Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/webkit2gtk@2.34.4-r0?arch=s390x&distroversion=v3.20&reponame=community
Typeapk
Namespacealpine
Namewebkit2gtk
Version2.34.4-r0
Qualifiers
arch s390x
distroversion v3.20
reponame community
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2.34.6-r0
Latest_non_vulnerable_version2.36.5-r0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1fqx-3rnb-13bh
vulnerability_id VCID-1fqx-3rnb-13bh
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30953.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30953.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30953
reference_id
reference_type
scores
0
value 0.00482
scoring_system epss
scoring_elements 0.6508
published_at 2026-04-01T12:55:00Z
1
value 0.00482
scoring_system epss
scoring_elements 0.6513
published_at 2026-04-02T12:55:00Z
2
value 0.00482
scoring_system epss
scoring_elements 0.65157
published_at 2026-04-04T12:55:00Z
3
value 0.00482
scoring_system epss
scoring_elements 0.65123
published_at 2026-04-07T12:55:00Z
4
value 0.00482
scoring_system epss
scoring_elements 0.65172
published_at 2026-04-08T12:55:00Z
5
value 0.00482
scoring_system epss
scoring_elements 0.65186
published_at 2026-04-09T12:55:00Z
6
value 0.00482
scoring_system epss
scoring_elements 0.65204
published_at 2026-04-11T12:55:00Z
7
value 0.00482
scoring_system epss
scoring_elements 0.65191
published_at 2026-04-12T12:55:00Z
8
value 0.00482
scoring_system epss
scoring_elements 0.65163
published_at 2026-04-13T12:55:00Z
9
value 0.00482
scoring_system epss
scoring_elements 0.65198
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30953
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2044542
reference_id 2044542
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2044542
13
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
14
reference_url https://access.redhat.com/errata/RHSA-2022:1777
reference_id RHSA-2022:1777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1777
15
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
16
reference_url https://usn.ubuntu.com/5255-1/
reference_id USN-5255-1
reference_type
scores
url https://usn.ubuntu.com/5255-1/
fixed_packages
0
url pkg:apk/alpine/webkit2gtk@2.34.4-r0?arch=s390x&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/webkit2gtk@2.34.4-r0?arch=s390x&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/webkit2gtk@2.34.4-r0%3Farch=s390x&distroversion=v3.20&reponame=community
aliases CVE-2021-30953
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1fqx-3rnb-13bh
1
url VCID-4vn7-zfkq-a7dm
vulnerability_id VCID-4vn7-zfkq-a7dm
summary webkitgtk: A malicious website may exfiltrate data cross-origin
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22594.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22594.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-22594
reference_id
reference_type
scores
0
value 0.00216
scoring_system epss
scoring_elements 0.44162
published_at 2026-04-02T12:55:00Z
1
value 0.00216
scoring_system epss
scoring_elements 0.44185
published_at 2026-04-04T12:55:00Z
2
value 0.00216
scoring_system epss
scoring_elements 0.44117
published_at 2026-04-07T12:55:00Z
3
value 0.00216
scoring_system epss
scoring_elements 0.44168
published_at 2026-04-08T12:55:00Z
4
value 0.00216
scoring_system epss
scoring_elements 0.44171
published_at 2026-04-09T12:55:00Z
5
value 0.00216
scoring_system epss
scoring_elements 0.44187
published_at 2026-04-11T12:55:00Z
6
value 0.00216
scoring_system epss
scoring_elements 0.44154
published_at 2026-04-13T12:55:00Z
7
value 0.00216
scoring_system epss
scoring_elements 0.44215
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-22594
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2045291
reference_id 2045291
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2045291
13
reference_url https://access.redhat.com/errata/RHSA-2022:1777
reference_id RHSA-2022:1777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1777
14
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
0
url pkg:apk/alpine/webkit2gtk@2.34.4-r0?arch=s390x&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/webkit2gtk@2.34.4-r0?arch=s390x&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/webkit2gtk@2.34.4-r0%3Farch=s390x&distroversion=v3.20&reponame=community
aliases CVE-2022-22594
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4vn7-zfkq-a7dm
2
url VCID-5828-4rwa-tkcg
vulnerability_id VCID-5828-4rwa-tkcg
summary webkitgtk: logic issue was addressed with improved state management
