Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/448198?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/448198?format=api", "purl": "pkg:apk/alpine/firefox@88.0-r0?arch=s390x&distroversion=v3.13&reponame=community", "type": "apk", "namespace": "alpine", "name": "firefox", "version": "88.0-r0", "qualifiers": { "arch": "s390x", "distroversion": "v3.13", "reponame": "community" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "88.0.1-r0", "latest_non_vulnerable_version": "89.0-r0", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50232?format=api", "vulnerability_id": "VCID-1e61-jk2b-aubw", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the\n worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23994.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23994.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-23994", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00348", "scoring_system": "epss", "scoring_elements": "0.57347", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00348", "scoring_system": "epss", "scoring_elements": "0.57368", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00348", "scoring_system": "epss", "scoring_elements": "0.57238", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00348", "scoring_system": "epss", "scoring_elements": "0.57388", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00348", "scoring_system": "epss", "scoring_elements": "0.57373", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00348", "scoring_system": "epss", "scoring_elements": "0.57371", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00348", "scoring_system": "epss", "scoring_elements": "0.57344", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00348", "scoring_system": "epss", "scoring_elements": "0.5732", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-23994" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23961", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23961" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23991", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23991" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23992", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23992" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23993", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23993" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23994", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23994" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23995", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23995" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23998", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23998" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23999", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23999" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24002" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29945", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29945" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29946", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29946" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29948", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29948" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29949", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29949" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951364", "reference_id": "1951364", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951364" }, { "reference_url": "https://security.archlinux.org/ASA-202104-3", "reference_id": "ASA-202104-3", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202104-3" }, { "reference_url": "https://security.archlinux.org/ASA-202104-4", "reference_id": "ASA-202104-4", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202104-4" }, { "reference_url": "https://security.archlinux.org/AVG-1834", "reference_id": "AVG-1834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1834" }, { "reference_url": "https://security.archlinux.org/AVG-1836", "reference_id": "AVG-1836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1836" }, { "reference_url": "https://security.gentoo.org/glsa/202104-09", "reference_id": "GLSA-202104-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202104-09" }, { "reference_url": "https://security.gentoo.org/glsa/202104-10", "reference_id": "GLSA-202104-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202104-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-14", "reference_id": "mfsa2021-14", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-14" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-15", "reference_id": "mfsa2021-15", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-15" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-16", "reference_id": "mfsa2021-16", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-16" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1350", "reference_id": "RHSA-2021:1350", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1350" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1351", "reference_id": "RHSA-2021:1351", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1351" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1352", "reference_id": "RHSA-2021:1352", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1352" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1353", "reference_id": "RHSA-2021:1353", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1353" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1360", "reference_id": "RHSA-2021:1360", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1360" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1361", "reference_id": "RHSA-2021:1361", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1361" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1362", "reference_id": "RHSA-2021:1362", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1362" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1363", "reference_id": "RHSA-2021:1363", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1363" }, { "reference_url": "https://usn.ubuntu.com/4926-1/", "reference_id": "USN-4926-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4926-1/" }, { "reference_url": "https://usn.ubuntu.com/4995-1/", "reference_id": "USN-4995-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4995-1/" }, { "reference_url": "https://usn.ubuntu.com/4995-2/", "reference_id": "USN-4995-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4995-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/448198?format=api", "purl": "pkg:apk/alpine/firefox@88.0-r0?arch=s390x&distroversion=v3.13&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@88.0-r0%3Farch=s390x&distroversion=v3.13&reponame=community" } ], "aliases": [ "CVE-2021-23994" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1e61-jk2b-aubw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50238?format=api", "vulnerability_id": "VCID-2cd3-m37k-5ydh", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the\n worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29946.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29946.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-29946", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37272", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37279", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37293", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37304", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.3727", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37243", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37289", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37207", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37374", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.374", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37228", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-29946" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23961", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23961" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23991", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23991" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23992", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23992" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23993", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23993" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