Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/372046?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/372046?format=api", "purl": "pkg:alpm/archlinux/chromium@90.0.4430.212-1", "type": "alpm", "namespace": "archlinux", "name": "chromium", "version": "90.0.4430.212-1", "qualifiers": {}, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": "91.0.4472.77-1", "latest_non_vulnerable_version": "102.0.5005.61-1", "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49432?format=api", "vulnerability_id": "VCID-7fef-qr2c-gbcp", "summary": "Multiple vulnerabillities have been found in Chromium and Google\n Chrome, the worst of which could allow remote attackers to execute\n arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30523", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70554", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70504", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70409", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70422", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.7044", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70418", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70463", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70479", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70503", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70488", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70474", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70516", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70524", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30523" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30523", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30523" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/ASA-202106-2", "reference_id": "ASA-202106-2", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202106-2" }, { "reference_url": "https://security.archlinux.org/AVG-1990", "reference_id": "AVG-1990", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1990" }, { "reference_url": "https://security.archlinux.org/AVG-1991", "reference_id": "AVG-1991", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1991" }, { "reference_url": "https://security.gentoo.org/glsa/202107-06", "reference_id": "GLSA-202107-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-06" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/372047?format=api", "purl": "pkg:alpm/archlinux/chromium@91.0.4472.77-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/chromium@91.0.4472.77-1" } ], "aliases": [ "CVE-2021-30523" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7fef-qr2c-gbcp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/94724?format=api", "vulnerability_id": "VCID-7spy-wcry-6fb8", "summary": "Use after free in Tab Strip in Google Chrome prior to 91.0.4472.77 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30543", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.5106", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51112", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.50995", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51049", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51073", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51031", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51088", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51084", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51128", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51107", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.5109", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51129", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51135", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30543" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30543", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30543" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/ASA-202106-2", "reference_id": "ASA-202106-2", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202106-2" }, { "reference_url": "https://security.archlinux.org/AVG-1990", "reference_id": "AVG-1990", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1990" }, { "reference_url": "https://security.archlinux.org/AVG-1991", "reference_id": "AVG-1991", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1991" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/372047?format=api", "purl": "pkg:alpm/archlinux/chromium@91.0.4472.77-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/chromium@91.0.4472.77-1" } ], "aliases": [ "CVE-2021-30543" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7spy-wcry-6fb8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49442?format=api", "vulnerability_id": "VCID-81s9-h9rs-bkfh", "summary": "Multiple vulnerabillities have been found in Chromium and Google\n Chrome, the worst of which could allow remote attackers to execute\n arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30534", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30312", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30492", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30519", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30657", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30703", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30515", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30574", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30608", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30611", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30567", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.3052", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30545", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30527", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30534" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30534", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30534" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/ASA-202106-2", "reference_id": "ASA-202106-2", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202106-2" }, { "reference_url": "https://security.archlinux.org/AVG-1990", "reference_id": "AVG-1990", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1990" }, { "reference_url": "https://security.archlinux.org/AVG-1991", "reference_id": "AVG-1991", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1991" }, { "reference_url": "https://security.gentoo.org/glsa/202107-06", "reference_id": "GLSA-202107-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-06" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/372047?format=api", "purl": "pkg:alpm/archlinux/chromium@91.0.4472.77-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/chromium@91.0.4472.77-1" } ], "aliases": [ "CVE-2021-30534" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-81s9-h9rs-bkfh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49431?format=api", "vulnerability_id": "VCID-8bhz-3581-bkca", "summary": "Multiple vulnerabillities have been found in Chromium and Google\n Chrome, the worst of which could allow remote attackers to execute\n arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30522", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01007", "scoring_system": "epss", "scoring_elements": "0.77126", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01007", "scoring_system": "epss", "scoring_elements": "0.77091", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01007", "scoring_system": "epss", "scoring_elements": "0.76997", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01007", "scoring_system": "epss", "scoring_elements": "0.77003", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01007", "scoring_system": "epss", "scoring_elements": "0.77032", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01007", "scoring_system": "epss", "scoring_elements": "0.77013", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01007", "scoring_system": "epss", "scoring_elements": "0.77045", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01007", "scoring_system": "epss", "scoring_elements": "0.77055", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01007", "scoring_system": "epss", "scoring_elements": "0.77084", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01007", "scoring_system": "epss", "scoring_elements": "0.77063", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01007", "scoring_system": "epss", "scoring_elements": "0.77058", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01007", "scoring_system": "epss", "scoring_elements": "0.77099", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01007", "scoring_system": "epss", "scoring_elements": "0.77101", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30522" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30522", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30522" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/ASA-202106-2", "reference_id": "ASA-202106-2", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202106-2" }, { "reference_url": "https://security.archlinux.org/AVG-1990", "reference_id": "AVG-1990", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1990" }, { "reference_url": "https://security.archlinux.org/AVG-1991", "reference_id": "AVG-1991", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1991" }, { "reference_url": "https://security.gentoo.org/glsa/202107-06", "reference_id": "GLSA-202107-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-06" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/372047?format=api", "purl": "pkg:alpm/archlinux/chromium@91.0.4472.77-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/chromium@91.0.4472.77-1" } ], "aliases": [ "CVE-2021-30522" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8bhz-3581-bkca" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49433?format=api", "vulnerability_id": "VCID-9u4b-zjdu-n3b3", "summary": "Multiple vulnerabillities have been found in Chromium and Google\n Chrome, the worst of which could allow remote attackers to execute\n arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30524", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00281", "scoring_system": "epss", "scoring_elements": "0.51513", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00281", "scoring_system": "epss", "scoring_elements": "0.5156", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00281", "scoring_system": "epss", "scoring_elements": "0.51428", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00281", "scoring_system": "epss", "scoring_elements": "0.51479", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00281", "scoring_system": "epss", "scoring_elements": "0.51506", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00281", "scoring_system": "epss", "scoring_elements": "0.51466", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00281", "scoring_system": "epss", "scoring_elements": "0.51519", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00281", "scoring_system": "epss", "scoring_elements": "0.51517", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00281", "scoring_system": "epss", "scoring_elements": "0.51561", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00281", "scoring_system": "epss", "scoring_elements": "0.5154", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00281", "scoring_system": "epss", "scoring_elements": "0.51528", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00281", "scoring_system": "epss", "scoring_elements": "0.51571", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00281", "scoring_system": "epss", "scoring_elements": "0.5158", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30524" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30524", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30524" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/ASA-202106-2", "reference_id": "ASA-202106-2", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202106-2" }, { "reference_url": "https://security.archlinux.org/AVG-1990", "reference_id": "AVG-1990", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1990" }, { "reference_url": "https://security.archlinux.org/AVG-1991", "reference_id": "AVG-1991", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1991" }, { "reference_url": "https://security.gentoo.org/glsa/202107-06", "reference_id": "GLSA-202107-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-06" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/372047?format=api", "purl": "pkg:alpm/archlinux/chromium@91.0.4472.77-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/chromium@91.0.4472.77-1" } ], "aliases": [ "CVE-2021-30524" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9u4b-zjdu-n3b3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49445?format=api", "vulnerability_id": "VCID-amkk-esp8-53af", "summary": "Multiple vulnerabillities have been found in Chromium and Google\n Chrome, the worst of which could allow remote attackers to execute\n arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30538", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00205", "scoring_system": "epss", "scoring_elements": "0.42525", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00205", "scoring_system": "epss", "scoring_elements": "0.42587", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00205", "scoring_system": "epss", "scoring_elements": "0.42544", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00205", "scoring_system": "epss", "scoring_elements": "0.42616", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00205", "scoring_system": "epss", "scoring_elements": "0.42644", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00205", "scoring_system": "epss", "scoring_elements": "0.42584", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00205", "scoring_system": "epss", "scoring_elements": "0.42636", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00205", "scoring_system": "epss", "scoring_elements": "0.42647", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00205", "scoring_system": "epss", "scoring_elements": "0.42671", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00205", "scoring_system": "epss", "scoring_elements": "0.42634", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00205", "scoring_system": "epss", "scoring_elements": "0.42606", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00205", "scoring_system": "epss", "scoring_elements": "0.42665", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00205", "scoring_system": "epss", "scoring_elements": "0.42652", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30538" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30538", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30538" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/ASA-202106-2", "reference_id": "ASA-202106-2", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202106-2" }, { "reference_url": "https://security.archlinux.org/AVG-1990", "reference_id": "AVG-1990", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1990" }, { "reference_url": "https://security.archlinux.org/AVG-1991", "reference_id": "AVG-1991", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1991" }, { "reference_url": "https://security.gentoo.org/glsa/202107-06", "reference_id": "GLSA-202107-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-06" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/372047?format=api", "purl": "pkg:alpm/archlinux/chromium@91.0.4472.77-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/chromium@91.0.4472.77-1" } ], "aliases": [ "CVE-2021-30538" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-amkk-esp8-53af" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49441?format=api", "vulnerability_id": "VCID-aswr-a7yz-tbb3", "summary": "Multiple vulnerabillities have been found in Chromium and Google\n Chrome, the worst of which could allow remote attackers to execute\n arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30533", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.10532", "scoring_system": "epss", "scoring_elements": "0.93234", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.10532", "scoring_system": "epss", "scoring_elements": "0.93243", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.10532", "scoring_system": "epss", "scoring_elements": "0.93248", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.10532", "scoring_system": "epss", "scoring_elements": "0.93246", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.10532", "scoring_system": "epss", "scoring_elements": "0.93255", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.10532", "scoring_system": "epss", "scoring_elements": "0.93259", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.10532", "scoring_system": "epss", "scoring_elements": "0.93263", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.10532", "scoring_system": "epss", "scoring_elements": "0.93261", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.10532", "scoring_system": "epss", "scoring_elements": "0.93262", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.10532", "scoring_system": "epss", "scoring_elements": "0.9328", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.10532", "scoring_system": "epss", "scoring_elements": "0.93285", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.10532", "scoring_system": "epss", "scoring_elements": "0.93292", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.10532", "scoring_system": "epss", "scoring_elements": "0.93297", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30533" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30533", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30533" }, { "reference_url": "https://crbug.com/1145553", "reference_id": "1145553", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T15:04:01Z/" } ], "url": "https://crbug.com/1145553" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/ASA-202106-2", "reference_id": "ASA-202106-2", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202106-2" }, { "reference_url": "https://security.archlinux.org/AVG-1990", "reference_id": "AVG-1990", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1990" }, { "reference_url": "https://security.archlinux.org/AVG-1991", "reference_id": "AVG-1991", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1991" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ETMZL6IHCTCTREEL434BQ4THQ7EOHJ43/", "reference_id": "ETMZL6IHCTCTREEL434BQ4THQ7EOHJ43", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T15:04:01Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ETMZL6IHCTCTREEL434BQ4THQ7EOHJ43/" }, { "reference_url": "https://security.gentoo.org/glsa/202107-06", "reference_id": "GLSA-202107-06", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T15:04:01Z/" } ], "url": "https://security.gentoo.org/glsa/202107-06" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAT6EOXVQFE6JFMFQF4IKAOUQSHMHL54/", "reference_id": "PAT6EOXVQFE6JFMFQF4IKAOUQSHMHL54", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T15:04:01Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAT6EOXVQFE6JFMFQF4IKAOUQSHMHL54/" }, { "reference_url": "https://chromereleases.googleblog.com/2021/05/stable-channel-update-for-desktop_25.html", "reference_id": "stable-channel-update-for-desktop_25.html", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T15:04:01Z/" } ], "url": "https://chromereleases.googleblog.com/2021/05/stable-channel-update-for-desktop_25.