Lookup for vulnerable packages by Package URL.

GET /api/packages/448198?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/448198?format=api",
    "purl": "pkg:apk/alpine/firefox@88.0-r0?arch=s390x&distroversion=v3.13&reponame=community",
    "type": "apk",
    "namespace": "alpine",
    "name": "firefox",
    "version": "88.0-r0",
    "qualifiers": {
        "arch": "s390x",
        "distroversion": "v3.13",
        "reponame": "community"
    },
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "88.0.1-r0",
    "latest_non_vulnerable_version": "89.0-r0",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50232?format=api",
            "vulnerability_id": "VCID-1e61-jk2b-aubw",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the\n    worst of which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23994.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23994.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-23994",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00348",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57347",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00348",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57368",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00348",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57238",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00348",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57388",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00348",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57373",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00348",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57371",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00348",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57344",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00348",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5732",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-23994"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23961",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23961"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23991",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23991"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23992",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23992"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23993",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23993"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23994",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23994"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23995",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23995"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23998",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23998"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23999",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23999"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24002",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24002"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29945",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29945"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29946",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29946"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29948",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29948"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29949",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29949"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951364",
                    "reference_id": "1951364",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951364"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202104-3",
                    "reference_id": "ASA-202104-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202104-3"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202104-4",
                    "reference_id": "ASA-202104-4",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202104-4"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1834",
                    "reference_id": "AVG-1834",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1834"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1836",
                    "reference_id": "AVG-1836",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1836"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202104-09",
                    "reference_id": "GLSA-202104-09",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202104-09"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202104-10",
                    "reference_id": "GLSA-202104-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202104-10"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-14",
                    "reference_id": "mfsa2021-14",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-14"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-15",
                    "reference_id": "mfsa2021-15",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-15"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-16",
                    "reference_id": "mfsa2021-16",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-16"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1350",
                    "reference_id": "RHSA-2021:1350",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1350"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1351",
                    "reference_id": "RHSA-2021:1351",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1351"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1352",
                    "reference_id": "RHSA-2021:1352",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1352"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1353",
                    "reference_id": "RHSA-2021:1353",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1353"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1360",
                    "reference_id": "RHSA-2021:1360",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1360"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1361",
                    "reference_id": "RHSA-2021:1361",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1361"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1362",
                    "reference_id": "RHSA-2021:1362",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1362"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1363",
                    "reference_id": "RHSA-2021:1363",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1363"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4926-1/",
                    "reference_id": "USN-4926-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4926-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4995-1/",
                    "reference_id": "USN-4995-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4995-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4995-2/",
                    "reference_id": "USN-4995-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4995-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/448198?format=api",
                    "purl": "pkg:apk/alpine/firefox@88.0-r0?arch=s390x&distroversion=v3.13&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@88.0-r0%3Farch=s390x&distroversion=v3.13&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2021-23994"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1e61-jk2b-aubw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50238?format=api",
            "vulnerability_id": "VCID-2cd3-m37k-5ydh",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the\n    worst of which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29946.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29946.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-29946",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37272",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37279",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37293",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37304",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3727",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37243",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37289",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37207",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37374",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.374",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37228",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-29946"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23961",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23961"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23991",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23991"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23992",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23992"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23993",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23993"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23994",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23994"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23995",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23995"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23998",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23998"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23999",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23999"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24002",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24002"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29945",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29945"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29946",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29946"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29948",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29948"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29949",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29949"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951371",
                    "reference_id": "1951371",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951371"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202104-3",
                    "reference_id": "ASA-202104-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202104-3"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202104-4",
                    "reference_id": "ASA-202104-4",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202104-4"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1834",
                    "reference_id": "AVG-1834",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1834"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1836",
                    "reference_id": "AVG-1836",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1836"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202104-09",
                    "reference_id": "GLSA-202104-09",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202104-09"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202104-10",
                    "reference_id": "GLSA-202104-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202104-10"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-14",
                    "reference_id": "mfsa2021-14",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-14"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-15",
                    "reference_id": "mfsa2021-15",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-15"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-16",
                    "reference_id": "mfsa2021-16",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-16"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1350",
                    "reference_id": "RHSA-2021:1350",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1350"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1351",