23994", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23994" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23995", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23995" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23998", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23998" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23999", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23999" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24002" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29945", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29945" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29946", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29946" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29948", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29948" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29949", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29949" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951371", "reference_id": "1951371", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951371" }, { "reference_url": "https://security.archlinux.org/ASA-202104-3", "reference_id": "ASA-202104-3", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202104-3" }, { "reference_url": "https://security.archlinux.org/ASA-202104-4", "reference_id": "ASA-202104-4", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202104-4" }, { "reference_url": "https://security.archlinux.org/AVG-1834", "reference_id": "AVG-1834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1834" }, { "reference_url": "https://security.archlinux.org/AVG-1836", "reference_id": "AVG-1836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1836" }, { "reference_url": "https://security.gentoo.org/glsa/202104-09", "reference_id": "GLSA-202104-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202104-09" }, { "reference_url": "https://security.gentoo.org/glsa/202104-10", "reference_id": "GLSA-202104-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202104-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-14", "reference_id": "mfsa2021-14", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-14" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-15", "reference_id": "mfsa2021-15", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-15" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-16", "reference_id": "mfsa2021-16", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-16" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1350", "reference_id": "RHSA-2021:1350", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1350" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1351", "reference_id": "RHSA-2021:1351", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1351" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1352", "reference_id": "RHSA-2021:1352", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1352" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1353", "reference_id": "RHSA-2021:1353", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1353" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1360", "reference_id": "RHSA-2021:1360", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1360" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1361", "reference_id": "RHSA-2021:1361", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1361" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1362", "reference_id": "RHSA-2021:1362", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1362" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1363", "reference_id": "RHSA-2021:1363", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1363" }, { "reference_url": "https://usn.ubuntu.com/4926-1/", "reference_id": "USN-4926-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4926-1/" }, { "reference_url": "https://usn.ubuntu.com/4995-1/", "reference_id": "USN-4995-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4995-1/" }, { "reference_url": "https://usn.ubuntu.com/4995-2/", "reference_id": "USN-4995-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4995-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/448198?format=api", "purl": "pkg:apk/alpine/firefox@88.0-r0?arch=s390x&distroversion=v3.13&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@88.0-r0%3Farch=s390x&distroversion=v3.13&reponame=community" } ], "aliases": [ "CVE-2021-29946" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2cd3-m37k-5ydh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63196?format=api", "vulnerability_id": "VCID-2vdu-1jvt-5uf3", "summary": "Lack of escaping allowed HTML injection when a webpage was viewed in Reader View. While a Content Security Policy prevents direct code execution, HTML injection is still possible.*Note: This issue only affected Firefox for Android. Other operating systems are unaffected.*", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-29944", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00377", "scoring_system": "epss", "scoring_elements": "0.59353", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00377", "scoring_system": "epss", "scoring_elements": "0.59204", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00377", "scoring_system": "epss", "scoring_elements": "0.59314", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00377", "scoring_system": "epss", "scoring_elements": "0.59347", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00377", "scoring_system": "epss", "scoring_elements": "0.59278", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00377", "scoring_system": "epss", "scoring_elements": "0.59301", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00377", "scoring_system": "epss", "scoring_elements": "0.59265", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00377", "scoring_system": "epss", "scoring_elements": "0.59316", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00377", "scoring_system": "epss", "scoring_elements": "0.59329", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00377", "scoring_system": "epss", "scoring_elements": "0.59348", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00377", "scoring_system": "epss", "scoring_elements": "0.59331", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-29944" }, { "reference_url": "https://security.archlinux.org/AVG-1835", "reference_id": "AVG-1835", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1835" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-16", "reference_id": "mfsa2021-16", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-16" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/448198?format=api", "purl": "pkg:apk/alpine/firefox@88.0-r0?arch=s390x&distroversion=v3.13&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@88.0-r0%3Farch=s390x&distroversion=v3.13&reponame=community" } ], "aliases": [ "CVE-2021-29944" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2vdu-1jvt-5uf3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63193?format=api", "vulnerability_id": "VCID-7ddz-65jt-pudk", "summary": "Due to unexpected data type conversions, a use-after-free could have occurred when interacting with the font cache. We presume that with enough effort this could have been exploited to run arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-23997", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00204", "scoring_system": "epss", "scoring_elements": "0.42584", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00204", "scoring_system": "epss", "scoring_elements": "0.42483", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00204", "scoring_system": "epss", "scoring_elements": "0.42567", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00204", "scoring_system": "epss", "scoring_elements": "0.42539", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00204", "scoring_system": "epss", "scoring_elements": "0.42599", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00204", "scoring_system": "epss", "scoring_elements": "0.42554", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00204", "scoring_system": "epss", "scoring_elements": "0.42583", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00204", "scoring_system": "epss", "scoring_elements": "0.42521", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00204", "scoring_system": "epss", "scoring_elements": "0.42573", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00204", "scoring_system": "epss", "scoring_elements": "0.42582", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00204", "scoring_system": "epss", "scoring_elements": "0.42604", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-23997" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.archlinux.org/ASA-202104-3", "reference_id": "ASA-202104-3", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202104-3" }, { "reference_url": "https://security.archlinux.org/AVG-1834", "reference_id": "AVG-1834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1834" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-16", "reference_id": "mfsa2021-16", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-16" }, { "reference_url": "https://usn.ubuntu.com/4926-1/", "reference_id": "USN-4926-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4926-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/448198?format=api", "purl": "pkg:apk/alpine/firefox@88.0-r0?arch=s390x&distroversion=v3.13&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@88.0-r0%3Farch=s390x&distroversion=v3.13&reponame=community" } ], "aliases": [ "CVE-2021-23997" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7ddz-65jt-pudk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63195?format=api", "vulnerability_id": "VCID-8jkx-ad5d-e7cd", "summary": "A compromised content process could have performed session history manipulations it should not have been able to due to testing infrastructure that was not restricted to testing-only configurations.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-24001", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50551", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.5041", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50503", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50546", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50466", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50494", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50448", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50502", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50499", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50541", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50518", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-24001" }, { "reference_url": "https://security.archlinux.org/ASA-202104-3", "reference_id": "ASA-202104-3", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202104-3" }, { "reference_url": "https://security.archlinux.org/AVG-1834", "reference_id": "AVG-1834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1834" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-16", "reference_id": "mfsa2021-16", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-16" }, { "reference_url": "https://usn.ubuntu.com/4926-1/", "reference_id": "USN-4926-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4926-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/448198?format=api", "purl": "pkg:apk/alpine/firefox@88.0-r0?arch=s390x&distroversion=v3.13&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@88.0-r0%3Farch=s390x&distroversion=v3.13&reponame=community" } ], "aliases": [ "CVE-2021-24001" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8jkx-ad5d-e7cd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50234?format=api", "vulnerability_id": "VCID-e38r-grgp-rfbn", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the\n worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23998.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23998.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-23998", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37275", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37215", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37267", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.3728", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37291", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37257", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37229", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37195", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37361", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00163", "scoring_system": "epss", "scoring_elements": "0.37387", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-23998" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23961", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23961" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23991", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23991" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23992", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23992" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23993", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23993" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23994", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23994" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23995", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23995" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23998", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23998" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23999", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23999" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24002" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29945", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29945" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29946", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29946" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29948", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29948" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29949", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29949" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951366", "reference_id": "1951366", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951366" }, { "reference_url": "https://security.archlinux.org/ASA-202104-3", "reference_id": "ASA-202104-3", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202104-3" }, { "reference_url": "https://security.archlinux.org/ASA-202104-4", "reference_id": "ASA-202104-4", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202104-4" }, { "reference_url": "https://security.archlinux.org/AVG-1834", "reference_id": "AVG-1834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1834" }, { "reference_url": "https://security.archlinux.org/AVG-1836", "reference_id": "AVG-1836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1836" }, { "reference_url": "https://security.gentoo.org/glsa/202104-09", "reference_id": "GLSA-202104-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202104-09" }, { "reference_url": "https://security.gentoo.org/glsa/202104-10", "reference_id": "GLSA-202104-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202104-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-14", "reference_id": "mfsa2021-14", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-14" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-15", "reference_id": "mfsa2021-15", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-15" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-16", "reference_id": "mfsa2021-16", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-16" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1350", "reference_id": "RHSA-2021:1350", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1350" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1351", "reference_id": "RHSA-2021:1351", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1351" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1352", "reference_id": "RHSA-2021:1352", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1352" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1353", "reference_id": "RHSA-2021:1353", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1353" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1360", "reference_id": "RHSA-2021:1360", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1360" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1361", "reference_id": "RHSA-2021:1361", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1361" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1362", "reference_id": "RHSA-2021:1362", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1362" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1363", "reference_id": "RHSA-2021:1363", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1363" }, { "reference_url": "https://usn.ubuntu.com/4926-1/", "reference_id": "USN-4926-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4926-1/" }, { "reference_url": "https://usn.ubuntu.com/4995-1/", "reference_id": "USN-4995-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4995-1/" }, { "reference_url": "https://usn.ubuntu.com/4995-2/", "reference_id": "USN-4995-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4995-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/448198?format=api", "purl": "pkg:apk/alpine/firefox@88.0-r0?arch=s390x&distroversion=v3.13&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@88.0-r0%3Farch=s390x&distroversion=v3.13&reponame=community" } ], "aliases": [ "CVE-2021-23998" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e38r-grgp-rfbn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63194?format=api", "vulnerability_id": "VCID-e6xd-fmsu-jkgn", "summary": "A race condition with requestPointerLock() and setTimeout() could have resulted in a user interacting with one tab when they believed they were on a separate tab. In conjunction with certain elements (such as <input type=\"file\">) this could have led to an attack where a user was confused about the origin of the webpage and potentially disclosed information they did not intend to.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-24000", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46309", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46184", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46246", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46256", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46313", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46226", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46245", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46193", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46249", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46251", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46274", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-24000" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.archlinux.org/ASA-202104-3", "reference_id": "ASA-202104-3", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202104-3" }, { "reference_url": "https://security.archlinux.org/AVG-1834", "reference_id": "AVG-1834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1834" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-16", "reference_id": "mfsa2021-16", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-16" }, { "reference_url": "https://usn.ubuntu.com/4926-1/", "reference_id": "USN-4926-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4926-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/448198?format=api", "purl": "pkg:apk/alpine/firefox@88.0-r0?arch=s390x&distroversion=v3.13&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@88.0-r0%3Farch=s390x&distroversion=v3.13&reponame=community" } ], "aliases": [ "CVE-2021-24000" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e6xd-fmsu-jkgn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63197?format=api", "vulnerability_id": "VCID-ebus-cbbm-u3dn", "summary": "Mozilla developers and community members Ryan VanderMeulen, Sean Feng, Tyson Smith, Julian Seward, Christian Holler reported memory safety bugs present in Firefox 87. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-29947", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00348", "scoring_system": "epss", "scoring_elements": "0.57367", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00348", "scoring_system": "epss", "scoring_elements": "0.57236", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00348", "scoring_system": "epss", "scoring_elements": "0.57366", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00348", "scoring_system": "epss", "scoring_elements": "0.57345", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00348", "scoring_system": "epss", "scoring_elements": "0.57372", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00348", "scoring_system": "epss", "scoring_elements": "0.57318", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00348", "scoring_system": "epss", "scoring_elements": "0.57341", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00348", "scoring_system": "epss", "scoring_elements": "0.57369", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00348", "scoring_system": "epss", "scoring_elements": "0.57371", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00348", "scoring_system": "epss", "scoring_elements": "0.57386", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-29947" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.archlinux.org/ASA-202104-3", "reference_id": "ASA-202104-3", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202104-3" }, { "reference_url": "https://security.archlinux.org/AVG-1834", "reference_id": "AVG-1834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1834" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-16", "reference_id": "mfsa2021-16", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-16" }, { "reference_url": "https://usn.ubuntu.com/4926-1/", "reference_id": "USN-4926-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4926-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/448198?format=api", "purl": "pkg:apk/alpine/firefox@88.0-r0?arch=s390x&distroversion=v3.13&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@88.0-r0%3Farch=s390x&distroversion=v3.13&reponame=community" } ], "aliases": [ "CVE-2021-29947" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ebus-cbbm-u3dn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50233?format=api", "vulnerability_id": "VCID-qq5h-5k45-rycm", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the\n worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23995.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23995.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-23995", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01035", "scoring_system": "epss", "scoring_elements": "0.7742", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01035", "scoring_system": "epss", "scoring_elements": "0.77337", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01035", "scoring_system": "epss", "scoring_elements": "0.77368", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01035", "scoring_system": "epss", "scoring_elements": "0.77377", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01035", "scoring_system": "epss", "scoring_elements": "0.77404", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01035", "scoring_system": "epss", "scoring_elements": "0.77383", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01035", "scoring_system": "epss", "scoring_elements": "0.7738", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01035", "scoring_system": "epss", "scoring_elements": "0.77322", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01035", "scoring_system": "epss", "scoring_elements": "0.77328", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01035", "scoring_system": "epss", "scoring_elements": "0.77357", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-23995" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23961", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23961" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23991", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23991" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23992", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23992" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23993", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23993" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23994", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23994" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23995", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23995" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23998", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23998" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23999", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23999" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24002" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29945", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29945" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29946", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29946" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29948", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29948" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29949", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29949" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951365", "reference_id": "1951365", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951365" }, { "reference_url": "https://security.archlinux.org/ASA-202104-3", "reference_id": "ASA-202104-3", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202104-3" }, { "reference_url": "https://security.archlinux.org/ASA-202104-4", "reference_id": "ASA-202104-4", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202104-4" }, { "reference_url": "https://security.archlinux.org/AVG-1834", "reference_id": "AVG-1834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1834" }, { "reference_url": "https://security.archlinux.org/AVG-1836", "reference_id": "AVG-1836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1836" }, { "reference_url": "https://security.gentoo.org/glsa/202104-09", "reference_id": "GLSA-202104-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202104-09" }, { "reference_url": "https://security.gentoo.org/glsa/202104-10", "reference_id": "GLSA-202104-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202104-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-14", "reference_id": "mfsa2021-14", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-14" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-15", "reference_id": "mfsa2021-15", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-15" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-16", "reference_id": "mfsa2021-16", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-16" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1350", "reference_id": "RHSA-2021:1350", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1350" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1351", "reference_id": "RHSA-2021:1351", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1351" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1352", "reference_id": "RHSA-2021:1352", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1352" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1353", "reference_id": "RHSA-2021:1353", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1353" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1360", "reference_id": "RHSA-2021:1360", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1360" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1361", "reference_id": "RHSA-2021:1361", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1361" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1362", "reference_id": "RHSA-2021:1362", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1362" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1363", "reference_id": "RHSA-2021:1363", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1363" }, { "reference_url": "https://usn.ubuntu.com/4926-1/", "reference_id": "USN-4926-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4926-1/" }, { "reference_url": "https://usn.ubuntu.com/4995-1/", "reference_id": "USN-4995-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4995-1/" }, { "reference_url": "https://usn.ubuntu.com/4995-2/", "reference_id": "USN-4995-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4995-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/448198?format=api", "purl": "pkg:apk/alpine/firefox@88.0-r0?arch=s390x&distroversion=v3.13&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@88.0-r0%3Farch=s390x&distroversion=v3.13&reponame=community" } ], "aliases": [ "CVE-2021-23995" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qq5h-5k45-rycm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63192?format=api", "vulnerability_id": "VCID-rmzq-gwbe-qyba", "summary": "By utilizing 3D CSS in conjunction with Javascript, content could have been rendered outside the webpage's viewport, resulting in a spoofing attack that could have been used for phishing or other attacks on a user.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-23996", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50551", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.5041", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50503", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50546", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50466", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50494", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50448", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50502", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50499", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50541", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50518", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-23996" }, { "reference_url": "https://security.archlinux.org/ASA-202104-3", "reference_id": "ASA-202104-3", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202104-3" }, { "reference_url": "https://security.archlinux.org/AVG-1834", "reference_id": "AVG-1834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1834" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-16", "reference_id": "mfsa2021-16", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-16" }, { "reference_url": "https://usn.ubuntu.com/4926-1/", "reference_id": "USN-4926-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4926-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/448198?format=api", "purl": "pkg:apk/alpine/firefox@88.0-r0?arch=s390x&distroversion=v3.13&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@88.0-r0%3Farch=s390x&distroversion=v3.13&reponame=community" } ], "aliases": [ "CVE-2021-23996" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rmzq-gwbe-qyba" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50235?format=api", "vulnerability_id": "VCID-tjtk-gghp-1kdf", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the\n worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23999.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23999.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-23999", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35924", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35931", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35954", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.3596", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35921", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35897", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35937", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35828", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.36018", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.36049", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.3588", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-23999" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23961", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23961" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23991", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23991" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23992", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23992" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23993", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23993" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23994", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23994" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23995", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23995" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23998", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23998" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23999", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23999" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24002" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29945", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29945" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29946", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29946" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29948", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29948" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29949", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29949" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951368", "reference_id": "1951368", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951368" }, { "reference_url": "https://security.archlinux.org/ASA-202104-3", "reference_id": "ASA-202104-3", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202104-3" }, { "reference_url": "https://security.archlinux.org/ASA-202104-4", "reference_id": "ASA-202104-4", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202104-4" }, { "reference_url": "https://security.archlinux.org/AVG-1834", "reference_id": "AVG-1834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1834" }, { "reference_url": "https://security.archlinux.org/AVG-1836", "reference_id": "AVG-1836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1836" }, { "reference_url": "https://security.gentoo.org/glsa/202104-09", "reference_id": "GLSA-202104-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202104-09" }, { "reference_url": "https://security.gentoo.org/glsa/202104-10", "reference_id": "GLSA-202104-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202104-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-14", "reference_id": "mfsa2021-14", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-14" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-15", "reference_id": "mfsa2021-15", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-15" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-16", "reference_id": "mfsa2021-16", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-16" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1350", "reference_id": "RHSA-2021:1350", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1350" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1351", "reference_id": "RHSA-2021:1351", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1351" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1352", "reference_id": "RHSA-2021:1352", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1352" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1353", "reference_id": "RHSA-2021:1353", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1353" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1360", "reference_id": "RHSA-2021:1360", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1360" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1361", "reference_id": "RHSA-2021:1361", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1361" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1362", "reference_id": "RHSA-2021:1362", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1362" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1363", "reference_id": "RHSA-2021:1363", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1363" }, { "reference_url": "https://usn.ubuntu.com/4926-1/", "reference_id": "USN-4926-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4926-1/" }, { "reference_url": "https://usn.ubuntu.com/4995-1/", "reference_id": "USN-4995-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4995-1/" }, { "reference_url": "https://usn.ubuntu.com/4995-2/", "reference_id": "USN-4995-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4995-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/448198?format=api", "purl": "pkg:apk/alpine/firefox@88.0-r0?arch=s390x&distroversion=v3.13&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@88.0-r0%3Farch=s390x&distroversion=v3.13&reponame=community" } ], "aliases": [ "CVE-2021-23999" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tjtk-gghp-1kdf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50236?format=api", "vulnerability_id": "VCID-vt2f-abwe-4ba2", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the\n worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-24002.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-24002.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-24002", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00457", "scoring_system": "epss", "scoring_elements": "0.63954", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00457", "scoring_system": "epss", "scoring_elements": "0.63926", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00457", "scoring_system": "epss", "scoring_elements": "0.63943", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00457", "scoring_system": "epss", "scoring_elements": "0.63955", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00457", "scoring_system": "epss", "scoring_elements": "0.63942", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00457", "scoring_system": "epss", "scoring_elements": "0.63909", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00457", "scoring_system": "epss", "scoring_elements": "0.63944", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00457", "scoring_system": "epss", "scoring_elements": "0.63832", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00457", "scoring_system": "epss", "scoring_elements": "0.63891", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00457", "scoring_system": "epss", "scoring_elements": "0.63918", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00457", "scoring_system": "epss", "scoring_elements": "0.63875", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-24002" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23961", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23961" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23991", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23991" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23992", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23992" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23993", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23993" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23994", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23994" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23995", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23995" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23998", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23998" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23999", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23999" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24002" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29945", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29945" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29946", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29946" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29948", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29948" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29949", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29949" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951369", "reference_id": "1951369", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951369" }, { "reference_url": "https://security.archlinux.org/ASA-202104-3", "reference_id": "ASA-202104-3", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202104-3" }, { "reference_url": "https://security.archlinux.org/ASA-202104-4", "reference_id": "ASA-202104-4", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202104-4" }, { "reference_url": "https://security.archlinux.org/AVG-1834", "reference_id": "AVG-1834", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1834" }, { "reference_url": "https://security.archlinux.org/AVG-1836", "reference_id": "AVG-1836", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1836" }, { "reference_url": "https://security.gentoo.org/glsa/202104-09", "reference_id": "GLSA-202104-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202104-09" }, { "reference_url": "https://security.gentoo.org/glsa/202104-10", "reference_id": "GLSA-202104-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202104-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-14", "reference_id": "mfsa2021-14", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-14" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-15", "reference_id": "mfsa2021-15", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-15" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-16", "reference_id": "mfsa2021-16", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-16" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1350", "reference