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22637.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22637.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-22637
reference_id
reference_type
scores
0
value 0.00239
scoring_system epss
scoring_elements 0.47017
published_at 2026-04-16T12:55:00Z
1
value 0.00239
scoring_system epss
scoring_elements 0.46941
published_at 2026-04-02T12:55:00Z
2
value 0.00239
scoring_system epss
scoring_elements 0.46958
published_at 2026-04-04T12:55:00Z
3
value 0.00239
scoring_system epss
scoring_elements 0.46905
published_at 2026-04-07T12:55:00Z
4
value 0.00239
scoring_system epss
scoring_elements 0.4696
published_at 2026-04-08T12:55:00Z
5
value 0.00239
scoring_system epss
scoring_elements 0.46957
published_at 2026-04-09T12:55:00Z
6
value 0.00239
scoring_system epss
scoring_elements 0.46981
published_at 2026-04-11T12:55:00Z
7
value 0.00239
scoring_system epss
scoring_elements 0.46955
published_at 2026-04-12T12:55:00Z
8
value 0.00239
scoring_system epss
scoring_elements 0.46962
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-22637
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2073903
reference_id 2073903
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2073903
13
reference_url https://security.archlinux.org/AVG-2703
reference_id AVG-2703
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2703
14
reference_url https://support.apple.com/en-us/HT213182
reference_id HT213182
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-22T15:51:39Z/
url https://support.apple.com/en-us/HT213182
15
reference_url https://support.apple.com/en-us/HT213186
reference_id HT213186
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-22T15:51:39Z/
url https://support.apple.com/en-us/HT213186
16
reference_url https://support.apple.com/en-us/HT213187
reference_id HT213187
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-22T15:51:39Z/
url https://support.apple.com/en-us/HT213187
17
reference_url https://support.apple.com/en-us/HT213193
reference_id HT213193
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-22T15:51:39Z/
url https://support.apple.com/en-us/HT213193
18
reference_url https://access.redhat.com/errata/RHSA-2022:1777
reference_id RHSA-2022:1777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1777
19
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
20
reference_url https://usn.ubuntu.com/5394-1/
reference_id USN-5394-1
reference_type
scores
url https://usn.ubuntu.com/5394-1/
fixed_packages
0
url pkg:apk/alpine/webkit2gtk@2.34.4-r0?arch=s390x&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/webkit2gtk@2.34.4-r0?arch=s390x&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/webkit2gtk@2.34.4-r0%3Farch=s390x&distroversion=v3.20&reponame=community
aliases CVE-2022-22637
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5828-4rwa-tkcg
3
url VCID-b3jh-p9hd-ebb7
vulnerability_id VCID-b3jh-p9hd-ebb7
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30934.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30934.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30934
reference_id
reference_type
scores
0
value 0.0169
scoring_system epss
scoring_elements 0.82155
published_at 2026-04-01T12:55:00Z
1
value 0.0169
scoring_system epss
scoring_elements 0.82168
published_at 2026-04-02T12:55:00Z
2
value 0.0169
scoring_system epss
scoring_elements 0.82189
published_at 2026-04-04T12:55:00Z
3
value 0.0169
scoring_system epss
scoring_elements 0.82185
published_at 2026-04-07T12:55:00Z
4
value 0.0169
scoring_system epss
scoring_elements 0.82212
published_at 2026-04-08T12:55:00Z
5
value 0.0169
scoring_system epss
scoring_elements 0.82219
published_at 2026-04-09T12:55:00Z
6
value 0.0169
scoring_system epss
scoring_elements 0.82238
published_at 2026-04-11T12:55:00Z
7
value 0.0169
scoring_system epss
scoring_elements 0.82231
published_at 2026-04-12T12:55:00Z
8
value 0.0169
scoring_system epss
scoring_elements 0.82225
published_at 2026-04-13T12:55:00Z
9
value 0.0169
scoring_system epss
scoring_elements 0.82261
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30934
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2044521
reference_id 2044521
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2044521
13
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
14
reference_url https://access.redhat.com/errata/RHSA-2022:1777
reference_id RHSA-2022:1777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1777
15
