reference_url": "https://security.archlinux.org/ASA-202106-32", "reference_id": "ASA-202106-32", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202106-32" }, { "reference_url": "https://security.archlinux.org/AVG-2057", "reference_id": "AVG-2057", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2057" }, { "reference_url": "https://security.archlinux.org/AVG-2058", "reference_id": "AVG-2058", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2058" }, { "reference_url": "https://security.gentoo.org/glsa/202107-06", "reference_id": "GLSA-202107-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-06" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371185?format=api", "purl": "pkg:alpm/archlinux/vivaldi@4.0.2312.25-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/vivaldi@4.0.2312.25-1" } ], "aliases": [ "CVE-2021-30546" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1xad-pgff-w3ad" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49456?format=api", "vulnerability_id": "VCID-7cbs-rmcu-rqgf", "summary": "Multiple vulnerabillities have been found in Chromium and Google\n Chrome, the worst of which could allow remote attackers to execute\n arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30553", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00774", "scoring_system": "epss", "scoring_elements": "0.73635", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00774", "scoring_system": "epss", "scoring_elements": "0.73598", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00774", "scoring_system": "epss", "scoring_elements": "0.73591", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00774", "scoring_system": "epss", "scoring_elements": "0.73541", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00774", "scoring_system": "epss", "scoring_elements": "0.73549", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00774", "scoring_system": "epss", "scoring_elements": "0.73572", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00774", "scoring_system": "epss", "scoring_elements": "0.73544", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00774", "scoring_system": "epss", "scoring_elements": "0.7358", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00774", "scoring_system": "epss", "scoring_elements": "0.73594", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00774", "scoring_system": "epss", "scoring_elements": "0.73616", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30553" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30553", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30553" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/ASA-202106-31", "reference_id": "ASA-202106-31", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202106-31" }, { "reference_url": "https://security.archlinux.org/ASA-202106-32", "reference_id": "ASA-202106-32", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202106-32" }, { "reference_url": "https://security.archlinux.org/AVG-2057", "reference_id": "AVG-2057", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2057" }, { "reference_url": "https://security.archlinux.org/AVG-2058", "reference_id": "AVG-2058", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2058" }, { "reference_url": "https://security.gentoo.org/glsa/202107-06", "reference_id": "GLSA-202107-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-06" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371185?format=api", "purl": "pkg:alpm/archlinux/vivaldi@4.0.2312.25-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/vivaldi@4.0.2312.25-1" } ], "aliases": [ "CVE-2021-30553" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7cbs-rmcu-rqgf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49452?format=api", "vulnerability_id": "VCID-ecm6-npvt-z7e4", "summary": "Multiple vulnerabillities have been found in Chromium and Google\n Chrome, the worst of which could allow remote attackers to execute\n arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30549", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55843", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55825", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55806", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55668", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.5578", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55802", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55782", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55833", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55836", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55844", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30549" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30549", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30549" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/ASA-202106-31", "reference_id": "ASA-202106-31", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202106-31" }, { "reference_url": "https://security.archlinux.org/ASA-202106-32", "reference_id": "ASA-202106-32", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202106-32" }, { "reference_url": "https://security.archlinux.org/AVG-2057", "reference_id": "AVG-2057", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2057" }, { "reference_url": "https://security.archlinux.org/AVG-2058", "reference_id": "AVG-2058", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2058" }, { "reference_url": "https://security.gentoo.org/glsa/202107-06", "reference_id": "GLSA-202107-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-06" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371185?format=api", "purl": "pkg:alpm/archlinux/vivaldi@4.0.2312.25-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/vivaldi@4.0.2312.25-1" } ], "aliases": [ "CVE-2021-30549" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ecm6-npvt-z7e4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49449?format=api", "vulnerability_id": "VCID-fu94-pehe-d7ax", "summary": "Multiple vulnerabillities have been found in Chromium and Google\n Chrome, the worst of which could allow remote attackers to execute\n arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30545", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00665", "scoring_system": "epss", "scoring_elements": "0.71258", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00665", "scoring_system": "epss", "scoring_elements": "0.71228", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00665", "scoring_system": "epss", "scoring_elements": "0.71212", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00665", "scoring_system": "epss", "scoring_elements": "0.71163", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00665", "scoring_system": "epss", "scoring_elements": "0.71173", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00665", "scoring_system": "epss", "scoring_elements": "0.7119", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00665", "scoring_system": "epss", "scoring_elements": "0.71165", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00665", "scoring_system": "epss", "scoring_elements": "0.71207", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00665", "scoring_system": "epss", "scoring_elements": "0.7122", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00665", "scoring_system": "epss", "scoring_elements": "0.71243", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30545" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30545", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30545" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/ASA-202106-31", "reference_id": "ASA-202106-31", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202106-31" }, { "reference_url": "https://security.archlinux.org/ASA-202106-32", "reference_id": "ASA-202106-32", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202106-32" }, { "reference_url": "https://security.archlinux.org/AVG-2057", "reference_id": "AVG-2057", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2057" }, { "reference_url": "https://security.archlinux.org/AVG-2058", "reference_id": "AVG-2058", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2058" }, { "reference_url": "https://security.gentoo.org/glsa/202107-06", "reference_id": "GLSA-202107-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-06" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371185?format=api", "purl": "pkg:alpm/archlinux/vivaldi@4.0.2312.25-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/vivaldi@4.0.2312.25-1" } ], "aliases": [ "CVE-2021-30545" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fu94-pehe-d7ax" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49455?format=api", "vulnerability_id": "VCID-h77b-t3re-g3bm", "summary": "Multiple vulnerabillities have been found in Chromium and Google\n Chrome, the worst of which could allow remote attackers to execute\n arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30552", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55843", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55825", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55806", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55668", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.5578", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55802", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55782", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55833", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55836", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55844", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30552" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30552", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30552" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/ASA-202106-31", "reference_id": "ASA-202106-31", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202106-31" }, { "reference_url": "https://security.archlinux.org/ASA-202106-32", "reference_id": "ASA-202106-32", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202106-32" }, { "reference_url": "https://security.archlinux.org/AVG-2057", "reference_id": "AVG-2057", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2057" }, { "reference_url": "https://security.archlinux.org/AVG-2058", "reference_id": "AVG-2058", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2058" }, { "reference_url": "https://security.gentoo.org/glsa/202107-06", "reference_id": "GLSA-202107-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-06" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371185?format=api", "purl": "pkg:alpm/archlinux/vivaldi@4.0.2312.25-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/vivaldi@4.0.2312.25-1" } ], "aliases": [ "CVE-2021-30552" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h77b-t3re-g3bm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49451?format=api", "vulnerability_id": "VCID-kt2w-ydf8-quh9", "summary": "Multiple vulnerabillities have been found in Chromium and Google\n Chrome, the worst of which could allow remote attackers to execute\n arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30548", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00774", "scoring_system": "epss", "scoring_elements": "0.73635", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00774", "scoring_system": "epss", "scoring_elements": "0.73598", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00774", "scoring_system": "epss", "scoring_elements": "0.73591", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00774", "scoring_system": "epss", "scoring_elements": "0.73541", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00774", "scoring_system": "epss", "scoring_elements": "0.73549", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00774", "scoring_system": "epss", "scoring_elements": "0.73572", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00774", "scoring_system": "epss", "scoring_elements": "0.73544", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00774", "scoring_system": "epss", "scoring_elements": "0.7358", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00774", "scoring_system": "epss", "scoring_elements": "0.73594", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00774", "scoring_system": "epss", "scoring_elements": "0.73616", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30548" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30548", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30548" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/ASA-202106-31", "reference_id": "ASA-202106-31", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202106-31" }, { "reference_url": "https://security.archlinux.org/ASA-202106-32", "reference_id": "ASA-202106-32", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202106-32" }, { "reference_url": "https://security.archlinux.org/AVG-2057", "reference_id": "AVG-2057", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2057" }, { "reference_url": "https://security.archlinux.org/AVG-2058", "reference_id": "AVG-2058", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2058" }, { "reference_url": "https://security.gentoo.org/glsa/202107-06", "reference_id": "GLSA-202107-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-06" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371185?format=api", "purl": "pkg:alpm/archlinux/vivaldi@4.0.2312.25-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/vivaldi@4.0.2312.25-1" } ], "aliases": [ "CVE-2021-30548" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kt2w-ydf8-quh9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31126?format=api", "vulnerability_id": "VCID-teh4-fmg6-53ab", "summary": "Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30547.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30547.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30547", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02527", "scoring_system": "epss", "scoring_elements": "0.85455", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02527", "scoring_system": "epss", "scoring_elements": "0.85431", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02527", "scoring_system": "epss", "scoring_elements": "0.85358", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02527", "scoring_system": "epss", "scoring_elements": "0.85435", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02527", "scoring_system": "epss", "scoring_elements": "0.85436", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02527", "scoring_system": "epss", "scoring_elements": "0.85422", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02527", "scoring_system": "epss", "scoring_elements": "0.85413", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02527", "scoring_system": "epss", "scoring_elements": "0.85392", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02527", "scoring_system": "epss", "scoring_elements": "0.85389", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02527", "scoring_system": "epss", "scoring_elements": "0.8537", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29969", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29969" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29970", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29970" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29976", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29976" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30547" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970109", "reference_id": "1970109", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970109" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/ASA-202106-31", "reference_id": "ASA-202106-31", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202106-31" }, { "reference_url": "https://security.archlinux.org/ASA-202106-32", "reference_id": "ASA-202106-32", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202106-32" }, { "reference_url": "https://security.archlinux.org/ASA-202107-20", "reference_id": "ASA-202107-20", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202107-20" }, { "reference_url": "https://security.archlinux.org/ASA-202107-21", "reference_id": "ASA-202107-21", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202107-21" }, { "reference_url": "https://security.archlinux.org/AVG-2057", "reference_id": "AVG-2057", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2057" }, { "reference_url": "https://security.archlinux.org/AVG-2058", "reference_id": "AVG-2058", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2058" }, { "reference_url": "https://security.archlinux.org/AVG-2148", "reference_id": "AVG-2148", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2148" }, { "reference_url": "https://security.archlinux.org/AVG-2152", "reference_id": "AVG-2152", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2152" }, { "reference_url": "https://security.gentoo.org/glsa/202202-03", "reference_id": "GLSA-202202-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202202-03" }, { "reference_url": "https://security.gentoo.org/glsa/202208-14", "reference_id": "GLSA-202208-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-14" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-28", "reference_id": "mfsa2021-28", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-28" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-29", "reference_id": "mfsa2021-29", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-29" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-30", "reference_id": "mfsa2021-30", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-30" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2740", "reference_id": "RHSA-2021:2740", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2740" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2741", "reference_id": "RHSA-2021:2741", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2741" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2742", "reference_id": "RHSA-2021:2742", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2742" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2743", "reference_id": "RHSA-2021:2743", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2743" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2881", "reference_id": "RHSA-2021:2881", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2881" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2882", "reference_id": "RHSA-2021:2882", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2882" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2883", "reference_id": "RHSA-2021:2883", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2883" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2914", "reference_id": "RHSA-2021:2914", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2914" }, { "reference_url": "https://usn.ubuntu.com/5011-1/", "reference_id": "USN-5011-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5011-1/" }, { "reference_url": "https://usn.ubuntu.com/5058-1/", "reference_id": "USN-5058-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5058-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371185?format=api", "purl": "pkg:alpm/archlinux/vivaldi@4.0.2312.25-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/vivaldi@4.0.2312.25-1" } ], "aliases": [ "CVE-2021-30547" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-teh4-fmg6-53ab" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49454?format=api", "vulnerability_id": "VCID-w43e-g6rb-4bgf", "summary": "Multiple vulnerabillities have been found in Chromium and Google\n Chrome, the worst of which could allow remote attackers to execute\n arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30551", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.75302", "scoring_system": "epss", "scoring_elements": "0.98874", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.75302", "scoring_system": "epss", "scoring_elements": "0.98872", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.75302", "scoring_system": "epss", "scoring_elements": "0.98876", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.77157", "scoring_system": "epss", "scoring_elements": "0.98973", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.77157", "scoring_system": "epss", "scoring_elements": "0.98967", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.77157", "scoring_system": "epss", "scoring_elements": "0.98969", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.77157", "scoring_system": "epss", "scoring_elements": "0.9897", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.77157", "scoring_system": "epss", "scoring_elements": "0.98971", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30551" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30551", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30551" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://crbug.com/1216437", "reference_id": "1216437", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:53:02Z/" } ], "url": "https://crbug.com/1216437" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/ASA-202106-31", "reference_id": "ASA-202106-31", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202106-31" }, { "reference_url": "https://security.archlinux.org/ASA-202106-32", "reference_id": "ASA-202106-32", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202106-32" }, { "reference_url": "https://security.archlinux.org/AVG-2057", "reference_id": "AVG-2057", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2057" }, { "reference_url": "https://security.archlinux.org/AVG-2058", "reference_id": "AVG-2058", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2058" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ETMZL6IHCTCTREEL434BQ4THQ7EOHJ43/", "reference_id": "ETMZL6IHCTCTREEL434BQ4THQ7EOHJ43", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:53:02Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ETMZL6IHCTCTREEL434BQ4THQ7EOHJ43/" }, { "reference_url": "https://security.gentoo.org/glsa/202107-06", "reference_id": "GLSA-202107-06", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:53:02Z/" } ], "url": "https://security.gentoo.org/glsa/202107-06" }, { "reference_url": "https://security.gentoo.org/glsa/202208-25", "reference_id": "GLSA-202208-25", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:53:02Z/" } ], "url": "https://security.gentoo.org/glsa/202208-25" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAT6EOXVQFE6JFMFQF4IKAOUQSHMHL54/", "reference_id": "PAT6EOXVQFE6JFMFQF4IKAOUQSHMHL54", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:53:02Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAT6EOXVQFE6JFMFQF4IKAOUQSHMHL54/" }, { "reference_url": "https://chromereleases.googleblog.com/2021/06/stable-channel-update-for-desktop.html", "reference_id": "stable-channel-update-for-desktop.html", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:53:02Z/" } ], "url": "https://chromereleases.googleblog.com/2021/06/stable-channel-update-for-desktop.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371185?format=api", "purl": "pkg:alpm/archlinux/vivaldi@4.0.2312.25-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/vivaldi@4.0.2312.25-1" } ], "aliases": [ "CVE-2021-30551" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w43e-g6rb-4bgf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49453?format=api", "vulnerability_id": "VCID-zvgk-sfcq-aycp", "summary": "Multiple vulnerabillities have been found in Chromium and Google\n Chrome, the worst of which could allow remote attackers to execute\n arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30550", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55843", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55825", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55806", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55668", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.5578", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55802", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55782", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55833", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55836", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55844", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30550" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30550", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30550" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/ASA-202106-31", "reference_id": "ASA-202106-31", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202106-31" }, { "reference_url": "https://security.archlinux.org/ASA-202106-32", "reference_id": "ASA-202106-32", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202106-32" }, { "reference_url": "https://security.archlinux.org/AVG-2057", "reference_id": "AVG-2057", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2057" }, { "reference_url": "https://security.archlinux.org/AVG-2058", "reference_id": "AVG-2058", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2058" }, { "reference_url": "https://security.gentoo.org/glsa/202107-06", "reference_id": "GLSA-202107-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-06" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371185?format=api", "purl": "pkg:alpm/archlinux/vivaldi@4.0.2312.25-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/vivaldi@4.0.2312.25-1" } ], "aliases": [ "CVE-2021-30550" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zvgk-sfcq-aycp" } ], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49432?format=api", "vulnerability_id": "VCID-7fef-qr2c-gbcp", "summary": "Multiple vulnerabillities have been found in Chromium and Google\n Chrome, the worst of which could allow remote attackers to execute\n arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30523", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70516", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70474", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70409", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70422", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.7044", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70418", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70463", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70479", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70503", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70488", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30523" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30523", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30523" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/ASA-202106-2", "reference_id": "ASA-202106-2", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202106-2" }, { "reference_url": "https://security.archlinux.org/AVG-1990", "reference_id": "AVG-1990", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1990" }, { "reference_url": "https://security.archlinux.org/AVG-1991", "reference_id": "AVG-1991", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1991" }, { "reference_url": "https://security.gentoo.org/glsa/202107-06", "reference_id": "GLSA-202107-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-06" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371184?format=api", "purl": "pkg:alpm/archlinux/vivaldi@4.0.2312.24-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-164n-utpb-2kbu" }, { "vulnerability": "VCID-1xad-pgff-w3ad" }, { "vulnerability": "VCID-7cbs-rmcu-rqgf" }, { "vulnerability": "VCID-ecm6-npvt-z7e4" }, { "vulnerability": "VCID-fu94-pehe-d7ax" }, { "vulnerability": "VCID-h77b-t3re-g3bm" }, { "vulnerability": "VCID-kt2w-ydf8-quh9" }, { "vulnerability": "VCID-teh4-fmg6-53ab" }, { "vulnerability": "VCID-w43e-g6rb-4bgf" }, { "vulnerability": "VCID-zvgk-sfcq-aycp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/vivaldi@4.0.2312.24-1" } ], "aliases": [ "CVE-2021-30523" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7fef-qr2c-gbcp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/94724?format=api", "vulnerability_id": "VCID-7spy-wcry-6fb8", "summary": "Use after free in Tab Strip in Google Chrome prior to 91.0.4472.77 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30543", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51129", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.5109", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.50995", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51049", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51073", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51031", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51088", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51084", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51128", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51107", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30543" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30543", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30543" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/ASA-202106-2", "reference_id": "ASA-202106-2", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202106-2" }, { "reference_url": "https://security.archlinux.org/AVG-1990", "reference_id": "AVG-1990", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1990" }, { "reference_url": "https://security.archlinux.org/AVG-1991", "reference_id": "AVG-1991", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1991" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371184?format=api", "purl": "pkg:alpm/archlinux/vivaldi@4.0.2312.24-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-164n-utpb-2kbu" }, { "vulnerability": "VCID-1xad-pgff-w3ad" }, { "vulnerability": "VCID-7cbs-rmcu-rqgf" }, { "vulnerability": "VCID-ecm6-npvt-z7e4" }, { "vulnerability": "VCID-fu94-pehe-d7ax" }, { "vulnerability": "VCID-h77b-t3re-g3bm" }, { "vulnerability": "VCID-kt2w-ydf8-quh9" }, { "vulnerability": "VCID-teh4-fmg6-53ab" }, { "vulnerability": "VCID-w43e-g6rb-4bgf" }, { "vulnerability": "VCID-zvgk-sfcq-aycp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/vivaldi@4.0.2312.24-1" } ], "aliases": [ "CVE-2021-30543" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7spy-wcry-6fb8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49442?format=api", "vulnerability_id": "VCID-81s9-h9rs-bkfh", "summary": "Multiple vulnerabillities have been found in Chromium and Google\n Chrome, the worst of which could allow remote attackers to execute\n arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30534", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30545", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.3052", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30519", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30657", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30703", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30515", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30574", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30608", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30611", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30567", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30534" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30534", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30534" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/ASA-202106-2", "reference_id": "ASA-202106-2", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202106-2" }, { "reference_url": "https://security.archlinux.org/AVG-1990", "reference_id": "AVG-1990", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1990" }, { "reference_url": "https://security.archlinux.org/AVG-1991", "reference_id": "AVG-1991", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1991" }, { "reference_url": "https://security.gentoo.org/glsa/202107-06", "reference_id": "GLSA-202107-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-06" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371184?format=api", "purl": "pkg:alpm/archlinux/vivaldi@4.0.2312.24-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-164n-utpb-2kbu" }, { "vulnerability": "VCID-1xad-pgff-w3ad" }, { "vulnerability": "VCID-7cbs-rmcu-rqgf" }, { "vulnerability": "VCID-ecm6-npvt-z7e4" }, { "vulnerability": "VCID-fu94-pehe-d7ax" }, { "vulnerability": "VCID-h77b-t3re-g3bm" }, { "vulnerability": "VCID-kt2w-ydf8-quh9" }, { "vulnerability": "VCID-teh4-fmg6-53ab" }, { "vulnerability": "VCID-w43e-g6rb-4bgf" }, { "vulnerability": "VCID-zvgk-sfcq-aycp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/vivaldi@4.0.2312.24-1" } ], "aliases": [ "CVE-2021-30534" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-81s9-h9rs-bkfh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49431?format=api", "vulnerability_id": "VCID-8bhz-3581-bkca", "summary": "Multiple vulnerabillities have been found in Chromium and Google\n Chrome, the worst of which could allow remote attackers to execute\n arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30522", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01007", "scoring_system": "epss", "scoring_elements": "0.77099", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01007", "scoring_system": "epss", "scoring_elements": "0.77058", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01007", "scoring_system": "epss", "scoring_elements": "0.76997", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01007", "scoring_system": "epss", "scoring_elements": "0.77003", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01007", "scoring_system": "epss", "scoring_elements": "0.77032", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01007", "scoring_system": "epss", "scoring_elements": "0.77013", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01007", "scoring_system": "epss", "scoring_elements": "0.77045", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01007", "scoring_system": "epss", "scoring_elements": "0.77055", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01007", "scoring_system": "epss", "scoring_elements": "0.77084", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01007", "scoring_system": "epss", "scoring_elements": "0.77063", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30522" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30522", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30522" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/ASA-202106-2", "reference_id": "ASA-202106-2", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202106-2" }, { "reference_url": "https://security.archlinux.org/AVG-1990", "reference_id": "AVG-1990", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1990" }, { "reference_url": "https://security.archlinux.org/AVG-1991", "reference_id": "AVG-1991", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1991" }, { "reference_url": "https://security.gentoo.org/glsa/202107-06", "reference_id": "GLSA-202107-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-06" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371184?format=api", "purl": "pkg:alpm/archlinux/vivaldi@4.0.2312.24-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-164n-utpb-2kbu" }, { "vulnerability": "VCID-1xad-pgff-w3ad" }, { "vulnerability": "VCID-7cbs-rmcu-rqgf" }, { "vulnerability": "VCID-ecm6-npvt-z7e4" }, { "vulnerability": "VCID-fu94-pehe-d7ax" }, { "vulnerability": "VCID-h77b-t3re-g3bm" }, { "vulnerability": "VCID-kt2w-ydf8-quh9" }, { "vulnerability": "VCID-teh4-fmg6-53ab" }, { "vulnerability": "VCID-w43e-g6rb-4bgf" }, { "vulnerability": "VCID-zvgk-sfcq-aycp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/vivaldi@4.0.2312.24-1" } ], "aliases": [ "CVE-2021-30522" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8bhz-3581-bkca" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49433?format=api", "vulnerability_id": "VCID-9u4b-zjdu-n3b3", "summary": "Multiple vulnerabillities have been found in Chromium and Google\n Chrome, the worst of which could allow remote attackers to execute\n arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30524", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00281", "scoring_system": "epss", "scoring_elements": "0.51571", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00281", "scoring_system": "epss", "scoring_elements": "0.51528", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00281", "scoring_system": "epss", "scoring_elements": "0.51428", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00281", "scoring_system": "epss", "scoring_elements": "0.51479", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00281", "scoring_system": "epss", "scoring_elements": "0.51506", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00281", "scoring_system": "epss", "scoring_elements": "0.51466", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00281", "scoring_system": "epss", "scoring_elements": "0.51519", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00281", "scoring_system": "epss", "scoring_elements": "0.51517", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00281", "scoring_system": "epss", "scoring_elements": "0.51561", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00281", "scoring_system": "epss", "scoring_elements": "0.5154", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30524" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30524", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30524" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/ASA-202106-2", "reference_id": "ASA-202106-2", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202106-2" }, { "reference_url": "https://security.archlinux.org/AVG-1990", "reference_id": "AVG-1990", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1990" }, { "reference_url": "https://security.archlinux.org/AVG-1991", "reference_id": "AVG-1991", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1991" }, { "reference_url": "https://security.gentoo.org/glsa/202107-06", "reference_id": "GLSA-202107-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-06" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371184?format=api", "purl": "pkg:alpm/archlinux/vivaldi@4.0.2312.24-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-164n-utpb-2kbu" }, { "vulnerability": "VCID-1xad-pgff-w3ad" }, { "vulnerability": "VCID-7cbs-rmcu-rqgf" }, { "vulnerability": "VCID-ecm6-npvt-z7e4" }, { "vulnerability": "VCID-fu94-pehe-d7ax" }, { "vulnerability": "VCID-h77b-t3re-g3bm" }, { "vulnerability": "VCID-kt2w-ydf8-quh9" }, { "vulnerability": "VCID-teh4-fmg6-53ab" }, { "vulnerability": "VCID-w43e-g6rb-4bgf" }, { "vulnerability": "VCID-zvgk-sfcq-aycp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/vivaldi@4.0.2312.24-1" } ], "aliases": [ "CVE-2021-30524" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9u4b-zjdu-n3b3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49445?format=api", "vulnerability_id": "VCID-amkk-esp8-53af", "summary": "Multiple vulnerabillities have been found in Chromium and Google\n Chrome, the worst of which could allow remote attackers to execute\n arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30538", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00205", "scoring_system": "epss", "scoring_elements": "0.42665", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00205", "scoring_system": "epss", "scoring_elements": "0.42606", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00205", "scoring_system": "epss", "scoring_elements": "0.42544", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00205", "scoring_system": "epss", "scoring_elements": "0.42616", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00205", "scoring_system": "epss", "scoring_elements": "0.42644", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00205", "scoring_system": "epss", "scoring_elements": "0.42584", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00205", "scoring_system": "epss", "scoring_elements": "0.42636", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00205", "scoring_system": "epss", "scoring_elements": "0.42647", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00205", "scoring_system": "epss", "scoring_elements": "0.42671", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00205", "scoring_system": "epss", "scoring_elements": "0.42634", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30538" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30538", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30538" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/ASA-202106-2", "reference_id": "ASA-202106-2", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202106-2" }, { "reference_url": "https://security.archlinux.org/AVG-1990", "reference_id": "AVG-1990", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1990" }, { "reference_url": "https://security.archlinux.org/AVG-1991", "reference_id": "AVG-1991", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1991" }, { "reference_url": "https://security.gentoo.org/glsa/202107-06", "reference_id": "GLSA-202107-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-06" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371184?format=api", "purl": "pkg:alpm/archlinux/vivaldi@4.0.2312.24-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-164n-utpb-2kbu" }, { "vulnerability": "VCID-1xad-pgff-w3ad" }, { "vulnerability": "VCID-7cbs-rmcu-rqgf" }, { "vulnerability": "VCID-ecm6-npvt-z7e4" }, { "vulnerability": "VCID-fu94-pehe-d7ax" }, { "vulnerability": "VCID-h77b-t3re-g3bm" }, { "vulnerability": "VCID-kt2w-ydf8-quh9" }, { "vulnerability": "VCID-teh4-fmg6-53ab" }, { "vulnerability": "VCID-w43e-g6rb-4bgf" }, { "vulnerability": "VCID-zvgk-sfcq-aycp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/vivaldi@4.0.2312.24-1" } ], "aliases": [ "CVE-2021-30538" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-amkk-esp8-53af" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49441?format=api", "vulnerability_id": "VCID-aswr-a7yz-tbb3", "summary": "Multiple vulnerabillities have been found in Chromium and Google\n Chrome, the worst of which could allow remote attackers to execute\n arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30533", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.10532", "scoring_system": "epss", "scoring_elements": "0.93234", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.10532", "scoring_system": "epss", "scoring_elements": "0.93243", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.10532", "scoring_system": "epss", "scoring_elements": "0.93248", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.10532", "scoring_system": "epss", "scoring_elements": "0.93246", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.10532", "scoring_system": "epss", "scoring_elements": "0.93255", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.10532", "scoring_system": "epss", "scoring_elements": "0.93259", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.10532", "scoring_system": "epss", "scoring_elements": "0.93263", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.10532", "scoring_system": "epss", "scoring_elements": "0.93261", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.10532", "scoring_system": "epss", "scoring_elements": "0.93262", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.10532", "scoring_system": "epss", "scoring_elements": "0.9328", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30533" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30533", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30533" }, { "reference_url": "https://crbug.com/1145553", "reference_id": "1145553", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T15:04:01Z/" } ], "url": "https://crbug.com/1145553" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/ASA-202106-2", "reference_id": "ASA-202106-2", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202106-2" }, { "reference_url": "https://security.archlinux.org/AVG-1990", "reference_id": "AVG-1990", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1990" }, { "reference_url": "https://security.archlinux.org/AVG-1991", "reference_id": "AVG-1991", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1991" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ETMZL6IHCTCTREEL434BQ4THQ7EOHJ43/", "reference_id": "ETMZL6IHCTCTREEL434BQ4THQ7EOHJ43", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T15:04:01Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ETMZL6IHCTCTREEL434BQ4THQ7EOHJ43/" }, { "reference_url": "https://security.gentoo.org/glsa/202107-06", "reference_id": "GLSA-202107-06", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T15:04:01Z/" } ], "url": "https://security.gentoo.org/glsa/202107-06" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAT6EOXVQFE6JFMFQF4IKAOUQSHMHL54/", "reference_id": "PAT6EOXVQFE6JFMFQF4IKAOUQSHMHL54", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T15:04:01Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAT6EOXVQFE6JFMFQF4IKAOUQSHMHL54/" }, { "reference_url": "https://chromereleases.googleblog.com/2021/05/stable-channel-update-for-desktop_25.html", "reference_id": "stable-channel-update-for-desktop_25.html", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T15:04:01Z/" } ], "url": "https://chromereleases.googleblog.com/2021/05/stable-channel-update-for-desktop_25.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371184?format=api", "purl": "pkg:alpm/archlinux/vivaldi@4.0.2312.24-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-164n-utpb-2kbu" }, { "vulnerability": "VCID-1xad-pgff-w3ad" }, { "vulnerability": "VCID-7cbs-rmcu-rqgf" }, { "vulnerability": "VCID-ecm6-npvt-z7e4" }, { "vulnerability": "VCID-fu94-pehe-d7ax" }, { "vulnerability": "VCID-h77b-t3re-g3bm" }, { "vulnerability": "VCID-kt2w-ydf8-quh9" }, { "vulnerability": "VCID-teh4-fmg6-53ab" }, { "vulnerability": "VCID-w43e-g6rb-4bgf" }, { "vulnerability": "VCID-zvgk-sfcq-aycp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/vivaldi@4.0.2312.24-1" } ], "aliases": [ "CVE-2021-30533" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-aswr-a7yz-tbb3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49436?format=api", "vulnerability_id": "VCID-cntb-k34n-dbaq", "summary": "Multiple vulnerabillities have been found in Chromium and Google\n Chrome, the worst of which could allow remote attackers to execute\n arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30527", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55843", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55806", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55668", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.5578", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55802", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55782", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55833", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55836", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55844", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55825", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30527" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30527", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30527" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/ASA-202106-2", "reference_id": "ASA-202106-2", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202106-2" }, { "reference_url": "https://security.archlinux.org/AVG-1990", "reference_id": "AVG-1990", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1990" }, { "reference_url": "https://security.archlinux.org/AVG-1991", "reference_id": "AVG-1991", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1991" }, { "reference_url": "https://security.gentoo.org/glsa/202107-06", "reference_id": "GLSA-202107-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-06" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371184?format=api", "purl": "pkg:alpm/archlinux/vivaldi@4.0.2312.24-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-164n-utpb-2kbu" }, { "vulnerability": "VCID-1xad-pgff-w3ad" }, { "vulnerability": "VCID-7cbs-rmcu-rqgf" }, { "vulnerability": "VCID-ecm6-npvt-z7e4" }, { "vulnerability": "VCID-fu94-pehe-d7ax" }, { "vulnerability": "VCID-h77b-t3re-g3bm" }, { "vulnerability": "VCID-kt2w-ydf8-quh9" }, { "vulnerability": "VCID-teh4-fmg6-53ab" }, { "vulnerability": "VCID-w43e-g6rb-4bgf" }, { "vulnerability": "VCID-zvgk-sfcq-aycp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/vivaldi@4.0.2312.24-1" } ], "aliases": [ "CVE-2021-30527" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cntb-k34n-dbaq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49443?format=api", "vulnerability_id": "VCID-e5qg-urfz-37b6", "summary": "Multiple vulnerabillities have been found in Chromium and Google\n Chrome, the worst of which could allow remote attackers to execute\n arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30536", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01023", "scoring_system": "epss", "scoring_elements": "0.77291", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01023", "scoring_system": "epss", "scoring_elements": "0.77251", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01023", "scoring_system": "epss", "scoring_elements": "0.77191", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01023", "scoring_system": "epss", "scoring_elements": "0.77197", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01023", "scoring_system": "epss", "scoring_elements": "0.77226", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01023", "scoring_system": "epss", "scoring_elements": "0.77208", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01023", "scoring_system": "epss", "scoring_elements": "0.7724", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01023", "scoring_system": "epss", "scoring_elements": "0.77248", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01023", "scoring_system": "epss", "scoring_elements": "0.77275", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01023", "scoring_system": "epss", "scoring_elements": "0.77254", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30536" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30536", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30536" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/ASA-202106-2", "reference_id": "ASA-202106-2", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202106-2" }, { "reference_url": "https://security.archlinux.org/AVG-1990", "reference_id": "AVG-1990", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1990" }, { "reference_url": "https://security.archlinux.org/AVG-1991", "reference_id": "AVG-1991", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1991" }, { "reference_url": "https://security.gentoo.org/glsa/202107-06", "reference_id": "GLSA-202107-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-06" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371184?format=api", "purl": "pkg:alpm/archlinux/vivaldi@4.0.2312.24-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-164n-utpb-2kbu" }, { "vulnerability": "VCID-1xad-pgff-w3ad" }, { "vulnerability": "VCID-7cbs-rmcu-rqgf" }, { "vulnerability": "VCID-ecm6-npvt-z7e4" }, { "vulnerability": "VCID-fu94-pehe-d7ax" }, { "vulnerability": "VCID-h77b-t3re-g3bm" }, { "vulnerability": "VCID-kt2w-ydf8-quh9" }, { "vulnerability": "VCID-teh4-fmg6-53ab" }, { "vulnerability": "VCID-w43e-g6rb-4bgf" }, { "vulnerability": "VCID-zvgk-sfcq-aycp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/vivaldi@4.0.2312.24-1" } ], "aliases": [ "CVE-2021-30536" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e5qg-urfz-37b6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49446?format=api", "vulnerability_id": "VCID-ej7g-qqsm-y7ch", "summary": "Multiple vulnerabillities have been found in Chromium and Google\n Chrome, the worst of which could allow remote attackers to execute\n arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30539", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00139", "scoring_system": "epss", "scoring_elements": "0.34107", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00139", "scoring_system": "epss", "scoring_elements": "0.34071", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00139", "scoring_system": "epss", "scoring_elements": "0.33832", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00139", "scoring_system": "epss", "scoring_elements": "0.3417", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00139", "scoring_system": "epss", "scoring_elements": "0.34204", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00139", "scoring_system": "epss", "scoring_elements": "0.34066", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00139", "scoring_system": "epss", "scoring_elements": "0.34109", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00139", "scoring_system": "epss", "scoring_elements": "0.34139", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00139", "scoring_system": "epss", "scoring_elements": "0.34137", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00139", "scoring_system": "epss", "scoring_elements": "0.34095", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30539" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30539", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30539" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/ASA-202106-2", "reference_id": "ASA-202106-2", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202106-2" }, { "reference_url": "https://security.archlinux.org/AVG-1990", "reference_id": "AVG-1990", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1990" }, { "reference_url": "https://security.archlinux.org/AVG-1991", "reference_id": "AVG-1991", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1991" }, { "reference_url": "https://security.gentoo.org/glsa/202107-06", "reference_id": "GLSA-202107-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-06" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371184?format=api", "purl": "pkg:alpm/archlinux/vivaldi@4.0.2312.24-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-164n-utpb-2kbu" }, { "vulnerability": "VCID-1xad-pgff-w3ad" }, { "vulnerability": "VCID-7cbs-rmcu-rqgf" }, { "vulnerability": "VCID-ecm6-npvt-z7e4" }, { "vulnerability": "VCID-fu94-pehe-d7ax" }, { "vulnerability": "VCID-h77b-t3re-g3bm" }, { "vulnerability": "VCID-kt2w-ydf8-quh9" }, { "vulnerability": "VCID-teh4-fmg6-53ab" }, { "vulnerability": "VCID-w43e-g6rb-4bgf" }, { "vulnerability": "VCID-zvgk-sfcq-aycp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/vivaldi@4.0.2312.24-1" } ], "aliases": [ "CVE-2021-30539" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ej7g-qqsm-y7ch" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/94723?format=api", "vulnerability_id": "VCID-gdf5-fgc4-zqdp", "summary": "Use after free in Tab Strip in Google Chrome prior to 91.0.4472.77 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30542", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51129", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.5109", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.50995", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51049", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51073", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51031", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51088", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51084", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51128", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51107", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30542" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30542", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30542" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/ASA-202106-2", "reference_id": "ASA-202106-2", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202106-2" }, { "reference_url": "https://security.archlinux.org/AVG-1990", "reference_id": "AVG-1990", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1990" }, { "reference_url": "https://security.archlinux.org/AVG-1991", "reference_id": "AVG-1991", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1991" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371184?format=api", "purl": "pkg:alpm/archlinux/vivaldi@4.0.2312.24-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-164n-utpb-2kbu" }, { "vulnerability": "VCID-1xad-pgff-w3ad" }, { "vulnerability": "VCID-7cbs-rmcu-rqgf" }, { "vulnerability": "VCID-ecm6-npvt-z7e4" }, { "vulnerability": "VCID-fu94-pehe-d7ax" }, { "vulnerability": "VCID-h77b-t3re-g3bm" }, { "vulnerability": "VCID-kt2w-ydf8-quh9" }, { "vulnerability": "VCID-teh4-fmg6-53ab" }, { "vulnerability": "VCID-w43e-g6rb-4bgf" }, { "vulnerability": "VCID-zvgk-sfcq-aycp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/vivaldi@4.0.2312.24-1" } ], "aliases": [ "CVE-2021-30542" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gdf5-fgc4-zqdp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49438?format=api", "vulnerability_id": "VCID-jm7s-knrf-vqcj", "summary": "Multiple vulnerabillities have been found in Chromium and Google\n Chrome, the worst of which could allow remote attackers to execute\n arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30530", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00742", "scoring_system": "epss", "scoring_elements": "0.73009", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00742", "scoring_system": "epss", "scoring_elements": "0.72967", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00742", "scoring_system": "epss", "scoring_elements": "0.72911", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00742", "scoring_system": "epss", "scoring_elements": "0.72922", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00742", "scoring_system": "epss", "scoring_elements": "0.72942", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00742", "scoring_system": "epss", "scoring_elements": "0.72917", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00742", "scoring_system": "epss", "scoring_elements": "0.72955", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00742", "scoring_system": "epss", "scoring_elements": "0.72969", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00742", "scoring_system": "epss", "scoring_elements": "0.72994", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00742", "scoring_system": "epss", "scoring_elements": "0.72974", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30530" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30530", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30530" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/ASA-202106-2", "reference_id": "ASA-202106-2", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202106-2" }, { "reference_url": "https://security.archlinux.org/AVG-1990", "reference_id": "AVG-1990", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1990" }, { "reference_url": "https://security.archlinux.org/AVG-1991", "reference_id": "AVG-1991", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1991" }, { "reference_url": "https://security.gentoo.org/glsa/202107-06", "reference_id": "GLSA-202107-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-06" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371184?format=api", "purl": "pkg:alpm/archlinux/vivaldi@4.0.2312.24-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-164n-utpb-2kbu" }, { "vulnerability": "VCID-1xad-pgff-w3ad" }, { "vulnerability": "VCID-7cbs-rmcu-rqgf" }, { "vulnerability": "VCID-ecm6-npvt-z7e4" }, { "vulnerability": "VCID-fu94-pehe-d7ax" }, { "vulnerability": "VCID-h77b-t3re-g3bm" }, { "vulnerability": "VCID-kt2w-ydf8-quh9" }, { "vulnerability": "VCID-teh4-fmg6-53ab" }, { "vulnerability": "VCID-w43e-g6rb-4bgf" }, { "vulnerability": "VCID-zvgk-sfcq-aycp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/vivaldi@4.0.2312.24-1" } ], "aliases": [ "CVE-2021-30530" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jm7s-knrf-vqcj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/94721?format=api", "vulnerability_id": "VCID-k2cy-dr3z-83cy", "summary": "Use after free in Bookmarks in Google Chrome prior to 91.0.4472.77 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30529", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00241", "scoring_system": "epss", "scoring_elements": "0.47478", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00241", "scoring_system": "epss", "scoring_elements": "0.47419", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00241", "scoring_system": "epss", "scoring_elements": "0.47355", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00241", "scoring_system": "epss", "scoring_elements": "0.4739", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00241", "scoring_system": "epss", "scoring_elements": "0.47412", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00241", "scoring_system": "epss", "scoring_elements": "0.47361", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00241", "scoring_system": "epss", "scoring_elements": "0.47416", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00241", "scoring_system": "epss", "scoring_elements": "0.47415", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00241", "scoring_system": "epss", "scoring_elements": "0.47438", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00241", "scoring_system": "epss", "scoring_elements": "0.47413", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30529" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30529", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30529" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/ASA-202106-2", "reference_id": "ASA-202106-2", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202106-2" }, { "reference_url": "https://security.archlinux.org/AVG-1990", "reference_id": "AVG-1990", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1990" }, { "reference_url": "https://security.archlinux.org/AVG-1991", "reference_id": "AVG-1991", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1991" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371184?format=api", "purl": "pkg:alpm/archlinux/vivaldi@4.0.2312.24-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-164n-utpb-2kbu" }, { "vulnerability": "VCID-1xad-pgff-w3ad" }, { "vulnerability": "VCID-7cbs-rmcu-rqgf" }, { "vulnerability": "VCID-ecm6-npvt-z7e4" }, { "vulnerability": "VCID-fu94-pehe-d7ax" }, { "vulnerability": "VCID-h77b-t3re-g3bm" }, { "vulnerability": "VCID-kt2w-ydf8-quh9" }, { "vulnerability": "VCID-teh4-fmg6-53ab" }, { "vulnerability": "VCID-w43e-g6rb-4bgf" }, { "vulnerability": "VCID-zvgk-sfcq-aycp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/vivaldi@4.0.2312.24-1" } ], "aliases": [ "CVE-2021-30529" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k2cy-dr3z-83cy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49434?format=api", "vulnerability_id": "VCID-n1ux-5z1c-9ban", "summary": "Multiple vulnerabillities have been found in Chromium and Google\n Chrome, the worst of which could allow remote attackers to execute\n arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30525", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00353", "scoring_system": "epss", "scoring_elements": "0.57693", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00353", "scoring_system": "epss", "scoring_elements": "0.57664", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00353", "scoring_system": "epss", "scoring_elements": "0.5755", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00353", "scoring_system": "epss", "scoring_elements": "0.57635", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00353", "scoring_system": "epss", "scoring_elements": "0.57656", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00353", "scoring_system": "epss", "scoring_elements": "0.57632", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00353", "scoring_system": "epss", "scoring_elements": "0.57686", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00353", "scoring_system": "epss", "scoring_elements": "0.57689", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00353", "scoring_system": "epss", "scoring_elements": "0.57704", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00353", "scoring_system": "epss", "scoring_elements": "0.57683", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30525" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30525", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30525" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/ASA-202106-2", "reference_id": "ASA-202106-2", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202106-2" }, { "reference_url": "https://security.archlinux.org/AVG-1990", "reference_id": "AVG-1990", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1990" }, { "reference_url": "https://security.archlinux.org/AVG-1991", "reference_id": "AVG-1991", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1991" }, { "reference_url": "https://security.gentoo.org/glsa/202107-06", "reference_id": "GLSA-202107-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-06" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371184?format=api", "purl": "pkg:alpm/archlinux/vivaldi@4.0.2312.24-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-164n-utpb-2kbu" }, { "vulnerability": "VCID-1xad-pgff-w3ad" }, { "vulnerability": "VCID-7cbs-rmcu-rqgf" }, { "vulnerability": "VCID-ecm6-npvt-z7e4" }, { "vulnerability": "VCID-fu94-pehe-d7ax" }, { "vulnerability": "VCID-h77b-t3re-g3bm" }, { "vulnerability": "VCID-kt2w-ydf8-quh9" }, { "vulnerability": "VCID-teh4-fmg6-53ab" }, { "vulnerability": "VCID-w43e-g6rb-4bgf" }, { "vulnerability": "VCID-zvgk-sfcq-aycp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/vivaldi@4.0.2312.24-1" } ], "aliases": [ "CVE-2021-30525" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n1ux-5z1c-9ban" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49435?format=api", "vulnerability_id": "VCID-qdw1-rhx2-e3fu", "summary": "Multiple vulnerabillities have been found in Chromium and Google\n Chrome, the worst of which could allow remote attackers to execute\n arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30526", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55843", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55806", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55668", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.5578", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55802", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55782", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55833", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55836", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55844", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55825", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30526" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30526", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30526" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/ASA-202106-2", "reference_id": "ASA-202106-2", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202106-2" }, { "reference_url": "https://security.archlinux.org/AVG-1990", "reference_id": "AVG-1990", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1990" }, { "reference_url": "https://security.archlinux.org/AVG-1991", "reference_id": "AVG-1991", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1991" }, { "reference_url": "https://security.gentoo.org/glsa/202107-06", "reference_id": "GLSA-202107-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-06" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371184?format=api", "purl": "pkg:alpm/archlinux/vivaldi@4.0.2312.24-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-164n-utpb-2kbu" }, { "vulnerability": "VCID-1xad-pgff-w3ad" }, { "vulnerability": "VCID-7cbs-rmcu-rqgf" }, { "vulnerability": "VCID-ecm6-npvt-z7e4" }, { "vulnerability": "VCID-fu94-pehe-d7ax" }, { "vulnerability": "VCID-h77b-t3re-g3bm" }, { "vulnerability": "VCID-kt2w-ydf8-quh9" }, { "vulnerability": "VCID-teh4-fmg6-53ab" }, { "vulnerability": "VCID-w43e-g6rb-4bgf" }, { "vulnerability": "VCID-zvgk-sfcq-aycp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/vivaldi@4.0.2312.24-1" } ], "aliases": [ "CVE-2021-30526" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qdw1-rhx2-e3fu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49444?format=api", "vulnerability_id": "VCID-rfg6-a1b3-2qa4", "summary": "Multiple vulnerabillities have been found in Chromium and Google\n Chrome, the worst of which could allow remote attackers to execute\n arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30537", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30631", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30606", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.306", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30736", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30784", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30658", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.3069", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30695", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30651", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30537" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30537", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30537" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/ASA-202106-2", "reference_id": "ASA-202106-2", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202106-2" }, { "reference_url": "https://security.archlinux.org/AVG-1990", "reference_id": "AVG-1990", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1990" }, { "reference_url": "https://security.archlinux.org/AVG-1991", "reference_id": "AVG-1991", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1991" }, { "reference_url": "https://security.gentoo.org/glsa/202107-06", "reference_id": "GLSA-202107-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-06" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371184?format=api", "purl": "pkg:alpm/archlinux/vivaldi@4.0.2312.24-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-164n-utpb-2kbu" }, { "vulnerability": "VCID-1xad-pgff-w3ad" }, { "vulnerability": "VCID-7cbs-rmcu-rqgf" }, { "vulnerability": "VCID-ecm6-npvt-z7e4" }, { "vulnerability": "VCID-fu94-pehe-d7ax" }, { "vulnerability": "VCID-h77b-t3re-g3bm" }, { "vulnerability": "VCID-kt2w-ydf8-quh9" }, { "vulnerability": "VCID-teh4-fmg6-53ab" }, { "vulnerability": "VCID-w43e-g6rb-4bgf" }, { "vulnerability": "VCID-zvgk-sfcq-aycp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/vivaldi@4.0.2312.24-1" } ], "aliases": [ "CVE-2021-30537" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rfg6-a1b3-2qa4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49439?format=api", "vulnerability_id": "VCID-rx6k-fvxg-ruh7", "summary": "Multiple vulnerabillities have been found in Chromium and Google\n Chrome, the worst of which could allow remote attackers to execute\n arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30531", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00374", "scoring_system": "epss", "scoring_elements": "0.59117", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00374", "scoring_system": "epss", "scoring_elements": "0.5908", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00374", "scoring_system": "epss", "scoring_elements": "0.58981", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00374", "scoring_system": "epss", "scoring_elements": "0.59056", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00374", "scoring_system": "epss", "scoring_elements": "0.59079", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00374", "scoring_system": "epss", "scoring_elements": "0.59044", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00374", "scoring_system": "epss", "scoring_elements": "0.59094", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00374", "scoring_system": "epss", "scoring_elements": "0.59099", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00374", "scoring_system": "epss", "scoring_elements": "0.59118", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30531" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30531", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30531" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/ASA-202106-2", "reference_id": "ASA-202106-2", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202106-2" }, { "reference_url": "https://security.archlinux.org/AVG-1990", "reference_id": "AVG-1990", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1990" }, { "reference_url": "https://security.archlinux.org/AVG-1991", "reference_id": "AVG-1991", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1991" }, { "reference_url": "https://security.gentoo.org/glsa/202107-06", "reference_id": "GLSA-202107-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-06" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371184?format=api", "purl": "pkg:alpm/archlinux/vivaldi@4.0.2312.24-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-164n-utpb-2kbu" }, { "vulnerability": "VCID-1xad-pgff-w3ad" }, { "vulnerability": "VCID-7cbs-rmcu-rqgf" }, { "vulnerability": "VCID-ecm6-npvt-z7e4" }, { "vulnerability": "VCID-fu94-pehe-d7ax" }, { "vulnerability": "VCID-h77b-t3re-g3bm" }, { "vulnerability": "VCID-kt2w-ydf8-quh9" }, { "vulnerability": "VCID-teh4-fmg6-53ab" }, { "vulnerability": "VCID-w43e-g6rb-4bgf" }, { "vulnerability": "VCID-zvgk-sfcq-aycp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/vivaldi@4.0.2312.24-1" } ], "aliases": [ "CVE-2021-30531" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rx6k-fvxg-ruh7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49440?format=api", "vulnerability_id": "VCID-s575-newv-r3h9", "summary": "Multiple vulnerabillities have been found in Chromium and Google\n Chrome, the worst of which could allow remote attackers to execute\n arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30532", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00558", "scoring_system": "epss", "scoring_elements": "0.68242", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00558", "scoring_system": "epss", "scoring_elements": "0.68203", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00558", "scoring_system": "epss", "scoring_elements": "0.6814", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00558", "scoring_system": "epss", "scoring_elements": "0.68163", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00558", "scoring_system": "epss", "scoring_elements": "0.6818", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00558", "scoring_system": "epss", "scoring_elements": "0.68158", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00558", "scoring_system": "epss", "scoring_elements": "0.68209", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00558", "scoring_system": "epss", "scoring_elements": "0.68224", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00558", "scoring_system": "epss", "scoring_elements": "0.6825", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00558", "scoring_system": "epss", "scoring_elements": "0.68236", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30532" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30532", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30532" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/ASA-202106-2", "reference_id": "ASA-202106-2", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202106-2" }, { "reference_url": "https://security.archlinux.org/AVG-1990", "reference_id": "AVG-1990", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1990" }, { "reference_url": "https://security.archlinux.org/AVG-1991", "reference_id": "AVG-1991", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1991" }, { "reference_url": "https://security.gentoo.org/glsa/202107-06", "reference_id": "GLSA-202107-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-06" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371184?format=api", "purl": "pkg:alpm/archlinux/vivaldi@4.0.2312.24-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-164n-utpb-2kbu" }, { "vulnerability": "VCID-1xad-pgff-w3ad" }, { "vulnerability": "VCID-7cbs-rmcu-rqgf" }, { "vulnerability": "VCID-ecm6-npvt-z7e4" }, { "vulnerability": "VCID-fu94-pehe-d7ax" }, { "vulnerability": "VCID-h77b-t3re-g3bm" }, { "vulnerability": "VCID-kt2w-ydf8-quh9" }, { "vulnerability": "VCID-teh4-fmg6-53ab" }, { "vulnerability": "VCID-w43e-g6rb-4bgf" }, { "vulnerability": "VCID-zvgk-sfcq-aycp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/vivaldi@4.0.2312.24-1" } ], "aliases": [ "CVE-2021-30532" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s575-newv-r3h9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/94722?format=api", "vulnerability_id": "VCID-v547-6z4g-kba3", "summary": "Double free in ICU in Google Chrome prior to 91.0.4472.77 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30535", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00559", "scoring_system": "epss", "scoring_elements": "0.68275", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00559", "scoring_system": "epss", "scoring_elements": "0.68235", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00559", "scoring_system": "epss", "scoring_elements": "0.68173", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00559", "scoring_system": "epss", "scoring_elements": "0.68196", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00559", "scoring_system": "epss", "scoring_elements": "0.68214", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00559", "scoring_system": "epss", "scoring_elements": "0.6819", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00559", "scoring_system": "epss", "scoring_elements": "0.68241", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00559", "scoring_system": "epss", "scoring_elements": "0.68256", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00559", "scoring_system": "epss", "scoring_elements": "0.68281", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00559", "scoring_system": "epss", "scoring_elements": "0.68269", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30535" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30535", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30535" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/ASA-202106-2", "reference_id": "ASA-202106-2", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202106-2" }, { "reference_url": "https://security.archlinux.org/AVG-1990", "reference_id": "AVG-1990", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1990" }, { "reference_url": "https://security.archlinux.org/AVG-1991", "reference_id": "AVG-1991", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1991" }, { "reference_url": "https://usn.ubuntu.com/5156-1/", "reference_id": "USN-5156-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5156-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371184?format=api", "purl": "pkg:alpm/archlinux/vivaldi@4.0.2312.24-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-164n-utpb-2kbu" }, { "vulnerability": "VCID-1xad-pgff-w3ad" }, { "vulnerability": "VCID-7cbs-rmcu-rqgf" }, { "vulnerability": "VCID-ecm6-npvt-z7e4" }, { "vulnerability": "VCID-fu94-pehe-d7ax" }, { "vulnerability": "VCID-h77b-t3re-g3bm" }, { "vulnerability": "VCID-kt2w-ydf8-quh9" }, { "vulnerability": "VCID-teh4-fmg6-53ab" }, { "vulnerability": "VCID-w43e-g6rb-4bgf" }, { "vulnerability": "VCID-zvgk-sfcq-aycp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/vivaldi@4.0.2312.24-1" } ], "aliases": [ "CVE-2021-30535" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v547-6z4g-kba3" } ], "risk_score": "10.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/vivaldi@4.0.2312.24-1" }