Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/371977?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/371977?format=api", "purl": "pkg:alpm/archlinux/vivaldi@4.1.2369.11-1", "type": "alpm", "namespace": "archlinux", "name": "vivaldi", "version": "4.1.2369.11-1", "qualifiers": {}, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": "4.1.2369.15-1", "latest_non_vulnerable_version": "5.0.2497.30-1", "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42704?format=api", "vulnerability_id": "VCID-2g46-mfs3-n7bw", "summary": "Multiple vulnerabilities have been found in Chromium and Google\n\t Chrome, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30594", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00305", "scoring_system": "epss", "scoring_elements": "0.53773", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00305", "scoring_system": "epss", "scoring_elements": "0.53736", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00305", "scoring_system": "epss", "scoring_elements": "0.53655", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00305", "scoring_system": "epss", "scoring_elements": "0.53675", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00305", "scoring_system": "epss", "scoring_elements": "0.53702", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00305", "scoring_system": "epss", "scoring_elements": "0.5367", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00305", "scoring_system": "epss", "scoring_elements": "0.53723", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00305", "scoring_system": "epss", "scoring_elements": "0.5372", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00305", "scoring_system": "epss", "scoring_elements": "0.53769", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00305", "scoring_system": "epss", "scoring_elements": "0.53752", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30594" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30594", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30594" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/ASA-202108-4", "reference_id": "ASA-202108-4", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202108-4" }, { "reference_url": "https://security.archlinux.org/ASA-202108-6", "reference_id": "ASA-202108-6", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202108-6" }, { "reference_url": "https://security.archlinux.org/AVG-2246", "reference_id": "AVG-2246", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2246" }, { "reference_url": "https://security.archlinux.org/AVG-2247", "reference_id": "AVG-2247", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2247" }, { "reference_url": "https://security.gentoo.org/glsa/202201-02", "reference_id": "GLSA-202201-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202201-02" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371978?format=api", "purl": "pkg:alpm/archlinux/vivaldi@4.1.2369.15-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/vivaldi@4.1.2369.15-1" } ], "aliases": [ "CVE-2021-30594" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2g46-mfs3-n7bw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42702?format=api", "vulnerability_id": "VCID-3zs9-1ckz-z7a9", "summary": "Multiple vulnerabilities have been found in Chromium and Google\n\t Chrome, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30592", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00232", "scoring_system": "epss", "scoring_elements": "0.46153", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00232", "scoring_system": "epss", "scoring_elements": "0.46098", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00232", "scoring_system": "epss", "scoring_elements": "0.46031", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00232", "scoring_system": "epss", "scoring_elements": "0.46071", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00232", "scoring_system": "epss", "scoring_elements": "0.46092", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00232", "scoring_system": "epss", "scoring_elements": "0.4604", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00232", "scoring_system": "epss", "scoring_elements": "0.46096", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00232", "scoring_system": "epss", "scoring_elements": "0.46093", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00232", "scoring_system": "epss", "scoring_elements": "0.46117", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00232", "scoring_system": "epss", "scoring_elements": "0.46089", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30592" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30592", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30592" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/ASA-202108-4", "reference_id": "ASA-202108-4", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202108-4" }, { "reference_url": "https://security.archlinux.org/ASA-202108-6", "reference_id": "ASA-202108-6", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202108-6" }, { "reference_url": "https://security.archlinux.org/AVG-2246", "reference_id": "AVG-2246", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2246" }, { "reference_url": "https://security.archlinux.org/AVG-2247", "reference_id": "AVG-2247", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2247" }, { "reference_url": "https://security.gentoo.org/glsa/202201-02", "reference_id": "GLSA-202201-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202201-02" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371978?format=api", "purl": "pkg:alpm/archlinux/vivaldi@4.1.2369.15-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/vivaldi@4.1.2369.15-1" } ], "aliases": [ "CVE-2021-30592" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3zs9-1ckz-z7a9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42707?format=api", "vulnerability_id": "VCID-f713-v3uf-ckdc", "summary": "Multiple vulnerabilities have been found in Chromium and Google\n\t Chrome, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30597", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00281", "scoring_system": "epss", "scoring_elements": "0.515", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00281", "scoring_system": "epss", "scoring_elements": "0.51457", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00281", "scoring_system": "epss", "scoring_elements": "0.5136", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00281", "scoring_system": "epss", "scoring_elements": "0.51411", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00281", "scoring_system": "epss", "scoring_elements": "0.51438", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00281", "scoring_system": "epss", "scoring_elements": "0.51397", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00281", "scoring_system": "epss", "scoring_elements": "0.51451", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00281", "scoring_system": "epss", "scoring_elements": "0.51448", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00281", "scoring_system": "epss", "scoring_elements": "0.51491", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00281", "scoring_system": "epss", "scoring_elements": "0.5147", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30597" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30597", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30597" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/ASA-202108-4", "reference_id": "ASA-202108-4", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202108-4" }, { "reference_url": "https://security.archlinux.org/ASA-202108-6", "reference_id": "ASA-202108-6", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202108-6" }, { "reference_url": "https://security.archlinux.org/AVG-2246", "reference_id": "AVG-2246", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2246" }, { "reference_url": "https://security.archlinux.org/AVG-2247", "reference_id": "AVG-2247", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2247" }, { "reference_url": "https://security.gentoo.org/glsa/202201-02", "reference_id": "GLSA-202201-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202201-02" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371978?format=api", "purl": "pkg:alpm/archlinux/vivaldi@4.1.2369.15-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/vivaldi@4.1.2369.15-1" } ], "aliases": [ "CVE-2021-30597" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f713-v3uf-ckdc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42700?format=api", "vulnerability_id": "VCID-rfsa-81fh-7fc9", "summary": "Multiple vulnerabilities have been found in Chromium and Google\n\t