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
16
reference_url https://usn.ubuntu.com/5255-1/
reference_id USN-5255-1
reference_type
scores
url https://usn.ubuntu.com/5255-1/
fixed_packages
0
url pkg:apk/alpine/webkit2gtk@2.34.4-r0?arch=s390x&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/webkit2gtk@2.34.4-r0?arch=s390x&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/webkit2gtk@2.34.4-r0%3Farch=s390x&distroversion=v3.20&reponame=community
aliases CVE-2021-30934
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b3jh-p9hd-ebb7
4
url VCID-dz61-8f33-t7ej
vulnerability_id VCID-dz61-8f33-t7ej
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30984.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30984.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30984
reference_id
reference_type
scores
0
value 0.00688
scoring_system epss
scoring_elements 0.71687
published_at 2026-04-01T12:55:00Z
1
value 0.00688
scoring_system epss
scoring_elements 0.71693
published_at 2026-04-02T12:55:00Z
2
value 0.00688
scoring_system epss
scoring_elements 0.71711
published_at 2026-04-04T12:55:00Z
3
value 0.00688
scoring_system epss
scoring_elements 0.71685
published_at 2026-04-07T12:55:00Z
4
value 0.00688
scoring_system epss
scoring_elements 0.71724
published_at 2026-04-08T12:55:00Z
5
value 0.00688
scoring_system epss
scoring_elements 0.71735
published_at 2026-04-09T12:55:00Z
6
value 0.00688
scoring_system epss
scoring_elements 0.71759
published_at 2026-04-11T12:55:00Z
7
value 0.00688
scoring_system epss
scoring_elements 0.71743
published_at 2026-04-12T12:55:00Z
8
value 0.00688
scoring_system epss
scoring_elements 0.71725
published_at 2026-04-13T12:55:00Z
9
value 0.00688
scoring_system epss
scoring_elements 0.71769
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30984
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2044553
reference_id 2044553
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2044553
13
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
14
reference_url https://access.redhat.com/errata/RHSA-2022:1777
reference_id RHSA-2022:1777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1777
15
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
16
reference_url https://usn.ubuntu.com/5255-1/
reference_id USN-5255-1
reference_type
scores
url https://usn.ubuntu.com/5255-1/
fixed_packages
0
url pkg:apk/alpine/webkit2gtk@2.34.4-r0?arch=s390x&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/webkit2gtk@2.34.4-r0?arch=s390x&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/webkit2gtk@2.34.4-r0%3Farch=s390x&distroversion=v3.20&reponame=community
aliases CVE-2021-30984
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dz61-8f33-t7ej
5
url VCID-jrd5-1g2p-gyg7
vulnerability_id VCID-jrd5-1g2p-gyg7
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30936.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30936.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30936
reference_id
reference_type
scores
0
value 0.00887
scoring_system epss
scoring_elements 0.75403
published_at 2026-04-01T12:55:00Z
1
value 0.00887
scoring_system epss
scoring_elements 0.75407
published_at 2026-04-02T12:55:00Z
2
value 0.00887
scoring_system epss
scoring_elements 0.75438
published_at 2026-04-04T12:55:00Z
3
value 0.00887
scoring_system epss
scoring_elements 0.75419
published_at 2026-04-07T12:55:00Z
4
value 0.00887
scoring_system epss
scoring_elements 0.75462
published_at 2026-04-08T12:55:00Z
5
value 0.00887
scoring_system epss
scoring_elements 0.75471
published_at 2026-04-09T12:55:00Z
6
value 0.00887
scoring_system epss
scoring_elements 0.75491
published_at 2026-04-11T12:55:00Z
7
value 0.00887
scoring_system epss
scoring_elements 0.75469
published_at 2026-04-12T12:55:00Z
8
value 0.00887
scoring_system epss
scoring_elements 0.75459
published_at 2026-04-13T12:55:00Z
9
value 0.00887
scoring_system epss
scoring_elements 0.75501
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30936
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2044528
reference_id 2044528
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2044528
13
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
14
reference_url https://access.redhat.com/errata/RHSA-2022:1777
reference_id RHSA-2022:1777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1777
15
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
16
reference_url https://usn.ubuntu.com/5255-1/
reference_id USN-5255-1
reference_type
scores
url https://usn.ubuntu.com/5255-1/
fixed_packages
0