                    "reference_id": "RHSA-2021:1351",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1351"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1352",
                    "reference_id": "RHSA-2021:1352",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1352"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1353",
                    "reference_id": "RHSA-2021:1353",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1353"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1360",
                    "reference_id": "RHSA-2021:1360",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1360"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1361",
                    "reference_id": "RHSA-2021:1361",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1361"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1362",
                    "reference_id": "RHSA-2021:1362",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1362"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1363",
                    "reference_id": "RHSA-2021:1363",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1363"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4926-1/",
                    "reference_id": "USN-4926-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4926-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4995-1/",
                    "reference_id": "USN-4995-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4995-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4995-2/",
                    "reference_id": "USN-4995-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4995-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/448198?format=api",
                    "purl": "pkg:apk/alpine/firefox@88.0-r0?arch=s390x&distroversion=v3.13&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@88.0-r0%3Farch=s390x&distroversion=v3.13&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2021-29946"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2cd3-m37k-5ydh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63196?format=api",
            "vulnerability_id": "VCID-2vdu-1jvt-5uf3",
            "summary": "Lack of escaping allowed HTML injection when a webpage was viewed in Reader View. While a Content Security Policy prevents direct code execution, HTML injection is still possible.*Note: This issue only affected Firefox for Android. Other operating systems are unaffected.*",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-29944",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00377",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59353",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00377",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59204",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00377",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59314",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00377",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59347",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00377",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59278",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00377",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59301",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00377",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59265",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00377",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59316",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00377",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59329",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00377",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59348",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00377",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59331",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-29944"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1835",
                    "reference_id": "AVG-1835",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1835"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-16",
                    "reference_id": "mfsa2021-16",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-16"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/448198?format=api",
                    "purl": "pkg:apk/alpine/firefox@88.0-r0?arch=s390x&distroversion=v3.13&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@88.0-r0%3Farch=s390x&distroversion=v3.13&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2021-29944"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2vdu-1jvt-5uf3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63193?format=api",
            "vulnerability_id": "VCID-7ddz-65jt-pudk",
            "summary": "Due to unexpected data type conversions, a use-after-free could have occurred when interacting with the font cache. We presume that with enough effort this could have been exploited to run arbitrary code.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-23997",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42584",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42483",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42567",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42539",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42599",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42554",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42583",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42521",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42573",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42582",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42604",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-23997"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202104-3",
                    "reference_id": "ASA-202104-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202104-3"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1834",
                    "reference_id": "AVG-1834",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1834"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-16",
                    "reference_id": "mfsa2021-16",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-16"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4926-1/",
                    "reference_id": "USN-4926-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4926-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/448198?format=api",
                    "purl": "pkg:apk/alpine/firefox@88.0-r0?arch=s390x&distroversion=v3.13&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@88.0-r0%3Farch=s390x&distroversion=v3.13&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2021-23997"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7ddz-65jt-pudk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63195?format=api",
            "vulnerability_id": "VCID-8jkx-ad5d-e7cd",
            "summary": "A compromised content process could have performed session history manipulations it should not have been able to due to testing infrastructure that was not restricted to testing-only configurations.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-24001",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50551",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5041",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50503",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50546",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50466",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50494",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50448",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50502",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50499",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50541",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50518",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-24001"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202104-3",
                    "reference_id": "ASA-202104-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202104-3"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1834",
                    "reference_id": "AVG-1834",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1834"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-16",
                    "reference_id": "mfsa2021-16",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-16"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4926-1/",
                    "reference_id": "USN-4926-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4926-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/448198?format=api",
                    "purl": "pkg:apk/alpine/firefox@88.0-r0?arch=s390x&distroversion=v3.13&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@88.0-r0%3Farch=s390x&distroversion=v3.13&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2021-24001"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8jkx-ad5d-e7cd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50234?format=api",
            "vulnerability_id": "VCID-e38r-grgp-rfbn",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the\n    worst of which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23998.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23998.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-23998",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37275",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37215",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37267",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3728",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37291",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37257",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37229",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37195",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37361",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37387",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-23998"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23961",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23961"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23991",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23991"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23992",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23992"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23993",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23993"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23994",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23994"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23995",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23995"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23998",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23998"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23999",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23999"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24002",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24002"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29945",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29945"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29946",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29946"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29948",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29948"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29949",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29949"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951366",
                    "reference_id": "1951366",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951366"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202104-3",
                    "reference_id": "ASA-202104-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202104-3"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202104-4",
                    "reference_id": "ASA-202104-4",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202104-4"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1834",