Chrome, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30590", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00436", "scoring_system": "epss", "scoring_elements": "0.63043", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00436", "scoring_system": "epss", "scoring_elements": "0.63006", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00436", "scoring_system": "epss", "scoring_elements": "0.62906", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00436", "scoring_system": "epss", "scoring_elements": "0.62965", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00436", "scoring_system": "epss", "scoring_elements": "0.62993", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00436", "scoring_system": "epss", "scoring_elements": "0.62958", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00436", "scoring_system": "epss", "scoring_elements": "0.63009", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00436", "scoring_system": "epss", "scoring_elements": "0.63025", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00436", "scoring_system": "epss", "scoring_elements": "0.63042", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00436", "scoring_system": "epss", "scoring_elements": "0.63028", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30590" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30590", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30590" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/ASA-202108-4", "reference_id": "ASA-202108-4", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202108-4" }, { "reference_url": "https://security.archlinux.org/ASA-202108-6", "reference_id": "ASA-202108-6", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202108-6" }, { "reference_url": "https://security.archlinux.org/AVG-2246", "reference_id": "AVG-2246", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2246" }, { "reference_url": "https://security.archlinux.org/AVG-2247", "reference_id": "AVG-2247", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2247" }, { "reference_url": "https://security.gentoo.org/glsa/202201-02", "reference_id": "GLSA-202201-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202201-02" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371978?format=api", "purl": "pkg:alpm/archlinux/vivaldi@4.1.2369.15-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/vivaldi@4.1.2369.15-1" } ], "aliases": [ "CVE-2021-30590" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rfsa-81fh-7fc9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42703?format=api", "vulnerability_id": "VCID-v66z-hkt8-bkep", "summary": "Multiple vulnerabilities have been found in Chromium and Google\n\t Chrome, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30593", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00252", "scoring_system": "epss", "scoring_elements": "0.48626", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00252", "scoring_system": "epss", "scoring_elements": "0.48576", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00252", "scoring_system": "epss", "scoring_elements": "0.48509", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00252", "scoring_system": "epss", "scoring_elements": "0.48544", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00252", "scoring_system": "epss", "scoring_elements": "0.48567", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00252", "scoring_system": "epss", "scoring_elements": "0.48519", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00252", "scoring_system": "epss", "scoring_elements": "0.48573", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00252", "scoring_system": "epss", "scoring_elements": "0.48569", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00252", "scoring_system": "epss", "scoring_elements": "0.4859", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00252", "scoring_system": "epss", "scoring_elements": "0.48563", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30593" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30593", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30593" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/ASA-202108-4", "reference_id": "ASA-202108-4", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202108-4" }, { "reference_url": "https://security.archlinux.org/ASA-202108-6", "reference_id": "ASA-202108-6", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202108-6" }, { "reference_url": "https://security.archlinux.org/AVG-2246", "reference_id": "AVG-2246", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2246" }, { "reference_url": "https://security.archlinux.org/AVG-2247", "reference_id": "AVG-2247", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2247" }, { "reference_url": "https://security.gentoo.org/glsa/202201-02", "reference_id": "GLSA-202201-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202201-02" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371978?format=api", "purl": "pkg:alpm/archlinux/vivaldi@4.1.2369.15-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/vivaldi@4.1.2369.15-1" } ], "aliases": [ "CVE-2021-30593" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v66z-hkt8-bkep" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42701?format=api", "vulnerability_id": "VCID-w1g4-7qex-aqdp", "summary": "Multiple vulnerabilities have been found in Chromium and Google\n\t Chrome, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30591", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65097", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.6506", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.64979", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65029", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65056", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65017", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65067", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65081", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65099", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65088", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30591" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30591", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30591" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/ASA-202108-4", "reference_id": "ASA-202108-4", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202108-4" }, { "reference_url": "https://security.archlinux.org/ASA-202108-6", "reference_id": "ASA-202108-6", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202108-6" }, { "reference_url": "https://security.archlinux.org/AVG-2246", "reference_id": "AVG-2246", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2246" }, { "reference_url": "https://security.archlinux.org/AVG-2247", "reference_id": "AVG-2247", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2247" }, { "reference_url": "https://security.gentoo.org/glsa/202201-02", "reference_id": "GLSA-202201-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202201-02" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371978?format=api", "purl": "pkg:alpm/archlinux/vivaldi@4.1.2369.15-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/vivaldi@4.1.2369.15-1" } ], "aliases": [ "CVE-2021-30591" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w1g4-7qex-aqdp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42705?format=api", "vulnerability_id": "VCID-xr49-gua9-r7cy", "summary": "Multiple vulnerabilities have been found in Chromium and Google\n\t Chrome, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30596", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00204", "scoring_system": "epss", "scoring_elements": "0.42615", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00204", "scoring_system": "epss", "scoring_elements": "0.42555", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00204", "scoring_system": "epss", "scoring_elements": "0.425", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00204", "scoring_system": "epss", "scoring_elements": "0.42571", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00204", "scoring_system": "epss", "scoring_elements": "0.42599", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00204", "scoring_system": "epss", "scoring_elements": "0.42537", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00204", "scoring_system": "epss", "scoring_elements": "0.42589", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00204", "scoring_system": "epss", "scoring_elements": "0.42621", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00204", "scoring_system": "epss", "scoring_elements": "0.42584", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30596" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30596", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30596" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/ASA-202108-4", "reference_id": "ASA-202108-4", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202108-4" }, { "reference_url": "https://security.archlinux.org/ASA-202108-6", "reference_id": "ASA-202108-6", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202108-6" }, { "reference_url": "https://security.archlinux.org/AVG-2246", "reference_id": "AVG-2246", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2246" }, { "reference_url": "https://security.archlinux.org/AVG-2247", "reference_id": "AVG-2247", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2247" }, { "reference_url": "https://security.gentoo.org/glsa/202201-02", "reference_id": "GLSA-202201-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202201-02" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371978?format=api", "purl": "pkg:alpm/archlinux/vivaldi@4.1.2369.15-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/vivaldi@4.1.2369.15-1" } ], "aliases": [ "CVE-2021-30596" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xr49-gua9-r7cy" } ], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42684?format=api", "vulnerability_id": "VCID-1xkx-h8rm-1kay", "summary": "Multiple vulnerabilities have been found in Chromium and Google\n\t Chrome, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30574", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74176", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74138", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74091", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74096", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74123", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74094", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74126", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74141", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74163", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74144", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30574" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30574", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30574" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/ASA-202107-47", "reference_id": "ASA-202107-47", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202107-47" }, { "reference_url": "https://security.archlinux.org/ASA-202107-74", "reference_id": "ASA-202107-74", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202107-74" }, { "reference_url": "https://security.archlinux.org/AVG-2200", "reference_id": "AVG-2200", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2200" }, { "reference_url": "https://security.archlinux.org/AVG-2202", "reference_id": "AVG-2202", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2202" }, { "reference_url": "https://security.gentoo.org/glsa/202201-02", "reference_id": "GLSA-202201-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202201-02" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371977?format=api", "purl": "pkg:alpm/archlinux/vivaldi@4.1.2369.11-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2g46-mfs3-n7bw" }, { "vulnerability": "VCID-3zs9-1ckz-z7a9" }, { "vulnerability": "VCID-f713-v3uf-ckdc" }, { "vulnerability": "VCID-rfsa-81fh-7fc9" }, { "vulnerability": "VCID-v66z-hkt8-bkep" }, { "vulnerability": "VCID-w1g4-7qex-aqdp" }, { "vulnerability": "VCID-xr49-gua9-r7cy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/vivaldi@4.1.2369.11-1" } ], "aliases": [ "CVE-2021-30574" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1xkx-h8rm-1kay" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42683?format=api", "vulnerability_id": "VCID-3nsk-qkgp-8kcw", "summary": "Multiple vulnerabilities have been found in Chromium and Google\n\t Chrome, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30573", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.6456", "scoring_system": "epss", "scoring_elements": "0.98461", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.6456", "scoring_system": "epss", "scoring_elements": "0.98455", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.6456", "scoring_system": "epss", "scoring_elements": "0.98441", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.6456", "scoring_system": "epss", "scoring_elements": "0.98443", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.6456", "scoring_system": "epss", "scoring_elements": "0.98446", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.6456", "scoring_system": "epss", "scoring_elements": "0.98448", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.6456", "scoring_system": "epss", "scoring_elements": "0.98452", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.6456", "scoring_system": "epss", "scoring_elements": "0.98453", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.6456", "scoring_system": "epss", "scoring_elements": "0.98456", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30573" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30573", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30573" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/ASA-202107-47", "reference_id": "ASA-202107-47", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202107-47" }, { "reference_url": "https://security.archlinux.org/ASA-202107-74", "reference_id": "ASA-202107-74", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202107-74" }, { "reference_url": "https://security.archlinux.org/AVG-2200", "reference_id": "AVG-2200", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2200" }, { "reference_url": "https://security.archlinux.org/AVG-2202", "reference_id": "AVG-2202", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2202" }, { "reference_url": "https://security.gentoo.org/glsa/202201-02", "reference_id": "GLSA-202201-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202201-02" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371977?format=api", "purl": "pkg:alpm/archlinux/vivaldi@4.1.2369.11-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2g46-mfs3-n7bw" }, { "vulnerability": "VCID-3zs9-1ckz-z7a9" }, { "vulnerability": "VCID-f713-v3uf-ckdc" }, { "vulnerability": "VCID-rfsa-81fh-7fc9" }, { "vulnerability": "VCID-v66z-hkt8-bkep" }, { "vulnerability": "VCID-w1g4-7qex-aqdp" }, { "vulnerability": "VCID-xr49-gua9-r7cy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/vivaldi@4.1.2369.11-1" } ], "aliases": [ "CVE-2021-30573" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3nsk-qkgp-8kcw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42679?format=api", "vulnerability_id": "VCID-3zbq-xqba-cqae", "summary": "Multiple vulnerabilities have been found in Chromium and Google\n\t Chrome, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30568", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01004", "scoring_system": "epss", "scoring_elements": "0.77064", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01004", "scoring_system": "epss", "scoring_elements": "0.77023", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01004", "scoring_system": "epss", "scoring_elements": "0.76959", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01004", "scoring_system": "epss", "scoring_elements": "0.76965", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01004", "scoring_system": "epss", "scoring_elements": "0.76995", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01004", "scoring_system": "epss", "scoring_elements": "0.76977", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01004", "scoring_system": "epss", "scoring_elements": "0.77009", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01004", "scoring_system": "epss", "scoring_elements": "0.7702", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01004", "scoring_system": "epss", "scoring_elements": "0.77048", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01004", "scoring_system": "epss", "scoring_elements": "0.77027", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30568" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30568", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30568" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/ASA-202107-47", "reference_id": "ASA-202107-47", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202107-47" }, { "reference_url": "https://security.archlinux.org/ASA-202107-74", "reference_id": "ASA-202107-74", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202107-74" }, { "reference_url": "https://security.archlinux.org/AVG-2200", "reference_id": "AVG-2200", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2200" }, { "reference_url": "https://security.archlinux.org/AVG-2202", "reference_id": "AVG-2202", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2202" }, { "reference_url": "https://security.gentoo.org/glsa/202201-02", "reference_id": "GLSA-202201-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202201-02" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371977?format=api", "purl": "pkg:alpm/archlinux/vivaldi@4.1.2369.11-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2g46-mfs3-n7bw" }, { "vulnerability": "VCID-3zs9-1ckz-z7a9" }, { "vulnerability": "VCID-f713-v3uf-ckdc" }, { "vulnerability": "VCID-rfsa-81fh-7fc9" }, { "vulnerability": "VCID-v66z-hkt8-bkep" }, { "vulnerability": "VCID-w1g4-7qex-aqdp" }, { "vulnerability": "VCID-xr49-gua9-r7cy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/vivaldi@4.1.2369.11-1" } ], "aliases": [ "CVE-2021-30568" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3zbq-xqba-cqae" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42694?format=api", "vulnerability_id": "VCID-53mp-udra-8yfu", "summary": "Multiple vulnerabilities have been found in Chromium and Google\n\t