url pkg:apk/alpine/webkit2gtk@2.34.4-r0?arch=s390x&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/webkit2gtk@2.34.4-r0?arch=s390x&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/webkit2gtk@2.34.4-r0%3Farch=s390x&distroversion=v3.20&reponame=community
aliases CVE-2021-30936
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jrd5-1g2p-gyg7
6
url VCID-qf9z-ascr-cuf6
vulnerability_id VCID-qf9z-ascr-cuf6
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30954.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30954.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30954
reference_id
reference_type
scores
0
value 0.00321
scoring_system epss
scoring_elements 0.55039
published_at 2026-04-01T12:55:00Z
1
value 0.00321
scoring_system epss
scoring_elements 0.5514
published_at 2026-04-02T12:55:00Z
2
value 0.00321
scoring_system epss
scoring_elements 0.55164
published_at 2026-04-04T12:55:00Z
3
value 0.00321
scoring_system epss
scoring_elements 0.55139
published_at 2026-04-07T12:55:00Z
4
value 0.00321
scoring_system epss
scoring_elements 0.55188
published_at 2026-04-09T12:55:00Z
5
value 0.00321
scoring_system epss
scoring_elements 0.55199
published_at 2026-04-11T12:55:00Z
6
value 0.00321
scoring_system epss
scoring_elements 0.5518
published_at 2026-04-12T12:55:00Z
7
value 0.00321
scoring_system epss
scoring_elements 0.55162
published_at 2026-04-13T12:55:00Z
8
value 0.00321
scoring_system epss
scoring_elements 0.55201
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30954
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2044551
reference_id 2044551
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2044551
13
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
14
reference_url https://access.redhat.com/errata/RHSA-2022:1777
reference_id RHSA-2022:1777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1777
15
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
16
reference_url https://usn.ubuntu.com/5255-1/
reference_id USN-5255-1
reference_type
scores
url https://usn.ubuntu.com/5255-1/
fixed_packages
0
url pkg:apk/alpine/webkit2gtk@2.34.4-r0?arch=s390x&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/webkit2gtk@2.34.4-r0?arch=s390x&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/webkit2gtk@2.34.4-r0%3Farch=s390x&distroversion=v3.20&reponame=community
aliases CVE-2021-30954
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qf9z-ascr-cuf6
7
url VCID-sxja-mn3n-hkgt
vulnerability_id VCID-sxja-mn3n-hkgt
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30951.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30951.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30951
reference_id
reference_type
scores
0
value 0.00887
scoring_system epss
scoring_elements 0.75403
published_at 2026-04-01T12:55:00Z
1
value 0.00887
scoring_system epss
scoring_elements 0.75407
published_at 2026-04-02T12:55:00Z
2
value 0.00887
scoring_system epss
scoring_elements 0.75438
published_at 2026-04-04T12:55:00Z
3
value 0.00887
scoring_system epss
scoring_elements 0.75419
published_at 2026-04-07T12:55:00Z
4
value 0.00887
scoring_system epss
scoring_elements 0.75462
published_at 2026-04-08T12:55:00Z
5
value 0.00887
scoring_system epss
scoring_elements 0.75471
published_at 2026-04-09T12:55:00Z
6
value 0.00887
scoring_system epss
scoring_elements 0.75491
published_at 2026-04-11T12:55:00Z
7
value 0.00887
scoring_system epss
scoring_elements 0.75469
published_at 2026-04-12T12:55:00Z
8
value 0.00887
scoring_system epss
scoring_elements 0.75459
published_at 2026-04-13T12:55:00Z
9
value 0.00887
scoring_system epss
scoring_elements 0.75501
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30951
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2044534
reference_id 2044534
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2044534
13
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
14
reference_url https://access.redhat.com/errata/RHSA-2022:1777
reference_id RHSA-2022:1777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1777
15
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
16
reference_url https://usn.ubuntu.com/5255-1/
reference_id USN-5255-1
reference_type
scores
url https://usn.ubuntu.com/5255-1/
fixed_packages
0
url pkg:apk/alpine/webkit2gtk@2.34.4-r0?arch=s390x&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/webkit2gtk@2.34.4-r0?arch=s390x&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/webkit2gtk@2.34.4-r0%3Farch=s390x&distroversion=v3.20&reponame=community
aliases CVE-2021-30951