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/372047?format=api", "purl": "pkg:alpm/archlinux/chromium@91.0.4472.77-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/chromium@91.0.4472.77-1" } ], "aliases": [ "CVE-2021-30533" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-aswr-a7yz-tbb3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49436?format=api", "vulnerability_id": "VCID-cntb-k34n-dbaq", "summary": "Multiple vulnerabillities have been found in Chromium and Google\n Chrome, the worst of which could allow remote attackers to execute\n arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30527", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.5575", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55823", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55668", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.5578", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55802", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55782", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55833", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55836", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55844", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55825", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55806", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55843", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55848", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30527" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30527", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30527" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/ASA-202106-2", "reference_id": "ASA-202106-2", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202106-2" }, { "reference_url": "https://security.archlinux.org/AVG-1990", "reference_id": "AVG-1990", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1990" }, { "reference_url": "https://security.archlinux.org/AVG-1991", "reference_id": "AVG-1991", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1991" }, { "reference_url": "https://security.gentoo.org/glsa/202107-06", "reference_id": "GLSA-202107-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-06" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/372047?format=api", "purl": "pkg:alpm/archlinux/chromium@91.0.4472.77-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/chromium@91.0.4472.77-1" } ], "aliases": [ "CVE-2021-30527" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cntb-k34n-dbaq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49443?format=api", "vulnerability_id": "VCID-e5qg-urfz-37b6", "summary": "Multiple vulnerabillities have been found in Chromium and Google\n Chrome, the worst of which could allow remote attackers to execute\n arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30536", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01023", "scoring_system": "epss", "scoring_elements": "0.77318", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01023", "scoring_system": "epss", "scoring_elements": "0.77283", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01023", "scoring_system": "epss", "scoring_elements": "0.77191", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01023", "scoring_system": "epss", "scoring_elements": "0.77197", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01023", "scoring_system": "epss", "scoring_elements": "0.77226", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01023", "scoring_system": "epss", "scoring_elements": "0.77208", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01023", "scoring_system": "epss", "scoring_elements": "0.7724", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01023", "scoring_system": "epss", "scoring_elements": "0.77248", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01023", "scoring_system": "epss", "scoring_elements": "0.77275", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01023", "scoring_system": "epss", "scoring_elements": "0.77254", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01023", "scoring_system": "epss", "scoring_elements": "0.77251", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01023", "scoring_system": "epss", "scoring_elements": "0.77291", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30536" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30536", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30536" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/ASA-202106-2", "reference_id": "ASA-202106-2", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202106-2" }, { "reference_url": "https://security.archlinux.org/AVG-1990", "reference_id": "AVG-1990", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1990" }, { "reference_url": "https://security.archlinux.org/AVG-1991", "reference_id": "AVG-1991", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1991" }, { "reference_url": "https://security.gentoo.org/glsa/202107-06", "reference_id": "GLSA-202107-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-06" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/372047?format=api", "purl": "pkg:alpm/archlinux/chromium@91.0.4472.77-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/chromium@91.0.4472.77-1" } ], "aliases": [ "CVE-2021-30536" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e5qg-urfz-37b6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49446?format=api", "vulnerability_id": "VCID-ej7g-qqsm-y7ch", "summary": "Multiple vulnerabillities have been found in Chromium and Google\n Chrome, the worst of which could allow remote attackers to execute\n arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30539", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00139", "scoring_system": "epss", "scoring_elements": "0.33685", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00139", "scoring_system": "epss", "scoring_elements": "0.34058", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00139", "scoring_system": "epss", "scoring_elements": "0.33832", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00139", "scoring_system": "epss", "scoring_elements": "0.3417", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00139", "scoring_system": "epss", "scoring_elements": "0.34204", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00139", "scoring_system": "epss", "scoring_elements": "0.34066", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00139", "scoring_system": "epss", "scoring_elements": "0.34109", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00139", "scoring_system": "epss", "scoring_elements": "0.34139", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00139", "scoring_system": "epss", "scoring_elements": "0.34137", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00139", "scoring_system": "epss", "scoring_elements": "0.34095", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00139", "scoring_system": "epss", "scoring_elements": "0.34071", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00139", "scoring_system": "epss", "scoring_elements": "0.34107", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00139", "scoring_system": "epss", "scoring_elements": "0.34094", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30539" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30539", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30539" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/ASA-202106-2", "reference_id": "ASA-202106-2", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202106-2" }, { "reference_url": "https://security.archlinux.org/AVG-1990", "reference_id": "AVG-1990", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1990" }, { "reference_url": "https://security.archlinux.org/AVG-1991", "reference_id": "AVG-1991", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1991" }, { "reference_url": "https://security.gentoo.org/glsa/202107-06", "reference_id": "GLSA-202107-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-06" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/372047?format=api", "purl": "pkg:alpm/archlinux/chromium@91.0.4472.77-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/chromium@91.0.4472.77-1" } ], "aliases": [ "CVE-2021-30539" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ej7g-qqsm-y7ch" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49437?format=api", "vulnerability_id": "VCID-fgt6-p8h5-wyf2", "summary": "Multiple vulnerabillities have been found in Chromium and Google\n Chrome, the worst of which could allow remote attackers to execute\n arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30528", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01064", "scoring_system": "epss", "scoring_elements": "0.77732", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01064", "scoring_system": "epss", "scoring_elements": "0.77612", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01064", "scoring_system": "epss", "scoring_elements": "0.7762", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01064", "scoring_system": "epss", "scoring_elements": "0.77647", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01064", "scoring_system": "epss", "scoring_elements": "0.77629", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01064", "scoring_system": "epss", "scoring_elements": "0.77657", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01064", "scoring_system": "epss", "scoring_elements": "0.77663", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01064", "scoring_system": "epss", "scoring_elements": "0.77689", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01064", "scoring_system": "epss", "scoring_elements": "0.77673", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01064", "scoring_system": "epss", "scoring_elements": "0.77671", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01064", "scoring_system": "epss", "scoring_elements": "0.77708", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01064", "scoring_system": "epss", "scoring_elements": "0.77707", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01064", "scoring_system": "epss", "scoring_elements": "0.77701", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30528" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30528", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30528" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/AVG-2044", "reference_id": "AVG-2044", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2044" }, { "reference_url": "https://security.gentoo.org/glsa/202107-06", "reference_id": "GLSA-202107-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-06" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/372047?format=api", "purl": "pkg:alpm/archlinux/chromium@91.0.4472.77-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/chromium@91.0.4472.77-1" } ], "aliases": [ "CVE-2021-30528" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fgt6-p8h5-wyf2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/94723?format=api", "vulnerability_id": "VCID-gdf5-fgc4-zqdp", "summary": "Use after free in Tab Strip in Google Chrome prior to 91.0.4472.77 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30542", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.5106", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51112", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.50995", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51049", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51073", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51031", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51088", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51084", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51128", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51107", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.5109", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51129", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51135", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30542" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30542", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30542" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/ASA-202106-2", "reference_id": "ASA-202106-2", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202106-2" }, { "reference_url": "https://security.archlinux.org/AVG-1990", "reference_id": "AVG-1990", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1990" }, { "reference_url": "https://security.archlinux.org/AVG-1991", "reference_id": "AVG-1991", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1991" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/372047?format=api", "purl": "pkg:alpm/archlinux/chromium@91.0.4472.77-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/chromium@91.0.4472.77-1" } ], "aliases": [ "CVE-2021-30542" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gdf5-fgc4-zqdp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49438?format=api", "vulnerability_id": "VCID-jm7s-knrf-vqcj", "summary": "Multiple vulnerabillities have been found in Chromium and Google\n Chrome, the worst of which could allow remote attackers to execute\n arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30530", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00742", "scoring_system": "epss", "scoring_elements": "0.73051", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00742", "scoring_system": "epss", "scoring_elements": "0.73011", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00742", "scoring_system": "epss", "scoring_elements": "0.72911", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00742", "scoring_system": "epss", "scoring_elements": "0.72922", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00742", "scoring_system": "epss", "scoring_elements": "0.72942", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00742", "scoring_system": "epss", "scoring_elements": "0.72917", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00742", "scoring_system": "epss", "scoring_elements": "0.72955", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00742", "scoring_system": "epss", "scoring_elements": "0.72969", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00742", "scoring_system": "epss", "scoring_elements": "0.72994", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00742", "scoring_system": "epss", "scoring_elements": "0.72974", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00742", "scoring_system": "epss", "scoring_elements": "0.72967", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00742", "scoring_system": "epss", "scoring_elements": "0.73009", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00742", "scoring_system": "epss", "scoring_elements": "0.73018", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30530" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30530", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30530" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/ASA-202106-2", "reference_id": "ASA-202106-2", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202106-2" }, { "reference_url": "https://security.archlinux.org/AVG-1990", "reference_id": "AVG-1990", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1990" }, { "reference_url": "https://security.archlinux.org/AVG-1991", "reference_id": "AVG-1991", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1991" }, { "reference_url": "https://security.gentoo.org/glsa/202107-06", "reference_id": "GLSA-202107-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-06" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/372047?format=api", "purl": "pkg:alpm/archlinux/chromium@91.0.4472.77-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/chromium@91.0.4472.77-1" } ], "aliases": [ "CVE-2021-30530" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jm7s-knrf-vqcj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49430?format=api", "vulnerability_id": "VCID-jzch-bp6c-mqgd", "summary": "Multiple vulnerabillities have been found in Chromium and Google\n Chrome, the worst of which