Chrome, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30584", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00408", "scoring_system": "epss", "scoring_elements": "0.61235", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00408", "scoring_system": "epss", "scoring_elements": "0.61195", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00408", "scoring_system": "epss", "scoring_elements": "0.61073", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00408", "scoring_system": "epss", "scoring_elements": "0.6115", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00408", "scoring_system": "epss", "scoring_elements": "0.61178", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00408", "scoring_system": "epss", "scoring_elements": "0.61144", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00408", "scoring_system": "epss", "scoring_elements": "0.61192", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00408", "scoring_system": "epss", "scoring_elements": "0.61207", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00408", "scoring_system": "epss", "scoring_elements": "0.61227", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00408", "scoring_system": "epss", "scoring_elements": "0.61214", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30584" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30584", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30584" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/ASA-202107-47", "reference_id": "ASA-202107-47", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202107-47" }, { "reference_url": "https://security.archlinux.org/ASA-202107-74", "reference_id": "ASA-202107-74", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202107-74" }, { "reference_url": "https://security.archlinux.org/AVG-2200", "reference_id": "AVG-2200", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2200" }, { "reference_url": "https://security.archlinux.org/AVG-2202", "reference_id": "AVG-2202", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2202" }, { "reference_url": "https://security.gentoo.org/glsa/202201-02", "reference_id": "GLSA-202201-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202201-02" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371977?format=api", "purl": "pkg:alpm/archlinux/vivaldi@4.1.2369.11-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2g46-mfs3-n7bw" }, { "vulnerability": "VCID-3zs9-1ckz-z7a9" }, { "vulnerability": "VCID-f713-v3uf-ckdc" }, { "vulnerability": "VCID-rfsa-81fh-7fc9" }, { "vulnerability": "VCID-v66z-hkt8-bkep" }, { "vulnerability": "VCID-w1g4-7qex-aqdp" }, { "vulnerability": "VCID-xr49-gua9-r7cy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/vivaldi@4.1.2369.11-1" } ], "aliases": [ "CVE-2021-30584" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-53mp-udra-8yfu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42681?format=api", "vulnerability_id": "VCID-7mqs-mz7b-pygm", "summary": "Multiple vulnerabilities have been found in Chromium and Google\n\t Chrome, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30571", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00235", "scoring_system": "epss", "scoring_elements": "0.46528", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00235", "scoring_system": "epss", "scoring_elements": "0.4647", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00235", "scoring_system": "epss", "scoring_elements": "0.46402", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00235", "scoring_system": "epss", "scoring_elements": "0.46441", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00235", "scoring_system": "epss", "scoring_elements": "0.46461", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00235", "scoring_system": "epss", "scoring_elements": "0.4641", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00235", "scoring_system": "epss", "scoring_elements": "0.46466", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00235", "scoring_system": "epss", "scoring_elements": "0.4649", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30571" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30571", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30571" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/ASA-202107-47", "reference_id": "ASA-202107-47", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202107-47" }, { "reference_url": "https://security.archlinux.org/ASA-202107-74", "reference_id": "ASA-202107-74", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202107-74" }, { "reference_url": "https://security.archlinux.org/AVG-2200", "reference_id": "AVG-2200", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2200" }, { "reference_url": "https://security.archlinux.org/AVG-2202", "reference_id": "AVG-2202", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2202" }, { "reference_url": "https://security.gentoo.org/glsa/202201-02", "reference_id": "GLSA-202201-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202201-02" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371977?format=api", "purl": "pkg:alpm/archlinux/vivaldi@4.1.2369.11-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2g46-mfs3-n7bw" }, { "vulnerability": "VCID-3zs9-1ckz-z7a9" }, { "vulnerability": "VCID-f713-v3uf-ckdc" }, { "vulnerability": "VCID-rfsa-81fh-7fc9" }, { "vulnerability": "VCID-v66z-hkt8-bkep" }, { "vulnerability": "VCID-w1g4-7qex-aqdp" }, { "vulnerability": "VCID-xr49-gua9-r7cy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/vivaldi@4.1.2369.11-1" } ], "aliases": [ "CVE-2021-30571" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7mqs-mz7b-pygm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42680?format=api", "vulnerability_id": "VCID-85ca-gzsm-dyd7", "summary": "Multiple vulnerabilities have been found in Chromium and Google\n\t Chrome, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30569", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74176", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74138", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74091", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74096", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74123", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74094", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74126", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74141", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74163", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74144", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30569" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30569", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30569" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/ASA-202107-47", "reference_id": "ASA-202107-47", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202107-47" }, { "reference_url": "https://security.archlinux.org/ASA-202107-74", "reference_id": "ASA-202107-74", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202107-74" }, { "reference_url": "https://security.archlinux.org/AVG-2200", "reference_id": "AVG-2200", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2200" }, { "reference_url": "https://security.archlinux.org/AVG-2202", "reference_id": "AVG-2202", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2202" }, { "reference_url": "https://security.gentoo.org/glsa/202201-02", "reference_id": "GLSA-202201-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202201-02" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371977?format=api", "purl": "pkg:alpm/archlinux/vivaldi@4.1.2369.11-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2g46-mfs3-n7bw" }, { "vulnerability": "VCID-3zs9-1ckz-z7a9" }, { "vulnerability": "VCID-f713-v3uf-ckdc" }, { "vulnerability": "VCID-rfsa-81fh-7fc9" }, { "vulnerability": "VCID-v66z-hkt8-bkep" }, { "vulnerability": "VCID-w1g4-7qex-aqdp" }, { "vulnerability": "VCID-xr49-gua9-r7cy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/vivaldi@4.1.2369.11-1" } ], "aliases": [ "CVE-2021-30569" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-85ca-gzsm-dyd7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42698?format=api", "vulnerability_id": "VCID-9fv8-bgq3-u7ba", "summary": "Multiple vulnerabilities have been found in Chromium and Google\n\t