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sxja-mn3n-hkgt
8
url VCID-xq1c-h5v5-77bs
vulnerability_id VCID-xq1c-h5v5-77bs
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30952.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30952.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30952
reference_id
reference_type
scores
0
value 0.01244
scoring_system epss
scoring_elements 0.79278
published_at 2026-04-13T12:55:00Z
1
value 0.01244
scoring_system epss
scoring_elements 0.79305
published_at 2026-04-16T12:55:00Z
2
value 0.01244
scoring_system epss
scoring_elements 0.79289
published_at 2026-04-12T12:55:00Z
3
value 0.01279
scoring_system epss
scoring_elements 0.79547
published_at 2026-04-04T12:55:00Z
4
value 0.01279
scoring_system epss
scoring_elements 0.79525
published_at 2026-04-02T12:55:00Z
5
value 0.01279
scoring_system epss
scoring_elements 0.79563
published_at 2026-04-08T12:55:00Z
6
value 0.01279
scoring_system epss
scoring_elements 0.79535
published_at 2026-04-07T12:55:00Z
7
value 0.01279
scoring_system epss
scoring_elements 0.79519
published_at 2026-04-01T12:55:00Z
8
value 0.01279
scoring_system epss
scoring_elements 0.7957
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30952
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url http://www.openwall.com/lists/oss-security/2022/01/21/2
reference_id 2
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-05T19:17:22Z/
url http://www.openwall.com/lists/oss-security/2022/01/21/2
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2044538
reference_id 2044538
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2044538
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7EQVZ3CEMTINLBZ7PBC7WRXVEVCRHNSM/
reference_id 7EQVZ3CEMTINLBZ7PBC7WRXVEVCRHNSM
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-05T19:17:22Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7EQVZ3CEMTINLBZ7PBC7WRXVEVCRHNSM/
15
reference_url https://www.debian.org/security/2022/dsa-5060
reference_id dsa-5060
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-05T19:17:22Z/
url https://www.debian.org/security/2022/dsa-5060
16
reference_url https://www.debian.org/security/2022/dsa-5061
reference_id dsa-5061
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-05T19:17:22Z/
url https://www.debian.org/security/2022/dsa-5061
17
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
18
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HQKWD4BXRDD2YGR5AVU7H5J5PIQIEU6V/
reference_id HQKWD4BXRDD2YGR5AVU7H5J5PIQIEU6V
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-05T19:17:22Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HQKWD4BXRDD2YGR5AVU7H5J5PIQIEU6V/
19
reference_url https://support.apple.com/en-us/HT212975
reference_id HT212975
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-05T19:17:22Z/
url https://support.apple.com/en-us/HT212975
20
reference_url https://support.apple.com/en-us/HT212976
reference_id HT212976
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-05T19:17:22Z/
url https://support.apple.com/en-us/HT212976
21
reference_url https://support.apple.com/en-us/HT212978
reference_id HT212978
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-05T19:17:22Z/
url https://support.apple.com/en-us/HT212978
22
reference_url https://support.apple.com/en-us/HT212980
reference_id HT212980
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-05T19:17:22Z/
url https://support.apple.com/en-us/HT212980
23
reference_url https://support.apple.com/en-us/HT212982
reference_id HT212982
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-05T19:17:22Z/
url https://support.apple.com/en-us/HT212982
24
reference_url https://access.redhat.com/errata/RHSA-2022:1777
reference_id RHSA-2022:1777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1777
25
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
26
reference_url https://usn.ubuntu.com/5255-1/
reference_id USN-5255-1
reference_type
scores
url https://usn.ubuntu.com/5255-1/
fixed_packages
0
url pkg:apk/alpine/webkit2gtk@2.34.4-r0?arch=s390x&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/webkit2gtk@2.34.4-r0?arch=s390x&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/webkit2gtk@2.34.4-r0%3Farch=s390x&distroversion=v3.20&reponame=community
aliases CVE-2021-30952
risk_score 10.0
exploitability 2.0
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xq1c-h5v5-77bs
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/webkit2gtk@2.34.4-r0%3Farch=s390x&distroversion=v3.20&reponame=community