could allow remote attackers to execute\n arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30521", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0082", "scoring_system": "epss", "scoring_elements": "0.74456", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0082", "scoring_system": "epss", "scoring_elements": "0.7434", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0082", "scoring_system": "epss", "scoring_elements": "0.74344", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0082", "scoring_system": "epss", "scoring_elements": "0.74371", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0082", "scoring_system": "epss", "scoring_elements": "0.74345", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0082", "scoring_system": "epss", "scoring_elements": "0.74378", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0082", "scoring_system": "epss", "scoring_elements": "0.74393", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0082", "scoring_system": "epss", "scoring_elements": "0.74414", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0082", "scoring_system": "epss", "scoring_elements": "0.74394", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0082", "scoring_system": "epss", "scoring_elements": "0.74386", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0082", "scoring_system": "epss", "scoring_elements": "0.74423", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0082", "scoring_system": "epss", "scoring_elements": "0.74432", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0082", "scoring_system": "epss", "scoring_elements": "0.74421", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30521" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30521", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30521" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/AVG-2044", "reference_id": "AVG-2044", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2044" }, { "reference_url": "https://security.gentoo.org/glsa/202107-06", "reference_id": "GLSA-202107-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-06" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/372047?format=api", "purl": "pkg:alpm/archlinux/chromium@91.0.4472.77-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/chromium@91.0.4472.77-1" } ], "aliases": [ "CVE-2021-30521" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jzch-bp6c-mqgd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/94721?format=api", "vulnerability_id": "VCID-k2cy-dr3z-83cy", "summary": "Use after free in Bookmarks in Google Chrome prior to 91.0.4472.77 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30529", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00241", "scoring_system": "epss", "scoring_elements": "0.47409", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00241", "scoring_system": "epss", "scoring_elements": "0.47421", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00241", "scoring_system": "epss", "scoring_elements": "0.47355", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00241", "scoring_system": "epss", "scoring_elements": "0.4739", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00241", "scoring_system": "epss", "scoring_elements": "0.47412", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00241", "scoring_system": "epss", "scoring_elements": "0.47361", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00241", "scoring_system": "epss", "scoring_elements": "0.47416", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00241", "scoring_system": "epss", "scoring_elements": "0.47415", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00241", "scoring_system": "epss", "scoring_elements": "0.47438", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00241", "scoring_system": "epss", "scoring_elements": "0.47413", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00241", "scoring_system": "epss", "scoring_elements": "0.47419", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00241", "scoring_system": "epss", "scoring_elements": "0.47478", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00241", "scoring_system": "epss", "scoring_elements": "0.4747", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30529" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30529", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30529" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/ASA-202106-2", "reference_id": "ASA-202106-2", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202106-2" }, { "reference_url": "https://security.archlinux.org/AVG-1990", "reference_id": "AVG-1990", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1990" }, { "reference_url": "https://security.archlinux.org/AVG-1991", "reference_id": "AVG-1991", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1991" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/372047?format=api", "purl": "pkg:alpm/archlinux/chromium@91.0.4472.77-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/chromium@91.0.4472.77-1" } ], "aliases": [ "CVE-2021-30529" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k2cy-dr3z-83cy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49434?format=api", "vulnerability_id": "VCID-n1ux-5z1c-9ban", "summary": "Multiple vulnerabillities have been found in Chromium and Google\n Chrome, the worst of which could allow remote attackers to execute\n arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30525", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00353", "scoring_system": "epss", "scoring_elements": "0.57626", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00353", "scoring_system": "epss", "scoring_elements": "0.57668", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00353", "scoring_system": "epss", "scoring_elements": "0.5755", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00353", "scoring_system": "epss", "scoring_elements": "0.57635", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00353", "scoring_system": "epss", "scoring_elements": "0.57656", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00353", "scoring_system": "epss", "scoring_elements": "0.57632", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00353", "scoring_system": "epss", "scoring_elements": "0.57686", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00353", "scoring_system": "epss", "scoring_elements": "0.57689", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00353", "scoring_system": "epss", "scoring_elements": "0.57704", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00353", "scoring_system": "epss", "scoring_elements": "0.57683", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00353", "scoring_system": "epss", "scoring_elements": "0.57664", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00353", "scoring_system": "epss", "scoring_elements": "0.57693", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30525" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30525", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30525" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/ASA-202106-2", "reference_id": "ASA-202106-2", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202106-2" }, { "reference_url": "https://security.archlinux.org/AVG-1990", "reference_id": "AVG-1990", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1990" }, { "reference_url": "https://security.archlinux.org/AVG-1991", "reference_id": "AVG-1991", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1991" }, { "reference_url": "https://security.gentoo.org/glsa/202107-06", "reference_id": "GLSA-202107-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-06" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/372047?format=api", "purl": "pkg:alpm/archlinux/chromium@91.0.4472.77-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/chromium@91.0.4472.77-1" } ], "aliases": [ "CVE-2021-30525" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n1ux-5z1c-9ban" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49435?format=api", "vulnerability_id": "VCID-qdw1-rhx2-e3fu", "summary": "Multiple vulnerabillities have been found in Chromium and Google\n Chrome, the worst of which could allow remote attackers to execute\n arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30526", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.5575", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55823", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55668", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.5578", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55802", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55782", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55833", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55836", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55844", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55825", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55806", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55843", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55848", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30526" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30526", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30526" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/ASA-202106-2", "reference_id": "ASA-202106-2", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202106-2" }, { "reference_url": "https://security.archlinux.org/AVG-1990", "reference_id": "AVG-1990", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1990" }, { "reference_url": "https://security.archlinux.org/AVG-1991", "reference_id": "AVG-1991", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1991" }, { "reference_url": "https://security.gentoo.org/glsa/202107-06", "reference_id": "GLSA-202107-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-06" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/372047?format=api", "purl": "pkg:alpm/archlinux/chromium@91.0.4472.77-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/chromium@91.0.4472.77-1" } ], "aliases": [ "CVE-2021-30526" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qdw1-rhx2-e3fu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49444?format=api", "vulnerability_id": "VCID-rfg6-a1b3-2qa4", "summary": "Multiple vulnerabillities have been found in Chromium and Google\n Chrome, the worst of which could allow remote attackers to execute\n arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30537", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.304", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30579", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.306", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30736", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30784", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30658", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.3069", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30695", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30651", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30606", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30631", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30613", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30537" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30537", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30537" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/ASA-202106-2", "reference_id": "ASA-202106-2", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202106-2" }, { "reference_url": "https://security.archlinux.org/AVG-1990", "reference_id": "AVG-1990", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1990" }, { "reference_url": "https://security.archlinux.org/AVG-1991", "reference_id": "AVG-1991", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1991" }, { "reference_url": "https://security.gentoo.org/glsa/202107-06", "reference_id": "GLSA-202107-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-06" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/372047?format=api", "purl": "pkg:alpm/archlinux/chromium@91.0.4472.77-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/chromium@91.0.4472.77-1" } ], "aliases": [ "CVE-2021-30537" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rfg6-a1b3-2qa4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49439?format=api", "vulnerability_id": "VCID-rx6k-fvxg-ruh7", "summary": "Multiple vulnerabillities have been found in Chromium and Google\n Chrome, the worst of which could allow remote attackers to execute\n arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30531", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00374", "scoring_system": "epss", "scoring_elements": "0.59081", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00374", "scoring_system": "epss", "scoring_elements": "0.59101", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00374", "scoring_system": "epss", "scoring_elements": "0.58981", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00374", "scoring_system": "epss", "scoring_elements": "0.59056", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00374", "scoring_system": "epss", "scoring_elements": "0.59079", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00374", "scoring_system": "epss", "scoring_elements": "0.59044", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00374", "scoring_system": "epss", "scoring_elements": "0.59094", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00374", "scoring_system": "epss", "scoring_elements": "0.59099", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00374", "scoring_system": "epss", "scoring_elements": "0.59118", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00374", "scoring_system": "epss", "scoring_elements": "0.5908", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00374", "scoring_system": "epss", "scoring_elements": "0.59117", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00374", "scoring_system": "epss", "scoring_elements": "0.59121", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30531" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30531", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30531" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/ASA-202106-2", "reference_id": "ASA-202106-2", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202106-2" }, { "reference_url": "https://security.archlinux.org/AVG-1990", "reference_id": "AVG-1990", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1990" }, { "reference_url": "https://security.archlinux.org/AVG-1991", "reference_id": "AVG-1991", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1991" }, { "reference_url": "https://security.gentoo.org/glsa/202107-06", "reference_id": "GLSA-202107-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-06" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/372047?format=api", "purl": "pkg:alpm/archlinux/chromium@91.0.4472.77-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/chromium@91.0.4472.77-1" } ], "aliases": [ "CVE-2021-30531" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rx6k-fvxg-ruh7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49440?format=api", "vulnerability_id": "VCID-s575-newv-r3h9", "summary": "Multiple vulnerabillities have been found in Chromium and Google\n Chrome, the worst of which could allow remote attackers to execute\n arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30532", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00558", "scoring_system": "epss", "scoring_elements": "0.68274", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00558", "scoring_system": "epss", "scoring_elements": "0.68232", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00558", "scoring_system": "epss", "scoring_elements": "0.6814", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00558", "scoring_system": "epss", "scoring_elements": "0.68163", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00558", "scoring_system": "epss", "scoring_elements": "0.6818", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00558", "scoring_system": "epss", "scoring_elements": "0.68158", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00558", "scoring_system": "epss", "scoring_elements": "0.68209", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00558", "scoring_system": "epss", "scoring_elements": "0.68224", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00558", "scoring_system": "epss", "scoring_elements": "0.6825", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00558", "scoring_system": "epss", "scoring_elements": "0.68236", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00558", "scoring_system": "epss", "scoring_elements": "0.68203", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00558", "scoring_system": "epss", "scoring_elements": "0.68242", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00558", "scoring_system": "epss", "scoring_elements": "0.68252", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30532" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30532", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30532" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/ASA-202106-2", "reference_id": "ASA-202106-2", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202106-2" }, { "reference_url": "https://security.archlinux.org/AVG-1990", "reference_id": "AVG-1990", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1990" }, { "reference_url": "https://security.archlinux.org/AVG-1991", "reference_id": "AVG-1991", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1991" }, { "reference_url": "https://security.gentoo.org/glsa/202107-06", "reference_id": "GLSA-202107-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-06" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/372047?format=api", "purl": "pkg:alpm/archlinux/chromium@91.0.4472.77-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/chromium@91.0.4472.77-1" } ], "aliases": [ "CVE-2021-30532" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s575-newv-r3h9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49447?format=api", "vulnerability_id": "VCID-u4hw-r55c-mqg9", "summary": "Multiple vulnerabillities have been found in Chromium and Google\n Chrome, the worst of which could allow remote attackers to execute\n arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30540", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00533", "scoring_system": "epss", "scoring_elements": "0.67408", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00533", "scoring_system": "epss", "scoring_elements": "0.6729", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00533", "scoring_system": "epss", "scoring_elements": "0.67327", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00533", "scoring_system": "epss", "scoring_elements": "0.6735", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00533", "scoring_system": "epss", "scoring_elements": "0.67378", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00533", "scoring_system": "epss", "scoring_elements": "0.67391", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00533", "scoring_system": "epss", "scoring_elements": "0.67412", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00533", "scoring_system": "epss", "scoring_elements": "0.674", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00533", "scoring_system": "epss", "scoring_elements": "0.67365", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00533", "scoring_system": "epss", "scoring_elements": "0.67399", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00533", "scoring_system": "epss", "scoring_elements": "0.67411", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00533", "scoring_system": "epss", "scoring_elements": "0.67389", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30540" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30540", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30540" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/AVG-2044", "reference_id": "AVG-2044", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2044" }, { "reference_url": "https://security.gentoo.org/glsa/202107-06", "reference_id": "GLSA-202107-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-06" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/372047?format=api", "purl": "pkg:alpm/archlinux/chromium@91.0.4472.77-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/chromium@91.0.4472.77-1" } ], "aliases": [ "CVE-2021-30540" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-u4hw-r55c-mqg9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/94722?format=api", "vulnerability_id": "VCID-v547-6z4g-kba3", "summary": "Double free in ICU in Google Chrome prior to 91.0.4472.77 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30535", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00559", "scoring_system": "epss", "scoring_elements": "0.68309", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00559", "scoring_system": "epss", "scoring_elements": "0.68266", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00559", "scoring_system": "epss", "scoring_elements": "0.68173", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00559", "scoring_system": "epss", "scoring_elements": "0.68196", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00559", "scoring_system": "epss", "scoring_elements": "0.68214", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00559", "scoring_system": "epss", "scoring_elements": "0.6819", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00559", "scoring_system": "epss", "scoring_elements": "0.68241", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00559", "scoring_system": "epss", "scoring_elements": "0.68256", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00559", "scoring_system": "epss", "scoring_elements": "0.68281", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00559", "scoring_system": "epss", "scoring_elements": "0.68269", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00559", "scoring_system": "epss", "scoring_elements": "0.68235", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00559", "scoring_system": "epss", "scoring_elements": "0.68275", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00559", "scoring_system": "epss", "scoring_elements": "0.68286", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30535" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30535", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30535" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079", "reference_id": "990079", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079" }, { "reference_url": "https://security.archlinux.org/ASA-202106-2", "reference_id": "ASA-202106-2", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202106-2" }, { "reference_url": "https://security.archlinux.org/AVG-1990", "reference_id": "AVG-1990", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1990" }, { "reference_url": "https://security.archlinux.org/AVG-1991", "reference_id": "AVG-1991", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1991" }, { "reference_url": "https://usn.ubuntu.com/5156-1/", "reference_id": "USN-5156-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5156-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/372047?format=api", "purl": "pkg:alpm/archlinux/chromium@91.0.4472.77-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/chromium@91.0.4472.77-1" } ], "aliases": [ "CVE-2021-30535" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v547-6z4g-kba3" } ], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49427?format=api", "vulnerability_id": "VCID-2csy-wafr-bydm", "summary": "Multiple vulnerabillities have been found in Chromium and Google\n Chrome, the worst of which could allow remote attackers to execute\n arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30518", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00864", "scoring_system": "epss", "scoring_elements": "0.75171", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00864", "scoring_system": "epss", "scoring_elements": "0.75133", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00864", "scoring_system": "epss", "scoring_elements": "0.75053", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00864", "scoring_system": "epss", "scoring_elements": "0.75056", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00864", "scoring_system": "epss", "scoring_elements": "0.75086", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00864", "scoring_system": "epss", "scoring_elements": "0.75063", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00864", "scoring_system": "epss", "scoring_elements": "0.75097", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00864", "scoring_system": "epss", "scoring_elements": "0.75108", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00864", "scoring_system": "epss", "scoring_elements": "0.7513", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00864", "scoring_system": "epss", "scoring_elements": "0.75109", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00864", "scoring_system": "epss", "scoring_elements": "0.75098", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00864", "scoring_system": "epss", "scoring_elements": "0.75136", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00864", "scoring_system": "epss", "scoring_elements": "0.75143", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30518" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30506", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30506" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30507", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30507" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30508", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30508" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30509", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30509" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30510", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30510" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30511", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30511" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30512", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30512" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30513", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30513" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30514", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30514" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30515", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30515" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30516", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30516" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30517", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30517" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30518", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30518" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30519", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30519" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30520", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30520" }, { "reference_url": "https://security.archlinux.org/ASA-202105-7", "reference_id": "ASA-202105-7", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202105-7" }, { "reference_url": "https://security.archlinux.org/ASA-202105-8", "reference_id": "ASA-202105-8", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202105-8" }, { "reference_url": "https://security.archlinux.org/AVG-1936", "reference_id": "AVG-1936", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1936" }, { "reference_url": "https://security.archlinux.org/AVG-1937", "reference_id": "AVG-1937", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1937" }, { "reference_url": "https://security.gentoo.org/glsa/202107-06", "reference_id": "GLSA-202107-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-06" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/372046?format=api", "purl": "pkg:alpm/archlinux/chromium@90.0.4430.212-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7fef-qr2c-gbcp" }, { "vulnerability": "VCID-7spy-wcry-6fb8" }, { "vulnerability": "VCID-81s9-h9rs-bkfh" }, { "vulnerability": "VCID-8bhz-3581-bkca" }, { "vulnerability": "VCID-9u4b-zjdu-n3b3" }, { "vulnerability": "VCID-amkk-esp8-53af" }, { "vulnerability": "VCID-aswr-a7yz-tbb3" }, { "vulnerability": "VCID-cntb-k34n-dbaq" }, { "vulnerability": "VCID-e5qg-urfz-37b6" }, { "vulnerability": "VCID-ej7g-qqsm-y7ch" }, { "vulnerability": "VCID-fgt6-p8h5-wyf2" }, { "vulnerability": "VCID-gdf5-fgc4-zqdp" }, { "vulnerability": "VCID-jm7s-knrf-vqcj" }, { "vulnerability": "VCID-jzch-bp6c-mqgd" }, { "vulnerability": "VCID-k2cy-dr3z-83cy" }, { "vulnerability": "VCID-n1ux-5z1c-9ban" }, { "vulnerability": "VCID-qdw1-rhx2-e3fu" }, { "vulnerability": "VCID-rfg6-a1b3-2qa4" }, { "vulnerability": "VCID-rx6k-fvxg-ruh7" }, { "vulnerability": "VCID-s575-newv-r3h9" }, { "vulnerability": "VCID-u4hw-r55c-mqg9" }, { "vulnerability": "VCID-v547-6z4g-kba3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/chromium@90.0.4430.212-1" } ], "aliases": [ "CVE-2021-30518" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2csy-wafr-bydm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49425?format=api", "vulnerability_id": "VCID-3fmx-ejpm-eydy", "summary": "Multiple vulnerabillities have been found in Chromium and Google\n Chrome, the worst of which could allow remote attackers to execute\n arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30516", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00864", "scoring_system": "epss", "scoring_elements": "0.75171", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00864", "scoring_system": "epss", "scoring_elements": "0.75133", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00864", "scoring_system": "epss", "scoring_elements": "0.75053", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00864", "scoring_system": "epss", "scoring_elements": "0.75056", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00864", "scoring_system": "epss", "scoring_elements": "0.75086", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00864", "scoring_system": "epss", "scoring_elements": "0.75063", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00864", "scoring_system": "epss", "scoring_elements": "0.75097", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00864", "scoring_system": "epss", "scoring_elements": "0.75108", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00864", "scoring_system": "epss", "scoring_elements": "0.7513", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00864", "scoring_system": "epss", "scoring_elements": "0.75109", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00864", "scoring_system": "epss", "scoring_elements": "0.75098", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00864", "scoring_system": "epss", "scoring_elements": "0.75136", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00864", "scoring_system": "epss", "scoring_elements": "0.75143", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30516" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30506", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30506" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30507", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30507" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30508", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30508" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30509", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30509" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30510", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30510" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30511", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30511" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30512", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30512" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30513", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30513" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30514", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30514" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30515", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30515" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30516", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30516" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30517", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30517" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30518", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30518" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30519", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30519" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30520", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30520" }, { "reference_url": "https://security.archlinux.org/ASA-202105-7", "reference_id": "ASA-202105-7", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202105-7" }, { "reference_url": "https://security.archlinux.org/ASA-202105-8", "reference_id": "ASA-202105-8", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202105-8" }, { "reference_url": "https://security.archlinux.org/AVG-1936", "reference_id": "AVG-1936", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1936" }, { "reference_url": "https://security.archlinux.org/AVG-1937", "reference_id": "AVG-1937", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1937" }, { "reference_url": "https://security.gentoo.org/glsa/202107-06", "reference_id": "GLSA-202107-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-06" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/372046?format=api", "purl": "pkg:alpm/archlinux/chromium@90.0.4430.212-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7fef-qr2c-gbcp" }, { "vulnerability": "VCID-7spy-wcry-6fb8" }, { "vulnerability": "VCID-81s9-h9rs-bkfh" }, { "vulnerability": "VCID-8bhz-3581-bkca" }, { "vulnerability": "VCID-9u4b-zjdu-n3b3" }, { "vulnerability": "VCID-amkk-esp8-53af" }, { "vulnerability": "VCID-aswr-a7yz-tbb3" }, { "vulnerability": "VCID-cntb-k34n-dbaq" }, { "vulnerability": "VCID-e5qg-urfz-37b6" }, { "vulnerability": "VCID-ej7g-qqsm-y7ch" }, { "vulnerability": "VCID-fgt6-p8h5-wyf2" }, { "vulnerability": "VCID-gdf5-fgc4-zqdp" }, { "vulnerability": "VCID-jm7s-knrf-vqcj" }, { "vulnerability": "VCID-jzch-bp6c-mqgd" }, { "vulnerability": "VCID-k2cy-dr3z-83cy" }, { "vulnerability": "VCID-n1ux-5z1c-9ban" }, { "vulnerability": "VCID-qdw1-rhx2-e3fu" }, { "vulnerability": "VCID-rfg6-a1b3-2qa4" }, { "vulnerability": "VCID-rx6k-fvxg-ruh7" }, { "vulnerability": "VCID-s575-newv-r3h9" }, { "vulnerability": "VCID-u4hw-r55c-mqg9" }, { "vulnerability": "VCID-v547-6z4g-kba3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/chromium@90.0.4430.212-1" } ], "aliases": [ "CVE-2021-30516" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3fmx-ejpm-eydy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49422?format=api", "vulnerability_id": "VCID-4mtb-xuvx-p7a1", "summary": "Multiple vulnerabillities have been found in Chromium and Google\n Chrome, the worst of which could allow remote attackers to execute\n arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30513", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01087", "scoring_system": "epss", "scoring_elements": "0.77979", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01087", "scoring_system": "epss", "scoring_elements": "0.77946", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01087", "scoring_system": "epss", "scoring_elements": "0.77856", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01087", "scoring_system": "epss", "scoring_elements": "0.77864", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01087", "scoring_system": "epss", "scoring_elements": "0.77891", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01087", "scoring_system": "epss", "scoring_elements": "0.77874", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01087", "scoring_system": "epss", "scoring_elements": "0.77901", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01087", "scoring_system": "epss", "scoring_elements": "0.77906", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01087", "scoring_system": "epss", "scoring_elements": "0.77932", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01087", "scoring_system": "epss", "scoring_elements": "0.77916", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01087", "scoring_system": "epss", "scoring_elements": "0.77954", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01087", "scoring_system": "epss", "scoring_elements": "0.77952", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30513" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30506", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30506" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30507", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30507" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30508", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30508" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30509", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30509" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30510", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30510" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30511", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30511" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30512", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30512" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30513", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30513" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30514", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30514" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30515", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30515" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30516", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30516" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30517", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30517" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30518", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30518" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30519", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30519" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30520", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30520" }, { "reference_url": "https://security.archlinux.org/ASA-202105-7", "reference_id": "ASA-202105-7", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202105-7" }, { "reference_url": "https://security.archlinux.org/ASA-202105-8", "reference_id": "ASA-202105-8", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202105-8" }, { "reference_url": "https://security.archlinux.org/AVG-1936", "reference_id": "AVG-1936", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1936" }, { "reference_url": "https://security.archlinux.org/AVG-1937", "reference_id": "AVG-1937", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1937" }, { "reference_url": "https://security.gentoo.org/glsa/202107-06", "reference_id": "GLSA-202107-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-06" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/372046?format=api", "purl": "pkg:alpm/archlinux/chromium@90.0.4430.212-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7fef-qr2c-gbcp" }, { "vulnerability": "VCID-7spy-wcry-6fb8" }, { "vulnerability": "VCID-81s9-h9rs-bkfh" }, { "vulnerability": "VCID-8bhz-3581-bkca" }, { "vulnerability": "VCID-9u4b-zjdu-n3b3" }, { "vulnerability": "VCID-amkk-esp8-53af" }, { "vulnerability": "VCID-aswr-a7yz-tbb3" }, { "vulnerability": "VCID-cntb-k34n-dbaq" }, { "vulnerability": "VCID-e5qg-urfz-37b6" }, { "vulnerability": "VCID-ej7g-qqsm-y7ch" }, { "vulnerability": "VCID-fgt6-p8h5-wyf2" }, { "vulnerability": "VCID-gdf5-fgc4-zqdp" }, { "vulnerability": "VCID-jm7s-knrf-vqcj" }, { "vulnerability": "VCID-jzch-bp6c-mqgd" }, { "vulnerability": "VCID-k2cy-dr3z-83cy" }, { "vulnerability": "VCID-n1ux-5z1c-9ban" }, { "vulnerability": "VCID-qdw1-rhx2-e3fu" }, { "vulnerability": "VCID-rfg6-a1b3-2qa4" }, { "vulnerability": "VCID-rx6k-fvxg-ruh7" }, { "vulnerability": "VCID-s575-newv-r3h9" }, { "vulnerability": "VCID-u4hw-r55c-mqg9" }, { "vulnerability": "VCID-v547-6z4g-kba3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/chromium@90.0.4430.212-1" } ], "aliases": [ "CVE-2021-30513" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4mtb-xuvx-p7a1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49428?format=api", "vulnerability_id": "VCID-72nk-wdkx-pkh6", "summary": "Multiple vulnerabillities have been found in Chromium and Google\n Chrome, the worst of which could allow remote attackers to execute\n arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30519", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.55175", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.55238", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.55092", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.55193", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.55217", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.55195", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.55244", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.55245", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.55256", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.55236", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.55255", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.55259", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30519" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30506", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30506" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30507", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30507" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30508", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30508" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30509", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30509" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30510", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30510" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30511", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30511" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30512", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30512" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30513", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30513" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30514", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30514" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30515", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30515" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30516", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30516" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30517", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30517" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30518", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30518" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30519", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30519" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30520", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30520" }, { "reference_url": "https://security.archlinux.org/ASA-202105-7", "reference_id": "ASA-202105-7", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202105-7" }, { "reference_url": "https://security.archlinux.org/ASA-202105-8", "reference_id": "ASA-202105-8", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202105-8" }, { "reference_url": "https://security.archlinux.org/AVG-1936", "reference_id": "AVG-1936", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1936" }, { "reference_url": "https://security.archlinux.org/AVG-1937", "reference_id": "AVG-1937", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1937" }, { "reference_url": "https://security.gentoo.org/glsa/202107-06", "reference_id": "GLSA-202107-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-06" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/372046?format=api", "purl": "pkg:alpm/archlinux/chromium@90.0.4430.212-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7fef-qr2c-gbcp" }, { "vulnerability": "VCID-7spy-wcry-6fb8" }, { "vulnerability": "VCID-81s9-h9rs-bkfh" }, { "vulnerability": "VCID-8bhz-3581-bkca" }, { "vulnerability": "VCID-9u4b-zjdu-n3b3" }, { "vulnerability": "VCID-amkk-esp8-53af" }, { "vulnerability": "VCID-aswr-a7yz-tbb3" }, { "vulnerability": "VCID-cntb-k34n-dbaq" }, { "vulnerability": "VCID-e5qg-urfz-37b6" }, { "vulnerability": "VCID-ej7g-qqsm-y7ch" }, { "vulnerability": "VCID-fgt6-p8h5-wyf2" }, { "vulnerability": "VCID-gdf5-fgc4-zqdp" }, { "vulnerability": "VCID-jm7s-knrf-vqcj" }, { "vulnerability": "VCID-jzch-bp6c-mqgd" }, { "vulnerability": "VCID-k2cy-dr3z-83cy" }, { "vulnerability": "VCID-n1ux-5z1c-9ban" }, { "vulnerability": "VCID-qdw1-rhx2-e3fu" }, { "vulnerability": "VCID-rfg6-a1b3-2qa4" }, { "vulnerability": "VCID-rx6k-fvxg-ruh7" }, { "vulnerability": "VCID-s575-newv-r3h9" }, { "vulnerability": "VCID-u4hw-r55c-mqg9" }, { "vulnerability": "VCID-v547-6z4g-kba3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/chromium@90.0.4430.212-1" } ], "aliases": [ "CVE-2021-30519" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-72nk-wdkx-pkh6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49426?format=api", "vulnerability_id": "VCID-813k-vj23-nfa2", "summary": "Multiple vulnerabillities have been found in Chromium and Google\n Chrome, the worst of which could allow remote attackers to execute\n arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30517", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.14196", "scoring_system": "epss", "scoring_elements": "0.94407", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.14196", "scoring_system": "epss", "scoring_elements": "0.94405", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.14196", "scoring_system": "epss", "scoring_elements": "0.94343", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.14196", "scoring_system": "epss", "scoring_elements": "0.94351", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.14196", "scoring_system": "epss", "scoring_elements": "0.94362", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.14196", "scoring_system": "epss", "scoring_elements": "0.94363", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.14196", "scoring_system": "epss", "scoring_elements": "0.94372", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.14196", "scoring_system": "epss", "scoring_elements": "0.94377", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.14196", "scoring_system": "epss", "scoring_elements": "0.9438", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.14196", "scoring_system": "epss", "scoring_elements": "0.94381", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.14196", "scoring_system": "epss", "scoring_elements": "0.94382", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.14196", "scoring_system": "epss", "scoring_elements": "0.94397", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.14196", "scoring_system": "epss", "scoring_elements": "0.94402", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30517" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30506", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30506" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30507", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30507" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30508", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30508" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30509", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30509" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30510", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30510" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30511", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30511" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30512", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30512" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30513", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30513" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30514", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30514" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30515", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30515" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30516", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30516" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30517", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30517" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30518", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30518" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30519", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30519" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30520", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30520" }, { "reference_url": "https://security.archlinux.org/ASA-202105-7", "reference_id": "ASA-202105-7", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202105-7" }, { "reference_url": "https://security.archlinux.org/ASA-202105-8", "reference_id": "ASA-202105-8", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202105-8" }, { "reference_url": "https://security.archlinux.org/AVG-1936", "reference_id": "AVG-1936", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1936" }, { "reference_url": "https://security.archlinux.org/AVG-1937", "reference_id": "AVG-1937", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1937" }, { "reference_url": "https://security.gentoo.org/glsa/202107-06", "reference_id": "GLSA-202107-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-06" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/372046?format=api", "purl": "pkg:alpm/archlinux/chromium@90.0.4430.212-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7fef-qr2c-gbcp" }, { "vulnerability": "VCID-7spy-wcry-6fb8" }, { "vulnerability": "VCID-81s9-h9rs-bkfh" }, { "vulnerability": "VCID-8bhz-3581-bkca" }, { "vulnerability": "VCID-9u4b-zjdu-n3b3" }, { "vulnerability": "VCID-amkk-esp8-53af" }, { "vulnerability": "VCID-aswr-a7yz-tbb3" }, { "vulnerability": "VCID-cntb-k34n-dbaq" }, { "vulnerability": "VCID-e5qg-urfz-37b6" }, { "vulnerability": "VCID-ej7g-qqsm-y7ch" }, { "vulnerability": "VCID-fgt6-p8h5-wyf2" }, { "vulnerability": "VCID-gdf5-fgc4-zqdp" }, { "vulnerability": "VCID-jm7s-knrf-vqcj" }, { "vulnerability": "VCID-jzch-bp6c-mqgd" }, { "vulnerability": "VCID-k2cy-dr3z-83cy" }, { "vulnerability": "VCID-n1ux-5z1c-9ban" }, { "vulnerability": "VCID-qdw1-rhx2-e3fu" }, { "vulnerability": "VCID-rfg6-a1b3-2qa4" }, { "vulnerability": "VCID-rx6k-fvxg-ruh7" }, { "vulnerability": "VCID-s575-newv-r3h9" }, { "vulnerability": "VCID-u4hw-r55c-mqg9" }, { "vulnerability": "VCID-v547-6z4g-kba3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/chromium@90.0.4430.212-1" } ], "aliases": [ "CVE-2021-30517" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-813k-vj23-nfa2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49417?format=api", "vulnerability_id": "VCID-acej-edpb-hybv", "summary": "Multiple vulnerabillities have been found in Chromium and Google\n Chrome, the worst of which could allow remote attackers to execute\n arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30508", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54121", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54141", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54017", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54035", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54061", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54038", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54089", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54087", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54133", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54115", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54098", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54137", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30508" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30506", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30506" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30507", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30507" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30508", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30508" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30509", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30509" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30510", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30510" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30511", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30511" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30512", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30512" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30513", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30513" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30514", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30514" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30515", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30515" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30516", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30516" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30517", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30517" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30518", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30518" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30519", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30519" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30520", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30520" }, { "reference_url": "https://security.archlinux.org/ASA-202105-7", "reference_id": "ASA-202105-7", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202105-7" }, { "reference_url": "https://security.archlinux.org/ASA-202105-8", "reference_id": "ASA-202105-8", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202105-8" }, { "reference_url": "https://security.archlinux.org/AVG-1936", "reference_id": "AVG-1936", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1936" }, { "reference_url": "https://security.archlinux.org/AVG-1937", "reference_id": "AVG-1937", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1937" }, { "reference_url": "https://security.gentoo.org/glsa/202107-06", "reference_id": "GLSA-202107-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-06" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/372046?format=api", "purl": "pkg:alpm/archlinux/chromium@90.0.4430.212-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7fef-qr2c-gbcp" }, { "vulnerability": "VCID-7spy-wcry-6fb8" }, { "vulnerability": "VCID-81s9-h9rs-bkfh" }, { "vulnerability": "VCID-8bhz-3581-bkca" }, { "vulnerability": "VCID-9u4b-zjdu-n3b3" }, { "vulnerability": "VCID-amkk-esp8-53af" }, { "vulnerability": "VCID-aswr-a7yz-tbb3" }, { "vulnerability": "VCID-cntb-k34n-dbaq" }, { "vulnerability": "VCID-e5qg-urfz-37b6" }, { "vulnerability": "VCID-ej7g-qqsm-y7ch" }, { "vulnerability": "VCID-fgt6-p8h5-wyf2" }, { "vulnerability": "VCID-gdf5-fgc4-zqdp" }, { "vulnerability": "VCID-jm7s-knrf-vqcj" }, { "vulnerability": "VCID-jzch-bp6c-mqgd" }, { "vulnerability": "VCID-k2cy-dr3z-83cy" }, { "vulnerability": "VCID-n1ux-5z1c-9ban" }, { "vulnerability": "VCID-qdw1-rhx2-e3fu" }, { "vulnerability": "VCID-rfg6-a1b3-2qa4" }, { "vulnerability": "VCID-rx6k-fvxg-ruh7" }, { "vulnerability": "VCID-s575-newv-r3h9" }, { "vulnerability": "VCID-u4hw-r55c-mqg9" }, { "vulnerability": "VCID-v547-6z4g-kba3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/chromium@90.0.4430.212-1" } ], "aliases": [ "CVE-2021-30508" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-acej-edpb-hybv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49424?format=api", "vulnerability_id": "VCID-dauy-gzcb-j3fp", "summary": "Multiple vulnerabillities have been found in Chromium and Google\n Chrome, the worst of which could allow remote attackers to execute\n arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30515", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0049", "scoring_system": "epss", "scoring_elements": "0.65616", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0049", "scoring_system": "epss", "scoring_elements": "0.656", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0049", "scoring_system": "epss", "scoring_elements": "0.65484", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0049", "scoring_system": "epss", "scoring_elements": "0.65533", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0049", "scoring_system": "epss", "scoring_elements": "0.65561", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0049", "scoring_system": "epss", "scoring_elements": "0.65527", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0049", "scoring_system": "epss", "scoring_elements": "0.65579", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0049", "scoring_system": "epss", "scoring_elements": "0.65591", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0049", "scoring_system": "epss", "scoring_elements": "0.6561", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0049", "scoring_system": "epss", "scoring_elements": "0.65597", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0049", "scoring_system": "epss", "scoring_elements": "0.65568", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0049", "scoring_system": "epss", "scoring_elements": "0.65604", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0049", "scoring_system": "epss", "scoring_elements": "0.65617", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30515" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30506", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30506" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30507", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30507" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30508", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30508" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30509", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30509" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30510", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30510" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30511", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30511" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30512", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30512" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30513", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30513" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30514", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30514" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30515", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30515" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30516", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30516" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30517", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30517" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30518", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30518" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30519", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30519" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30520", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30520" }, { "reference_url": "https://security.archlinux.org/ASA-202105-7", "reference_id": "ASA-202105-7", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202105-7" }, { "reference_url": "https://security.archlinux.org/ASA-202105-8", "reference_id": "ASA-202105-8", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202105-8" }, { "reference_url": "https://security.archlinux.org/AVG-1936", "reference_id": "AVG-1936", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1936" }, { "reference_url": "https://security.archlinux.org/AVG-1937", "reference_id": "AVG-1937", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1937" }, { "reference_url": "https://security.gentoo.org/glsa/202107-06", "reference_id": "GLSA-202107-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-06" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/372046?format=api", "purl": "pkg:alpm/archlinux/chromium@90.0.4430.212-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7fef-qr2c-gbcp" }, { "vulnerability": "VCID-7spy-wcry-6fb8" }, { "vulnerability": "VCID-81s9-h9rs-bkfh" }, { "vulnerability": "VCID-8bhz-3581-bkca" }, { "vulnerability": "VCID-9u4b-zjdu-n3b3" }, { "vulnerability": "VCID-amkk-esp8-53af" }, { "vulnerability": "VCID-aswr-a7yz-tbb3" }, { "vulnerability": "VCID-cntb-k34n-dbaq" }, { "vulnerability": "VCID-e5qg-urfz-37b6" }, { "vulnerability": "VCID-ej7g-qqsm-y7ch" }, { "vulnerability": "VCID-fgt6-p8h5-wyf2" }, { "vulnerability": "VCID-gdf5-fgc4-zqdp" }, { "vulnerability": "VCID-jm7s-knrf-vqcj" }, { "vulnerability": "VCID-jzch-bp6c-mqgd" }, { "vulnerability": "VCID-k2cy-dr3z-83cy" }, { "vulnerability": "VCID-n1ux-5z1c-9ban" }, { "vulnerability": "VCID-qdw1-rhx2-e3fu" }, { "vulnerability": "VCID-rfg6-a1b3-2qa4" }, { "vulnerability": "VCID-rx6k-fvxg-ruh7" }, { "vulnerability": "VCID-s575-newv-r3h9" }, { "vulnerability": "VCID-u4hw-r55c-mqg9" }, { "vulnerability": "VCID-v547-6z4g-kba3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/chromium@90.0.4430.212-1" } ], "aliases": [ "CVE-2021-30515" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dauy-gzcb-j3fp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49429?format=api", "vulnerability_id": "VCID-dsuc-we2q-wffm", "summary": "Multiple vulnerabillities have been found in Chromium and Google\n Chrome, the worst of which could allow remote attackers to execute\n arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30520", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.55175", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.55238", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.55092", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.55193", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.55217", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.55195", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.55244", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.55245", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.55256", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.55236", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.55255", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.55259", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30520" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30506", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30506" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30507", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30507" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30508", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30508" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30509", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30509" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30510", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30510" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30511", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30511" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30512", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30512" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30513", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30513" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30514", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30514" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30515", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30515" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30516", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30516" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30517", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30517" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30518", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30518" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30519", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30519" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30520", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30520" }, { "reference_url": "https://security.archlinux.org/ASA-202105-7", "reference_id": "ASA-202105-7", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202105-7" }, { "reference_url": "https://security.archlinux.org/ASA-202105-8", "reference_id": "ASA-202105-8", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202105-8" }, { "reference_url": "https://security.archlinux.org/AVG-1936", "reference_id": "AVG-1936", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1936" }, { "reference_url": "https://security.archlinux.org/AVG-1937", "reference_id": "AVG-1937", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1937" }, { "reference_url": "https://security.gentoo.org/glsa/202107-06", "reference_id": "GLSA-202107-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-06" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/372046?format=api", "purl": "pkg:alpm/archlinux/chromium@90.0.4430.212-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7fef-qr2c-gbcp" }, { "vulnerability": "VCID-7spy-wcry-6fb8" }, { "vulnerability": "VCID-81s9-h9rs-bkfh" }, { "vulnerability": "VCID-8bhz-3581-bkca" }, { "vulnerability": "VCID-9u4b-zjdu-n3b3" }, { "vulnerability": "VCID-amkk-esp8-53af" }, { "vulnerability": "VCID-aswr-a7yz-tbb3" }, { "vulnerability": "VCID-cntb-k34n-dbaq" }, { "vulnerability": "VCID-e5qg-urfz-37b6" }, { "vulnerability": "VCID-ej7g-qqsm-y7ch" }, { "vulnerability": "VCID-fgt6-p8h5-wyf2" }, { "vulnerability": "VCID-gdf5-fgc4-zqdp" }, { "vulnerability": "VCID-jm7s-knrf-vqcj" }, { "vulnerability": "VCID-jzch-bp6c-mqgd" }, { "vulnerability": "VCID-k2cy-dr3z-83cy" }, { "vulnerability": "VCID-n1ux-5z1c-9ban" }, { "vulnerability": "VCID-qdw1-rhx2-e3fu" }, { "vulnerability": "VCID-rfg6-a1b3-2qa4" }, { "vulnerability": "VCID-rx6k-fvxg-ruh7" }, { "vulnerability": "VCID-s575-newv-r3h9" }, { "vulnerability": "VCID-u4hw-r55c-mqg9" }, { "vulnerability": "VCID-v547-6z4g-kba3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/chromium@90.0.4430.212-1" } ], "aliases": [ "CVE-2021-30520" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dsuc-we2q-wffm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49421?format=api", "vulnerability_id": "VCID-ebh1-78wm-mubs", "summary": "Multiple vulnerabillities have been found in Chromium and Google\n Chrome, the worst of which could allow remote attackers to execute\n arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30512", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00665", "scoring_system": "epss", "scoring_elements": "0.71296", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00665", "scoring_system": "epss", "scoring_elements": "0.71242", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00665", "scoring_system": "epss", "scoring_elements": "0.71163", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00665", "scoring_system": "epss", "scoring_elements": "0.71173", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00665", "scoring_system": "epss", "scoring_elements": "0.7119", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00665", "scoring_system": "epss", "scoring_elements": "0.71165", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00665", "scoring_system": "epss", "scoring_elements": "0.71207", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00665", "scoring_system": "epss", "scoring_elements": "0.7122", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00665", "scoring_system": "epss", "scoring_elements": "0.71243", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00665", "scoring_system": "epss", "scoring_elements": "0.71228", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00665", "scoring_system": "epss", "scoring_elements": "0.71212", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00665", "scoring_system": "epss", "scoring_elements": "0.71258", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00665", "scoring_system": "epss", "scoring_elements": "0.71265", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30512" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30506", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30506" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30507", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30507" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30508", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30508" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30509", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30509" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30510", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30510" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30511", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30511" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30512", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30512" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30513", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30513" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30514", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30514" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30515", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30515" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30516", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30516" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30517", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30517" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30518", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30518" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30519", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30519" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30520", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30520" }, { "reference_url": "https://security.archlinux.org/ASA-202105-7", "reference_id": "ASA-202105-7", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202105-7" }, { "reference_url": "https://security.archlinux.org/ASA-202105-8", "reference_id": "ASA-202105-8", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202105-8" }, { "reference_url": "https://security.archlinux.org/AVG-1936", "reference_id": "AVG-1936", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1936" }, { "reference_url": "https://security.archlinux.org/AVG-1937", "reference_id": "AVG-1937", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1937" }, { "reference_url": "https://security.gentoo.org/glsa/202107-06", "reference_id": "GLSA-202107-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-06" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/372046?format=api", "purl": "pkg:alpm/archlinux/chromium@90.0.4430.212-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7fef-qr2c-gbcp" }, { "vulnerability": "VCID-7spy-wcry-6fb8" }, { "vulnerability": "VCID-81s9-h9rs-bkfh" }, { "vulnerability": "VCID-8bhz-3581-bkca" }, { "vulnerability": "VCID-9u4b-zjdu-n3b3" }, { "vulnerability": "VCID-amkk-esp8-53af" }, { "vulnerability": "VCID-aswr-a7yz-tbb3" }, { "vulnerability": "VCID-cntb-k34n-dbaq" }, { "vulnerability": "VCID-e5qg-urfz-37b6" }, { "vulnerability": "VCID-ej7g-qqsm-y7ch" }, { "vulnerability": "VCID-fgt6-p8h5-wyf2" }, { "vulnerability": "VCID-gdf5-fgc4-zqdp" }, { "vulnerability": "VCID-jm7s-knrf-vqcj" }, { "vulnerability": "VCID-jzch-bp6c-mqgd" }, { "vulnerability": "VCID-k2cy-dr3z-83cy" }, { "vulnerability": "VCID-n1ux-5z1c-9ban" }, { "vulnerability": "VCID-qdw1-rhx2-e3fu" }, { "vulnerability": "VCID-rfg6-a1b3-2qa4" }, { "vulnerability": "VCID-rx6k-fvxg-ruh7" }, { "vulnerability": "VCID-s575-newv-r3h9" }, { "vulnerability": "VCID-u4hw-r55c-mqg9" }, { "vulnerability": "VCID-v547-6z4g-kba3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/chromium@90.0.4430.212-1" } ], "aliases": [ "CVE-2021-30512" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ebh1-78wm-mubs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49423?format=api", "vulnerability_id": "VCID-hudp-w9wy-4kb8", "summary": "Multiple vulnerabillities have been found in Chromium and Google\n Chrome, the worst of which could allow remote attackers to execute\n arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30514", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00736", "scoring_system": "epss", "scoring_elements": "0.72899", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00736", "scoring_system": "epss", "scoring_elements": "0.72858", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00736", "scoring_system": "epss", "scoring_elements": "0.72759", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00736", "scoring_system": "epss", "scoring_elements": "0.72767", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00736", "scoring_system": "epss", "scoring_elements": "0.72787", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00736", "scoring_system": "epss", "scoring_elements": "0.72763", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00736", "scoring_system": "epss", "scoring_elements": "0.72801", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00736", "scoring_system": "epss", "scoring_elements": "0.72815", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00736", "scoring_system": "epss", "scoring_elements": "0.72839", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00736", "scoring_system": "epss", "scoring_elements": "0.72822", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00736", "scoring_system": "epss", "scoring_elements": "0.72814", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00736", "scoring_system": "epss", "scoring_elements": "0.72856", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00736", "scoring_system": "epss", "scoring_elements": "0.72866", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30514" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30506", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30506" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30507", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30507" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30508", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30508" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30509", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30509" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30510", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30510" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30511", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30511" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30512", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30512" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30513", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30513" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30514", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30514" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30515", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30515" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30516", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30516" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30517", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30517" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30518", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30518" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30519", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30519" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30520", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30520" }, { "reference_url": "https://security.archlinux.org/ASA-202105-7", "reference_id": "ASA-202105-7", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202105-7" }, { "reference_url": "https://security.archlinux.org/ASA-202105-8", "reference_id": "ASA-202105-8", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202105-8" }, { "reference_url": "https://security.archlinux.org/AVG-1936", "reference_id": "AVG-1936", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1936" }, { "reference_url": "https://security.archlinux.org/AVG-1937", "reference_id": "AVG-1937", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1937" }, { "reference_url": "https://security.gentoo.org/glsa/202107-06", "reference_id": "GLSA-202107-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-06" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/372046?format=api", "purl": "pkg:alpm/archlinux/chromium@90.0.4430.212-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7fef-qr2c-gbcp" }, { "vulnerability": "VCID-7spy-wcry-6fb8" }, { "vulnerability": "VCID-81s9-h9rs-bkfh" }, { "vulnerability": "VCID-8bhz-3581-bkca" }, { "vulnerability": "VCID-9u4b-zjdu-n3b3" }, { "vulnerability": "VCID-amkk-esp8-53af" }, { "vulnerability": "VCID-aswr-a7yz-tbb3" }, { "vulnerability": "VCID-cntb-k34n-dbaq" }, { "vulnerability": "VCID-e5qg-urfz-37b6" }, { "vulnerability": "VCID-ej7g-qqsm-y7ch" }, { "vulnerability": "VCID-fgt6-p8h5-wyf2" }, { "vulnerability": "VCID-gdf5-fgc4-zqdp" }, { "vulnerability": "VCID-jm7s-knrf-vqcj" }, { "vulnerability": "VCID-jzch-bp6c-mqgd" }, { "vulnerability": "VCID-k2cy-dr3z-83cy" }, { "vulnerability": "VCID-n1ux-5z1c-9ban" }, { "vulnerability": "VCID-qdw1-rhx2-e3fu" }, { "vulnerability": "VCID-rfg6-a1b3-2qa4" }, { "vulnerability": "VCID-rx6k-fvxg-ruh7" }, { "vulnerability": "VCID-s575-newv-r3h9" }, { "vulnerability": "VCID-u4hw-r55c-mqg9" }, { "vulnerability": "VCID-v547-6z4g-kba3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/chromium@90.0.4430.212-1" } ], "aliases": [ "CVE-2021-30514" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hudp-w9wy-4kb8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49419?format=api", "vulnerability_id": "VCID-mxkm-p9t4-cbdw", "summary": "Multiple vulnerabillities have been found in Chromium and Google\n Chrome, the worst of which could allow remote attackers to execute\n arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30510", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00901", "scoring_system": "epss", "scoring_elements": "0.75749", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00901", "scoring_system": "epss", "scoring_elements": "0.7571", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00901", "scoring_system": "epss", "scoring_elements": "0.75624", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00901", "scoring_system": "epss", "scoring_elements": "0.75626", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00901", "scoring_system": "epss", "scoring_elements": "0.75657", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00901", "scoring_system": "epss", "scoring_elements": "0.75637", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00901", "scoring_system": "epss", "scoring_elements": "0.75671", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00901", "scoring_system": "epss", "scoring_elements": "0.75682", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00901", "scoring_system": "epss", "scoring_elements": "0.75707", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00901", "scoring_system": "epss", "scoring_elements": "0.75688", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00901", "scoring_system": "epss", "scoring_elements": "0.7572", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00901", "scoring_system": "epss", "scoring_elements": "0.75723", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30510" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30506", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30506" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30507", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30507" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30508", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30508" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30509", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30509" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30510", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30510" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30511", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30511" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30512", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30512" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30513", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30513" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30514", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30514" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30515", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30515" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30516", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30516" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30517", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30517" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30518", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30518" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30519", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30519" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30520", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30520" }, { "reference_url": "https://security.archlinux.org/ASA-202105-7", "reference_id": "ASA-202105-7", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202105-7" }, { "reference_url": "https://security.archlinux.org/ASA-202105-8", "reference_id": "ASA-202105-8", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202105-8" }, { "reference_url": "https://security.archlinux.org/AVG-1936", "reference_id": "AVG-1936", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1936" }, { "reference_url": "https://security.archlinux.org/AVG-1937", "reference_id": "AVG-1937", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1937" }, { "reference_url": "https://security.gentoo.org/glsa/202107-06", "reference_id": "GLSA-202107-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-06" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/372046?format=api", "purl": "pkg:alpm/archlinux/chromium@90.0.4430.212-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7fef-qr2c-gbcp" }, { "vulnerability": "VCID-7spy-wcry-6fb8" }, { "vulnerability": "VCID-81s9-h9rs-bkfh" }, { "vulnerability": "VCID-8bhz-3581-bkca" }, { "vulnerability": "VCID-9u4b-zjdu-n3b3" }, { "vulnerability": "VCID-amkk-esp8-53af" }, { "vulnerability": "VCID-aswr-a7yz-tbb3" }, { "vulnerability": "VCID-cntb-k34n-dbaq" }, { "vulnerability": "VCID-e5qg-urfz-37b6" }, { "vulnerability": "VCID-ej7g-qqsm-y7ch" }, { "vulnerability": "VCID-fgt6-p8h5-wyf2" }, { "vulnerability": "VCID-gdf5-fgc4-zqdp" }, { "vulnerability": "VCID-jm7s-knrf-vqcj" }, { "vulnerability": "VCID-jzch-bp6c-mqgd" }, { "vulnerability": "VCID-k2cy-dr3z-83cy" }, { "vulnerability": "VCID-n1ux-5z1c-9ban" }, { "vulnerability": "VCID-qdw1-rhx2-e3fu" }, { "vulnerability": "VCID-rfg6-a1b3-2qa4" }, { "vulnerability": "VCID-rx6k-fvxg-ruh7" }, { "vulnerability": "VCID-s575-newv-r3h9" }, { "vulnerability": "VCID-u4hw-r55c-mqg9" }, { "vulnerability": "VCID-v547-6z4g-kba3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/chromium@90.0.4430.212-1" } ], "aliases": [ "CVE-2021-30510" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mxkm-p9t4-cbdw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49420?format=api", "vulnerability_id": "VCID-n7t8-tqr4-hqgm", "summary": "Multiple vulnerabillities have been found in Chromium and Google\n Chrome, the worst of which could allow remote attackers to execute\n arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30511", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.55175", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.55238", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.55092", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.55193", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.55217", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.55195", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.55244", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.55245", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.55256", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.55236", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.55255", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00322", "scoring_system": "epss", "scoring_elements": "0.55259", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30511" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30506", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30506" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30507", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30507" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30508", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30508" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30509", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30509" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30510", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30510" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30511", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30511" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30512", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30512" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30513", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30513" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30514", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30514" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30515", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30515" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30516", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30516" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30517", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30517" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30518", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30518" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30519", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30519" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30520", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30520" }, { "reference_url": "https://security.archlinux.org/ASA-202105-7", "reference_id": "ASA-202105-7", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202105-7" }, { "reference_url": "https://security.archlinux.org/ASA-202105-8", "reference_id": "ASA-202105-8", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202105-8" }, { "reference_url": "https://security.archlinux.org/AVG-1936", "reference_id": "AVG-1936", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1936" }, { "reference_url": "https://security.archlinux.org/AVG-1937", "reference_id": "AVG-1937", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1937" }, { "reference_url": "https://security.gentoo.org/glsa/202107-06", "reference_id": "GLSA-202107-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-06" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/372046?format=api", "purl": "pkg:alpm/archlinux/chromium@90.0.4430.212-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7fef-qr2c-gbcp" }, { "vulnerability": "VCID-7spy-wcry-6fb8" }, { "vulnerability": "VCID-81s9-h9rs-bkfh" }, { "vulnerability": "VCID-8bhz-3581-bkca" }, { "vulnerability": "VCID-9u4b-zjdu-n3b3" }, { "vulnerability": "VCID-amkk-esp8-53af" }, { "vulnerability": "VCID-aswr-a7yz-tbb3" }, { "vulnerability": "VCID-cntb-k34n-dbaq" }, { "vulnerability": "VCID-e5qg-urfz-37b6" }, { "vulnerability": "VCID-ej7g-qqsm-y7ch" }, { "vulnerability": "VCID-fgt6-p8h5-wyf2" }, { "vulnerability": "VCID-gdf5-fgc4-zqdp" }, { "vulnerability": "VCID-jm7s-knrf-vqcj" }, { "vulnerability": "VCID-jzch-bp6c-mqgd" }, { "vulnerability": "VCID-k2cy-dr3z-83cy" }, { "vulnerability": "VCID-n1ux-5z1c-9ban" }, { "vulnerability": "VCID-qdw1-rhx2-e3fu" }, { "vulnerability": "VCID-rfg6-a1b3-2qa4" }, { "vulnerability": "VCID-rx6k-fvxg-ruh7" }, { "vulnerability": "VCID-s575-newv-r3h9" }, { "vulnerability": "VCID-u4hw-r55c-mqg9" }, { "vulnerability": "VCID-v547-6z4g-kba3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/chromium@90.0.4430.212-1" } ], "aliases": [ "CVE-2021-30511" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n7t8-tqr4-hqgm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49415?format=api", "vulnerability_id": "VCID-qx5p-gc8v-h3cp", "summary": "Multiple vulnerabillities have been found in Chromium and Google\n Chrome, the worst of which could allow remote attackers to execute\n arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30506", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00306", "scoring_system": "epss", "scoring_elements": "0.53819", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00306", "scoring_system": "epss", "scoring_elements": "0.53852", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00306", "scoring_system": "epss", "scoring_elements": "0.53744", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00306", "scoring_system": "epss", "scoring_elements": "0.53764", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00306", "scoring_system": "epss", "scoring_elements": "0.53791", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00306", "scoring_system": "epss", "scoring_elements": "0.53765", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00306", "scoring_system": "epss", "scoring_elements": "0.53817", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00306", "scoring_system": "epss", "scoring_elements": "0.53815", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00306", "scoring_system": "epss", "scoring_elements": "0.53863", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00306", "scoring_system": "epss", "scoring_elements": "0.53846", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00306", "scoring_system": "epss", "scoring_elements": "0.5383", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00306", "scoring_system": "epss", "scoring_elements": "0.53867", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00306", "scoring_system": "epss", "scoring_elements": "0.53871", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30506" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30506", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30506" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30507", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30507" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30508", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30508" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30509", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30509" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30510", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30510" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30511", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30511" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30512", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30512" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30513", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30513" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30514", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30514" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30515", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30515" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30516", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30516" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30517", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30517" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30518", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30518" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30519", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30519" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30520", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30520" }, { "reference_url": "https://security.archlinux.org/ASA-202105-7", "reference_id": "ASA-202105-7", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202105-7" }, { "reference_url": "https://security.archlinux.org/ASA-202105-8", "reference_id": "ASA-202105-8", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202105-8" }, { "reference_url": "https://security.archlinux.org/AVG-1936", "reference_id": "AVG-1936", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1936" }, { "reference_url": "https://security.archlinux.org/AVG-1937", "reference_id": "AVG-1937", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1937" }, { "reference_url": "https://security.gentoo.org/glsa/202107-06", "reference_id": "GLSA-202107-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-06" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/372046?format=api", "purl": "pkg:alpm/archlinux/chromium@90.0.4430.212-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7fef-qr2c-gbcp" }, { "vulnerability": "VCID-7spy-wcry-6fb8" }, { "vulnerability": "VCID-81s9-h9rs-bkfh" }, { "vulnerability": "VCID-8bhz-3581-bkca" }, { "vulnerability": "VCID-9u4b-zjdu-n3b3" }, { "vulnerability": "VCID-amkk-esp8-53af" }, { "vulnerability": "VCID-aswr-a7yz-tbb3" }, { "vulnerability": "VCID-cntb-k34n-dbaq" }, { "vulnerability": "VCID-e5qg-urfz-37b6" }, { "vulnerability": "VCID-ej7g-qqsm-y7ch" }, { "vulnerability": "VCID-fgt6-p8h5-wyf2" }, { "vulnerability": "VCID-gdf5-fgc4-zqdp" }, { "vulnerability": "VCID-jm7s-knrf-vqcj" }, { "vulnerability": "VCID-jzch-bp6c-mqgd" }, { "vulnerability": "VCID-k2cy-dr3z-83cy" }, { "vulnerability": "VCID-n1ux-5z1c-9ban" }, { "vulnerability": "VCID-qdw1-rhx2-e3fu" }, { "vulnerability": "VCID-rfg6-a1b3-2qa4" }, { "vulnerability": "VCID-rx6k-fvxg-ruh7" }, { "vulnerability": "VCID-s575-newv-r3h9" }, { "vulnerability": "VCID-u4hw-r55c-mqg9" }, { "vulnerability": "VCID-v547-6z4g-kba3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/chromium@90.0.4430.212-1" } ], "aliases": [ "CVE-2021-30506" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qx5p-gc8v-h3cp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49418?format=api", "vulnerability_id": "VCID-vzwy-bfud-1yeg", "summary": "Multiple vulnerabillities have been found in Chromium and Google\n Chrome, the worst of which could allow remote attackers to execute\n arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30509", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00273", "scoring_system": "epss", "scoring_elements": "0.50728", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00273", "scoring_system": "epss", "scoring_elements": "0.50779", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00273", "scoring_system": "epss", "scoring_elements": "0.50663", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00273", "scoring_system": "epss", "scoring_elements": "0.50717", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00273", "scoring_system": "epss", "scoring_elements": "0.50742", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00273", "scoring_system": "epss", "scoring_elements": "0.50698", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00273", "scoring_system": "epss", "scoring_elements": "0.50754", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00273", "scoring_system": "epss", "scoring_elements": "0.5075", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00273", "scoring_system": "epss", "scoring_elements": "0.50794", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00273", "scoring_system": "epss", "scoring_elements": "0.5077", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00273", "scoring_system": "epss", "scoring_elements": "0.508", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30509" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30506", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30506" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30507", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30507" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30508", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30508" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30509", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30509" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30510", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30510" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30511", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30511" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30512", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30512" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30513", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30513" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30514", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30514" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30515", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30515" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30516", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30516" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30517", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30517" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30518", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30518" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30519", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30519" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30520", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30520" }, { "reference_url": "https://security.archlinux.org/ASA-202105-7", "reference_id": "ASA-202105-7", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202105-7" }, { "reference_url": "https://security.archlinux.org/ASA-202105-8", "reference_id": "ASA-202105-8", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202105-8" }, { "reference_url": "https://security.archlinux.org/AVG-1936", "reference_id": "AVG-1936", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1936" }, { "reference_url": "https://security.archlinux.org/AVG-1937", "reference_id": "AVG-1937", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1937" }, { "reference_url": "https://security.gentoo.org/glsa/202107-06", "reference_id": "GLSA-202107-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-06" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/372046?format=api", "purl": "pkg:alpm/archlinux/chromium@90.0.4430.212-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7fef-qr2c-gbcp" }, { "vulnerability": "VCID-7spy-wcry-6fb8" }, { "vulnerability": "VCID-81s9-h9rs-bkfh" }, { "vulnerability": "VCID-8bhz-3581-bkca" }, { "vulnerability": "VCID-9u4b-zjdu-n3b3" }, { "vulnerability": "VCID-amkk-esp8-53af" }, { "vulnerability": "VCID-aswr-a7yz-tbb3" }, { "vulnerability": "VCID-cntb-k34n-dbaq" }, { "vulnerability": "VCID-e5qg-urfz-37b6" }, { "vulnerability": "VCID-ej7g-qqsm-y7ch" }, { "vulnerability": "VCID-fgt6-p8h5-wyf2" }, { "vulnerability": "VCID-gdf5-fgc4-zqdp" }, { "vulnerability": "VCID-jm7s-knrf-vqcj" }, { "vulnerability": "VCID-jzch-bp6c-mqgd" }, { "vulnerability": "VCID-k2cy-dr3z-83cy" }, { "vulnerability": "VCID-n1ux-5z1c-9ban" }, { "vulnerability": "VCID-qdw1-rhx2-e3fu" }, { "vulnerability": "VCID-rfg6-a1b3-2qa4" }, { "vulnerability": "VCID-rx6k-fvxg-ruh7" }, { "vulnerability": "VCID-s575-newv-r3h9" }, { "vulnerability": "VCID-u4hw-r55c-mqg9" }, { "vulnerability": "VCID-v547-6z4g-kba3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/chromium@90.0.4430.212-1" } ], "aliases": [ "CVE-2021-30509" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vzwy-bfud-1yeg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49416?format=api", "vulnerability_id": "VCID-yp49-cubg-pkdj", "summary": "Multiple vulnerabillities have been found in Chromium and Google\n Chrome, the worst of which could allow remote attackers to execute\n arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30507", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00392", "scoring_system": "epss", "scoring_elements": "0.60196", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00392", "scoring_system": "epss", "scoring_elements": "0.60225", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00392", "scoring_system": "epss", "scoring_elements": "0.60064", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00392", "scoring_system": "epss", "scoring_elements": "0.60142", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00392", "scoring_system": "epss", "scoring_elements": "0.60167", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00392", "scoring_system": "epss", "scoring_elements": "0.60137", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00392", "scoring_system": "epss", "scoring_elements": "0.60187", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00392", "scoring_system": "epss", "scoring_elements": "0.602", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00392", "scoring_system": "epss", "scoring_elements": "0.60222", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00392", "scoring_system": "epss", "scoring_elements": "0.60208", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00392", "scoring_system": "epss", "scoring_elements": "0.60191", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00392", "scoring_system": "epss", "scoring_elements": "0.6023", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00392", "scoring_system": "epss", "scoring_elements": "0.60238", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-30507" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30506", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30506" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30507", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30507" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30508", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30508" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30509", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30509" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30510", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30510" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30511", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30511" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30512", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30512" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30513", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30513" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30514", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30514" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30515", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30515" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30516", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30516" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30517", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30517" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30518", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30518" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30519", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30519" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30520", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30520" }, { "reference_url": "https://security.archlinux.org/ASA-202105-7", "reference_id": "ASA-202105-7", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202105-7" }, { "reference_url": "https://security.archlinux.org/ASA-202105-8", "reference_id": "ASA-202105-8", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202105-8" }, { "reference_url": "https://security.archlinux.org/AVG-1936", "reference_id": "AVG-1936", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1936" }, { "reference_url": "https://security.archlinux.org/AVG-1937", "reference_id": "AVG-1937", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1937" }, { "reference_url": "https://security.gentoo.org/glsa/202107-06", "reference_id": "GLSA-202107-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-06" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/372046?format=api", "purl": "pkg:alpm/archlinux/chromium@90.0.4430.212-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7fef-qr2c-gbcp" }, { "vulnerability": "VCID-7spy-wcry-6fb8" }, { "vulnerability": "VCID-81s9-h9rs-bkfh" }, { "vulnerability": "VCID-8bhz-3581-bkca" }, { "vulnerability": "VCID-9u4b-zjdu-n3b3" }, { "vulnerability": "VCID-amkk-esp8-53af" }, { "vulnerability": "VCID-aswr-a7yz-tbb3" }, { "vulnerability": "VCID-cntb-k34n-dbaq" }, { "vulnerability": "VCID-e5qg-urfz-37b6" }, { "vulnerability": "VCID-ej7g-qqsm-y7ch" }, { "vulnerability": "VCID-fgt6-p8h5-wyf2" }, { "vulnerability": "VCID-gdf5-fgc4-zqdp" }, { "vulnerability": "VCID-jm7s-knrf-vqcj" }, { "vulnerability": "VCID-jzch-bp6c-mqgd" }, { "vulnerability": "VCID-k2cy-dr3z-83cy" }, { "vulnerability": "VCID-n1ux-5z1c-9ban" }, { "vulnerability": "VCID-qdw1-rhx2-e3fu" }, { "vulnerability": "VCID-rfg6-a1b3-2qa4" }, { "vulnerability": "VCID-rx6k-fvxg-ruh7" }, { "vulnerability": "VCID-s575-newv-r3h9" }, { "vulnerability": "VCID-u4hw-r55c-mqg9" }, { "vulnerability": "VCID-v547-6z4g-kba3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/chromium@90.0.4430.212-1" } ], "aliases": [ "CVE-2021-30507" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yp49-cubg-pkdj" } ], "risk_score": "10.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/chromium@90.0.4430.212-1" }