Chrome, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30588", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00597", "scoring_system": "epss", "scoring_elements": "0.69417", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00597", "scoring_system": "epss", "scoring_elements": "0.69378", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00597", "scoring_system": "epss", "scoring_elements": "0.69311", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00597", "scoring_system": "epss", "scoring_elements": "0.69322", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00597", "scoring_system": "epss", "scoring_elements": "0.69339", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00597", "scoring_system": "epss", "scoring_elements": "0.69319", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00597", "scoring_system": "epss", "scoring_elements": "0.69369", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00597", "scoring_system": "epss", "scoring_elements": "0.69386", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00597", "scoring_system": "epss", "scoring_elements": "0.69408", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00597", "scoring_system": "epss", "scoring_elements": "0.69392", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30588" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30588", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30588" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/ASA-202107-47", "reference_id": "ASA-202107-47", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202107-47" }, { "reference_url": "https://security.archlinux.org/ASA-202107-74", "reference_id": "ASA-202107-74", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202107-74" }, { "reference_url": "https://security.archlinux.org/AVG-2200", "reference_id": "AVG-2200", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2200" }, { "reference_url": "https://security.archlinux.org/AVG-2202", "reference_id": "AVG-2202", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2202" }, { "reference_url": "https://security.gentoo.org/glsa/202201-02", "reference_id": "GLSA-202201-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202201-02" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371977?format=api", "purl": "pkg:alpm/archlinux/vivaldi@4.1.2369.11-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2g46-mfs3-n7bw" }, { "vulnerability": "VCID-3zs9-1ckz-z7a9" }, { "vulnerability": "VCID-f713-v3uf-ckdc" }, { "vulnerability": "VCID-rfsa-81fh-7fc9" }, { "vulnerability": "VCID-v66z-hkt8-bkep" }, { "vulnerability": "VCID-w1g4-7qex-aqdp" }, { "vulnerability": "VCID-xr49-gua9-r7cy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/vivaldi@4.1.2369.11-1" } ], "aliases": [ "CVE-2021-30588" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9fv8-bgq3-u7ba" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42678?format=api", "vulnerability_id": "VCID-c8t4-dk3u-1kbx", "summary": "Multiple vulnerabilities have been found in Chromium and Google\n\t Chrome, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30567", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00258", "scoring_system": "epss", "scoring_elements": "0.49211", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00258", "scoring_system": "epss", "scoring_elements": "0.49164", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00258", "scoring_system": "epss", "scoring_elements": "0.49102", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00258", "scoring_system": "epss", "scoring_elements": "0.49135", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00258", "scoring_system": "epss", "scoring_elements": "0.49165", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00258", "scoring_system": "epss", "scoring_elements": "0.49117", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00258", "scoring_system": "epss", "scoring_elements": "0.49171", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00258", "scoring_system": "epss", "scoring_elements": "0.49168", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00258", "scoring_system": "epss", "scoring_elements": "0.49185", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00258", "scoring_system": "epss", "scoring_elements": "0.49159", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30567" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30567", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30567" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/ASA-202107-47", "reference_id": "ASA-202107-47", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202107-47" }, { "reference_url": "https://security.archlinux.org/ASA-202107-74", "reference_id": "ASA-202107-74", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202107-74" }, { "reference_url": "https://security.archlinux.org/AVG-2200", "reference_id": "AVG-2200", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2200" }, { "reference_url": "https://security.archlinux.org/AVG-2202", "reference_id": "AVG-2202", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2202" }, { "reference_url": "https://security.gentoo.org/glsa/202201-02", "reference_id": "GLSA-202201-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202201-02" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371977?format=api", "purl": "pkg:alpm/archlinux/vivaldi@4.1.2369.11-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2g46-mfs3-n7bw" }, { "vulnerability": "VCID-3zs9-1ckz-z7a9" }, { "vulnerability": "VCID-f713-v3uf-ckdc" }, { "vulnerability": "VCID-rfsa-81fh-7fc9" }, { "vulnerability": "VCID-v66z-hkt8-bkep" }, { "vulnerability": "VCID-w1g4-7qex-aqdp" }, { "vulnerability": "VCID-xr49-gua9-r7cy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/vivaldi@4.1.2369.11-1" } ], "aliases": [ "CVE-2021-30567" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c8t4-dk3u-1kbx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42692?format=api", "vulnerability_id": "VCID-ch5p-edqc-6ydc", "summary": "Multiple vulnerabilities have been found in Chromium and Google\n\t Chrome, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30582", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00574", "scoring_system": "epss", "scoring_elements": "0.68777", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00574", "scoring_system": "epss", "scoring_elements": "0.68735", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00574", "scoring_system": "epss", "scoring_elements": "0.68671", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00574", "scoring_system": "epss", "scoring_elements": "0.68689", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00574", "scoring_system": "epss", "scoring_elements": "0.68708", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00574", "scoring_system": "epss", "scoring_elements": "0.68686", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00574", "scoring_system": "epss", "scoring_elements": "0.68737", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00574", "scoring_system": "epss", "scoring_elements": "0.68756", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00574", "scoring_system": "epss", "scoring_elements": "0.68779", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00574", "scoring_system": "epss", "scoring_elements": "0.68765", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30582" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30582", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30582" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/ASA-202107-47", "reference_id": "ASA-202107-47", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202107-47" }, { "reference_url": "https://security.archlinux.org/ASA-202107-74", "reference_id": "ASA-202107-74", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202107-74" }, { "reference_url": "https://security.archlinux.org/AVG-2200", "reference_id": "AVG-2200", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2200" }, { "reference_url": "https://security.archlinux.org/AVG-2202", "reference_id": "AVG-2202", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2202" }, { "reference_url": "https://security.gentoo.org/glsa/202201-02", "reference_id": "GLSA-202201-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202201-02" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371977?format=api", "purl": "pkg:alpm/archlinux/vivaldi@4.1.2369.11-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2g46-mfs3-n7bw" }, { "vulnerability": "VCID-3zs9-1ckz-z7a9" }, { "vulnerability": "VCID-f713-v3uf-ckdc" }, { "vulnerability": "VCID-rfsa-81fh-7fc9" }, { "vulnerability": "VCID-v66z-hkt8-bkep" }, { "vulnerability": "VCID-w1g4-7qex-aqdp" }, { "vulnerability": "VCID-xr49-gua9-r7cy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/vivaldi@4.1.2369.11-1" } ], "aliases": [ "CVE-2021-30582" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ch5p-edqc-6ydc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42688?format=api", "vulnerability_id": "VCID-gdyz-b8yg-c7eb", "summary": "Multiple vulnerabilities have been found in Chromium and Google\n\t