_id": "RHSA-2021:1350", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1350" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1351", "reference_id": "RHSA-2021:1351", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1351" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1352", "reference_id": "RHSA-2021:1352", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1352" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1353", "reference_id": "RHSA-2021:1353", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1353" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1360", "reference_id": "RHSA-2021:1360", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1360" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1361", "reference_id": "RHSA-2021:1361", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1361" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1362", "reference_id": "RHSA-2021:1362", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1362" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1363", "reference_id": "RHSA-2021:1363", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1363" }, { "reference_url": "https://usn.ubuntu.com/4926-1/", "reference_id": "USN-4926-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4926-1/" }, { "reference_url": "https://usn.ubuntu.com/4995-1/", "reference_id": "USN-4995-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4995-1/" }, { "reference_url": "https://usn.ubuntu.com/4995-2/", "reference_id": "USN-4995-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4995-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/448198?format=api", "purl": "pkg:apk/alpine/firefox@88.0-r0?arch=s390x&distroversion=v3.13&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@88.0-r0%3Farch=s390x&distroversion=v3.13&reponame=community" } ], "aliases": [ "CVE-2021-24002" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vt2f-abwe-4ba2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50237?format=api", "vulnerability_id": "VCID-vtwu-x1vt-x3bq", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the\n worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29945.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29945.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-29945", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00409", "scoring_system": "epss", "scoring_elements": "0.61283", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00409", "scoring_system": "epss", "scoring_elements": "0.61237", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00409", "scoring_system": "epss", "scoring_elements": "0.61251", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00409", "scoring_system": "epss", "scoring_elements": "0.61272", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00409", "scoring_system": "epss", "scoring_elements": "0.61258", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00409", "scoring_system": "epss", "scoring_elements": "0.61239", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00409", "scoring_system": "epss", "scoring_elements": "0.61279", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00409", "scoring_system": "epss", "scoring_elements": "0.61116", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00409", "scoring_system": "epss", "scoring_elements": "0.61194", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00409", "scoring_system": "epss", "scoring_elements": "0.61222", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00409", "scoring_system": "epss", "scoring_elements": "0.61189", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-29945" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23961", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23961" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23991", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23991" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23992", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23992" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23993", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23993" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23994", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23994" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23995", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23995" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23998", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23998" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23999", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23999" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24002" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29945", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29945" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29946", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29946" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29948", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29948" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29949", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29949" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951370", "reference_id": "1951370", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951370" }, { "reference_url": "https://security.archlinux.org/AVG-1835", "reference_id": "AVG-1835", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1835" }, { "reference_url": "https://security.archlinux.org/AVG-1837", "reference_id": "AVG-1837", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1837" }, { "reference_url": "https://security.gentoo.org/glsa/202104-09", "reference_id": "GLSA-202104-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202104-09" }, { "reference_url": "https://security.gentoo.org/glsa/202104-10", "reference_id": "GLSA-202104-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202104-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-14", "reference_id": "mfsa2021-14", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-14" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-15", "reference_id": "mfsa2021-15", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-15" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-16", "reference_id": "mfsa2021-16", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-16" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1350", "reference_id": "RHSA-2021:1350", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1350" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1351", "reference_id": "RHSA-2021:1351", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1351" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1352", "reference_id": "RHSA-2021:1352", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1352" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1353", "reference_id": "RHSA-2021:1353", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1353" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1360", "reference_id": "RHSA-2021:1360", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1360" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1361", "reference_id": "RHSA-2021:1361", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1361" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1362", "reference_id": "RHSA-2021:1362", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1362" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1363", "reference_id": "RHSA-2021:1363", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1363" }, { "reference_url": "https://usn.ubuntu.com/4926-1/", "reference_id": "USN-4926-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4926-1/" }, { "reference_url": "https://usn.ubuntu.com/4995-1/", "reference_id": "USN-4995-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4995-1/" }, { "reference_url": "https://usn.ubuntu.com/4995-2/", "reference_id": "USN-4995-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4995-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/448198?format=api", "purl": "pkg:apk/alpine/firefox@88.0-r0?arch=s390x&distroversion=v3.13&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@88.0-r0%3Farch=s390x&distroversion=v3.13&reponame=community" } ], "aliases": [ "CVE-2021-29945" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vtwu-x1vt-x3bq" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@88.0-r0%3Farch=s390x&distroversion=v3.13&reponame=community" }