Chrome, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30578", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74176", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74138", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74091", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74096", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74123", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74094", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74126", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74141", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74163", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74144", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30578" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30578", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30578" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/ASA-202107-47", "reference_id": "ASA-202107-47", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202107-47" }, { "reference_url": "https://security.archlinux.org/ASA-202107-74", "reference_id": "ASA-202107-74", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202107-74" }, { "reference_url": "https://security.archlinux.org/AVG-2200", "reference_id": "AVG-2200", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2200" }, { "reference_url": "https://security.archlinux.org/AVG-2202", "reference_id": "AVG-2202", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2202" }, { "reference_url": "https://security.gentoo.org/glsa/202201-02", "reference_id": "GLSA-202201-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202201-02" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371977?format=api", "purl": "pkg:alpm/archlinux/vivaldi@4.1.2369.11-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2g46-mfs3-n7bw" }, { "vulnerability": "VCID-3zs9-1ckz-z7a9" }, { "vulnerability": "VCID-f713-v3uf-ckdc" }, { "vulnerability": "VCID-rfsa-81fh-7fc9" }, { "vulnerability": "VCID-v66z-hkt8-bkep" }, { "vulnerability": "VCID-w1g4-7qex-aqdp" }, { "vulnerability": "VCID-xr49-gua9-r7cy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/vivaldi@4.1.2369.11-1" } ], "aliases": [ "CVE-2021-30578" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gdyz-b8yg-c7eb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42695?format=api", "vulnerability_id": "VCID-kg6g-yztu-cygd", "summary": "Multiple vulnerabilities have been found in Chromium and Google\n\t Chrome, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30585", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00642", "scoring_system": "epss", "scoring_elements": "0.70643", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00642", "scoring_system": "epss", "scoring_elements": "0.70598", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00642", "scoring_system": "epss", "scoring_elements": "0.70535", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00642", "scoring_system": "epss", "scoring_elements": "0.70549", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00642", "scoring_system": "epss", "scoring_elements": "0.70566", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00642", "scoring_system": "epss", "scoring_elements": "0.70543", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00642", "scoring_system": "epss", "scoring_elements": "0.70589", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00642", "scoring_system": "epss", "scoring_elements": "0.70604", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00642", "scoring_system": "epss", "scoring_elements": "0.70626", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00642", "scoring_system": "epss", "scoring_elements": "0.70612", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30585" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30585", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30585" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/ASA-202107-47", "reference_id": "ASA-202107-47", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202107-47" }, { "reference_url": "https://security.archlinux.org/ASA-202107-74", "reference_id": "ASA-202107-74", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202107-74" }, { "reference_url": "https://security.archlinux.org/AVG-2200", "reference_id": "AVG-2200", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2200" }, { "reference_url": "https://security.archlinux.org/AVG-2202", "reference_id": "AVG-2202", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2202" }, { "reference_url": "https://security.gentoo.org/glsa/202201-02", "reference_id": "GLSA-202201-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202201-02" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371977?format=api", "purl": "pkg:alpm/archlinux/vivaldi@4.1.2369.11-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2g46-mfs3-n7bw" }, { "vulnerability": "VCID-3zs9-1ckz-z7a9" }, { "vulnerability": "VCID-f713-v3uf-ckdc" }, { "vulnerability": "VCID-rfsa-81fh-7fc9" }, { "vulnerability": "VCID-v66z-hkt8-bkep" }, { "vulnerability": "VCID-w1g4-7qex-aqdp" }, { "vulnerability": "VCID-xr49-gua9-r7cy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/vivaldi@4.1.2369.11-1" } ], "aliases": [ "CVE-2021-30585" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kg6g-yztu-cygd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42685?format=api", "vulnerability_id": "VCID-mzur-fkh8-z3a5", "summary": "Multiple vulnerabilities have been found in Chromium and Google\n\t Chrome, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30575", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74176", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74138", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74091", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74096", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74123", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74094", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74126", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74141", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74163", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74144", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30575" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30575", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30575" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/ASA-202107-47", "reference_id": "ASA-202107-47", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202107-47" }, { "reference_url": "https://security.archlinux.org/ASA-202107-74", "reference_id": "ASA-202107-74", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202107-74" }, { "reference_url": "https://security.archlinux.org/AVG-2200", "reference_id": "AVG-2200", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2200" }, { "reference_url": "https://security.archlinux.org/AVG-2202", "reference_id": "AVG-2202", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2202" }, { "reference_url": "https://security.gentoo.org/glsa/202201-02", "reference_id": "GLSA-202201-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202201-02" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371977?format=api", "purl": "pkg:alpm/archlinux/vivaldi@4.1.2369.11-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2g46-mfs3-n7bw" }, { "vulnerability": "VCID-3zs9-1ckz-z7a9" }, { "vulnerability": "VCID-f713-v3uf-ckdc" }, { "vulnerability": "VCID-rfsa-81fh-7fc9" }, { "vulnerability": "VCID-v66z-hkt8-bkep" }, { "vulnerability": "VCID-w1g4-7qex-aqdp" }, { "vulnerability": "VCID-xr49-gua9-r7cy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/vivaldi@4.1.2369.11-1" } ], "aliases": [ "CVE-2021-30575" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mzur-fkh8-z3a5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42691?format=api", "vulnerability_id": "VCID-nxab-n22h-jugu", "summary": "Multiple vulnerabilities have been found in Chromium and Google\n\t Chrome, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30581", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00258", "scoring_system": "epss", "scoring_elements": "0.49211", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00258", "scoring_system": "epss", "scoring_elements": "0.49164", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00258", "scoring_system": "epss", "scoring_elements": "0.49102", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00258", "scoring_system": "epss", "scoring_elements": "0.49135", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00258", "scoring_system": "epss", "scoring_elements": "0.49165", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00258", "scoring_system": "epss", "scoring_elements": "0.49117", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00258", "scoring_system": "epss", "scoring_elements": "0.49171", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00258", "scoring_system": "epss", "scoring_elements": "0.49168", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00258", "scoring_system": "epss", "scoring_elements": "0.49185", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00258", "scoring_system": "epss", "scoring_elements": "0.49159", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30581" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30581", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30581" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/ASA-202107-47", "reference_id": "ASA-202107-47", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202107-47" }, { "reference_url": "https://security.archlinux.org/ASA-202107-74", "reference_id": "ASA-202107-74", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202107-74" }, { "reference_url": "https://security.archlinux.org/AVG-2200", "reference_id": "AVG-2200", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2200" }, { "reference_url": "https://security.archlinux.org/AVG-2202", "reference_id": "AVG-2202", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2202" }, { "reference_url": "https://security.gentoo.org/glsa/202201-02", "reference_id": "GLSA-202201-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202201-02" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371977?format=api", "purl": "pkg:alpm/archlinux/vivaldi@4.1.2369.11-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2g46-mfs3-n7bw" }, { "vulnerability": "VCID-3zs9-1ckz-z7a9" }, { "vulnerability": "VCID-f713-v3uf-ckdc" }, { "vulnerability": "VCID-rfsa-81fh-7fc9" }, { "vulnerability": "VCID-v66z-hkt8-bkep" }, { "vulnerability": "VCID-w1g4-7qex-aqdp" }, { "vulnerability": "VCID-xr49-gua9-r7cy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/vivaldi@4.1.2369.11-1" } ], "aliases": [ "CVE-2021-30581" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nxab-n22h-jugu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42689?format=api", "vulnerability_id": "VCID-rcdm-yyaj-g3c4", "summary": "Multiple vulnerabilities have been found in Chromium and Google\n\t Chrome, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30579", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74176", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74138", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74091", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74096", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74123", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74094", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74126", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74141", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74163", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74144", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30579" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30579", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30579" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/ASA-202107-47", "reference_id": "ASA-202107-47", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202107-47" }, { "reference_url": "https://security.archlinux.org/ASA-202107-74", "reference_id": "ASA-202107-74", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202107-74" }, { "reference_url": "https://security.archlinux.org/AVG-2200", "reference_id": "AVG-2200", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2200" }, { "reference_url": "https://security.archlinux.org/AVG-2202", "reference_id": "AVG-2202", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2202" }, { "reference_url": "https://security.gentoo.org/glsa/202201-02", "reference_id": "GLSA-202201-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202201-02" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371977?format=api", "purl": "pkg:alpm/archlinux/vivaldi@4.1.2369.11-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2g46-mfs3-n7bw" }, { "vulnerability": "VCID-3zs9-1ckz-z7a9" }, { "vulnerability": "VCID-f713-v3uf-ckdc" }, { "vulnerability": "VCID-rfsa-81fh-7fc9" }, { "vulnerability": "VCID-v66z-hkt8-bkep" }, { "vulnerability": "VCID-w1g4-7qex-aqdp" }, { "vulnerability": "VCID-xr49-gua9-r7cy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/vivaldi@4.1.2369.11-1" } ], "aliases": [ "CVE-2021-30579" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rcdm-yyaj-g3c4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42676?format=api", "vulnerability_id": "VCID-smuv-mqtr-sfe8", "summary": "Multiple vulnerabilities have been found in Chromium and Google\n\t Chrome, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30565", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00208", "scoring_system": "epss", "scoring_elements": "0.43257", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00208", "scoring_system": "epss", "scoring_elements": "0.43196", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00208", "scoring_system": "epss", "scoring_elements": "0.43135", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00208", "scoring_system": "epss", "scoring_elements": "0.43192", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00208", "scoring_system": "epss", "scoring_elements": "0.4322", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00208", "scoring_system": "epss", "scoring_elements": "0.43158", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00208", "scoring_system": "epss", "scoring_elements": "0.4321", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00208", "scoring_system": "epss", "scoring_elements": "0.43223", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00208", "scoring_system": "epss", "scoring_elements": "0.43244", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00208", "scoring_system": "epss", "scoring_elements": "0.43211", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30565" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30565", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30565" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/ASA-202107-47", "reference_id": "ASA-202107-47", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202107-47" }, { "reference_url": "https://security.archlinux.org/ASA-202107-74", "reference_id": "ASA-202107-74", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202107-74" }, { "reference_url": "https://security.archlinux.org/AVG-2200", "reference_id": "AVG-2200", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2200" }, { "reference_url": "https://security.archlinux.org/AVG-2202", "reference_id": "AVG-2202", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2202" }, { "reference_url": "https://security.gentoo.org/glsa/202201-02", "reference_id": "GLSA-202201-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202201-02" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371977?format=api", "purl": "pkg:alpm/archlinux/vivaldi@4.1.2369.11-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2g46-mfs3-n7bw" }, { "vulnerability": "VCID-3zs9-1ckz-z7a9" }, { "vulnerability": "VCID-f713-v3uf-ckdc" }, { "vulnerability": "VCID-rfsa-81fh-7fc9" }, { "vulnerability": "VCID-v66z-hkt8-bkep" }, { "vulnerability": "VCID-w1g4-7qex-aqdp" }, { "vulnerability": "VCID-xr49-gua9-r7cy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/vivaldi@4.1.2369.11-1" } ], "aliases": [ "CVE-2021-30565" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-smuv-mqtr-sfe8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42686?format=api", "vulnerability_id": "VCID-swsu-zrrs-bqhd", "summary": "Multiple vulnerabilities have been found in Chromium and Google\n\t Chrome, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30576", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00258", "scoring_system": "epss", "scoring_elements": "0.49211", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00258", "scoring_system": "epss", "scoring_elements": "0.49164", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00258", "scoring_system": "epss", "scoring_elements": "0.49102", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00258", "scoring_system": "epss", "scoring_elements": "0.49135", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00258", "scoring_system": "epss", "scoring_elements": "0.49165", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00258", "scoring_system": "epss", "scoring_elements": "0.49117", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00258", "scoring_system": "epss", "scoring_elements": "0.49171", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00258", "scoring_system": "epss", "scoring_elements": "0.49168", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00258", "scoring_system": "epss", "scoring_elements": "0.49185", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00258", "scoring_system": "epss", "scoring_elements": "0.49159", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30576" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30576", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30576" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/ASA-202107-47", "reference_id": "ASA-202107-47", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202107-47" }, { "reference_url": "https://security.archlinux.org/ASA-202107-74", "reference_id": "ASA-202107-74", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202107-74" }, { "reference_url": "https://security.archlinux.org/AVG-2200", "reference_id": "AVG-2200", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2200" }, { "reference_url": "https://security.archlinux.org/AVG-2202", "reference_id": "AVG-2202", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2202" }, { "reference_url": "https://security.gentoo.org/glsa/202201-02", "reference_id": "GLSA-202201-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202201-02" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371977?format=api", "purl": "pkg:alpm/archlinux/vivaldi@4.1.2369.11-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2g46-mfs3-n7bw" }, { "vulnerability": "VCID-3zs9-1ckz-z7a9" }, { "vulnerability": "VCID-f713-v3uf-ckdc" }, { "vulnerability": "VCID-rfsa-81fh-7fc9" }, { "vulnerability": "VCID-v66z-hkt8-bkep" }, { "vulnerability": "VCID-w1g4-7qex-aqdp" }, { "vulnerability": "VCID-xr49-gua9-r7cy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/vivaldi@4.1.2369.11-1" } ], "aliases": [ "CVE-2021-30576" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-swsu-zrrs-bqhd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42699?format=api", "vulnerability_id": "VCID-t8d2-sp7a-mfh9", "summary": "Multiple vulnerabilities have been found in Chromium and Google\n\t Chrome, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30589", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00248", "scoring_system": "epss", "scoring_elements": "0.48106", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00248", "scoring_system": "epss", "scoring_elements": "0.48054", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00248", "scoring_system": "epss", "scoring_elements": "0.47987", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00248", "scoring_system": "epss", "scoring_elements": "0.48025", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00248", "scoring_system": "epss", "scoring_elements": "0.48045", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00248", "scoring_system": "epss", "scoring_elements": "0.47995", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00248", "scoring_system": "epss", "scoring_elements": "0.48048", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00248", "scoring_system": "epss", "scoring_elements": "0.48042", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00248", "scoring_system": "epss", "scoring_elements": "0.48066", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00248", "scoring_system": "epss", "scoring_elements": "0.48043", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30589" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30589", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30589" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/ASA-202107-47", "reference_id": "ASA-202107-47", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202107-47" }, { "reference_url": "https://security.archlinux.org/ASA-202107-74", "reference_id": "ASA-202107-74", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202107-74" }, { "reference_url": "https://security.archlinux.org/AVG-2200", "reference_id": "AVG-2200", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2200" }, { "reference_url": "https://security.archlinux.org/AVG-2202", "reference_id": "AVG-2202", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2202" }, { "reference_url": "https://security.gentoo.org/glsa/202201-02", "reference_id": "GLSA-202201-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202201-02" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371977?format=api", "purl": "pkg:alpm/archlinux/vivaldi@4.1.2369.11-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2g46-mfs3-n7bw" }, { "vulnerability": "VCID-3zs9-1ckz-z7a9" }, { "vulnerability": "VCID-f713-v3uf-ckdc" }, { "vulnerability": "VCID-rfsa-81fh-7fc9" }, { "vulnerability": "VCID-v66z-hkt8-bkep" }, { "vulnerability": "VCID-w1g4-7qex-aqdp" }, { "vulnerability": "VCID-xr49-gua9-r7cy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/vivaldi@4.1.2369.11-1" } ], "aliases": [ "CVE-2021-30589" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t8d2-sp7a-mfh9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42682?format=api", "vulnerability_id": "VCID-tnwj-ep3x-nqer", "summary": "Multiple vulnerabilities have been found in Chromium and Google\n\t Chrome, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30572", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74176", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74138", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74091", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74096", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74123", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74094", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74126", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74141", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74163", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74144", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30572" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30572", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30572" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/ASA-202107-47", "reference_id": "ASA-202107-47", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202107-47" }, { "reference_url": "https://security.archlinux.org/ASA-202107-74", "reference_id": "ASA-202107-74", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202107-74" }, { "reference_url": "https://security.archlinux.org/AVG-2200", "reference_id": "AVG-2200", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2200" }, { "reference_url": "https://security.archlinux.org/AVG-2202", "reference_id": "AVG-2202", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2202" }, { "reference_url": "https://security.gentoo.org/glsa/202201-02", "reference_id": "GLSA-202201-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202201-02" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371977?format=api", "purl": "pkg:alpm/archlinux/vivaldi@4.1.2369.11-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2g46-mfs3-n7bw" }, { "vulnerability": "VCID-3zs9-1ckz-z7a9" }, { "vulnerability": "VCID-f713-v3uf-ckdc" }, { "vulnerability": "VCID-rfsa-81fh-7fc9" }, { "vulnerability": "VCID-v66z-hkt8-bkep" }, { "vulnerability": "VCID-w1g4-7qex-aqdp" }, { "vulnerability": "VCID-xr49-gua9-r7cy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/vivaldi@4.1.2369.11-1" } ], "aliases": [ "CVE-2021-30572" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tnwj-ep3x-nqer" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42677?format=api", "vulnerability_id": "VCID-x7pa-f6j4-eqej", "summary": "Multiple vulnerabilities have been found in Chromium and Google\n\t Chrome, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30566", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00803", "scoring_system": "epss", "scoring_elements": "0.74136", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00803", "scoring_system": "epss", "scoring_elements": "0.74097", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00803", "scoring_system": "epss", "scoring_elements": "0.74049", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00803", "scoring_system": "epss", "scoring_elements": "0.74055", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00803", "scoring_system": "epss", "scoring_elements": "0.74081", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00803", "scoring_system": "epss", "scoring_elements": "0.74053", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00803", "scoring_system": "epss", "scoring_elements": "0.74085", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00803", "scoring_system": "epss", "scoring_elements": "0.741", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00803", "scoring_system": "epss", "scoring_elements": "0.74122", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00803", "scoring_system": "epss", "scoring_elements": "0.74104", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30566" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30566", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30566" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/ASA-202107-47", "reference_id": "ASA-202107-47", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202107-47" }, { "reference_url": "https://security.archlinux.org/ASA-202107-74", "reference_id": "ASA-202107-74", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202107-74" }, { "reference_url": "https://security.archlinux.org/AVG-2200", "reference_id": "AVG-2200", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2200" }, { "reference_url": "https://security.archlinux.org/AVG-2202", "reference_id": "AVG-2202", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2202" }, { "reference_url": "https://security.gentoo.org/glsa/202201-02", "reference_id": "GLSA-202201-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202201-02" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371977?format=api", "purl": "pkg:alpm/archlinux/vivaldi@4.1.2369.11-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2g46-mfs3-n7bw" }, { "vulnerability": "VCID-3zs9-1ckz-z7a9" }, { "vulnerability": "VCID-f713-v3uf-ckdc" }, { "vulnerability": "VCID-rfsa-81fh-7fc9" }, { "vulnerability": "VCID-v66z-hkt8-bkep" }, { "vulnerability": "VCID-w1g4-7qex-aqdp" }, { "vulnerability": "VCID-xr49-gua9-r7cy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/vivaldi@4.1.2369.11-1" } ], "aliases": [ "CVE-2021-30566" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x7pa-f6j4-eqej" } ], "risk_score": "4.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/vivaldi@4.1.2369.11-1" }