                    "reference_id": "AVG-1834",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1834"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1836",
                    "reference_id": "AVG-1836",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1836"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202104-09",
                    "reference_id": "GLSA-202104-09",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202104-09"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202104-10",
                    "reference_id": "GLSA-202104-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202104-10"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-14",
                    "reference_id": "mfsa2021-14",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-14"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-15",
                    "reference_id": "mfsa2021-15",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-15"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-16",
                    "reference_id": "mfsa2021-16",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-16"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1350",
                    "reference_id": "RHSA-2021:1350",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1350"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1351",
                    "reference_id": "RHSA-2021:1351",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1351"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1352",
                    "reference_id": "RHSA-2021:1352",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1352"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1353",
                    "reference_id": "RHSA-2021:1353",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1353"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1360",
                    "reference_id": "RHSA-2021:1360",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1360"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1361",
                    "reference_id": "RHSA-2021:1361",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1361"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1362",
                    "reference_id": "RHSA-2021:1362",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1362"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1363",
                    "reference_id": "RHSA-2021:1363",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1363"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4926-1/",
                    "reference_id": "USN-4926-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4926-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4995-1/",
                    "reference_id": "USN-4995-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4995-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4995-2/",
                    "reference_id": "USN-4995-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4995-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/448198?format=api",
                    "purl": "pkg:apk/alpine/firefox@88.0-r0?arch=s390x&distroversion=v3.13&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@88.0-r0%3Farch=s390x&distroversion=v3.13&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2021-23998"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e38r-grgp-rfbn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63194?format=api",
            "vulnerability_id": "VCID-e6xd-fmsu-jkgn",
            "summary": "A race condition with requestPointerLock() and setTimeout() could have resulted in a user interacting with one tab when they believed they were on a separate tab. In conjunction with certain elements (such as <input type=\"file\">) this could have led to an attack where a user was confused about the origin of the webpage and potentially disclosed information they did not intend to.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-24000",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00234",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46309",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00234",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46184",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00234",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46246",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00234",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46256",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00234",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46313",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00234",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46226",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00234",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46245",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00234",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46193",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00234",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46249",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00234",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46251",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00234",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46274",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-24000"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202104-3",
                    "reference_id": "ASA-202104-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202104-3"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1834",
                    "reference_id": "AVG-1834",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1834"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-16",
                    "reference_id": "mfsa2021-16",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-16"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4926-1/",
                    "reference_id": "USN-4926-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4926-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/448198?format=api",
                    "purl": "pkg:apk/alpine/firefox@88.0-r0?arch=s390x&distroversion=v3.13&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@88.0-r0%3Farch=s390x&distroversion=v3.13&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2021-24000"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e6xd-fmsu-jkgn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63197?format=api",
            "vulnerability_id": "VCID-ebus-cbbm-u3dn",
            "summary": "Mozilla developers and community members Ryan VanderMeulen, Sean Feng, Tyson Smith, Julian Seward, Christian Holler reported memory safety bugs present in Firefox 87. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-29947",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00348",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57367",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00348",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57236",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00348",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57366",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00348",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57345",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00348",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57372",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00348",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57318",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00348",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57341",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00348",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57369",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00348",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57371",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00348",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57386",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-29947"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202104-3",
                    "reference_id": "ASA-202104-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202104-3"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1834",
                    "reference_id": "AVG-1834",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1834"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-16",
                    "reference_id": "mfsa2021-16",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-16"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4926-1/",
                    "reference_id": "USN-4926-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4926-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/448198?format=api",
                    "purl": "pkg:apk/alpine/firefox@88.0-r0?arch=s390x&distroversion=v3.13&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@88.0-r0%3Farch=s390x&distroversion=v3.13&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2021-29947"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ebus-cbbm-u3dn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50233?format=api",
            "vulnerability_id": "VCID-qq5h-5k45-rycm",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the\n    worst of which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23995.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23995.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-23995",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7742",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77337",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77368",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77377",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77404",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77383",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7738",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77322",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77328",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77357",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-23995"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23961",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23961"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23991",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23991"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23992",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23992"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23993",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23993"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23994",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23994"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23995",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23995"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23998",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23998"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23999",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23999"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24002",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24002"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29945",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29945"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29946",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29946"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29948",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29948"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29949",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29949"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951365",
                    "reference_id": "1951365",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951365"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202104-3",
                    "reference_id": "ASA-202104-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202104-3"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202104-4",
                    "reference_id": "ASA-202104-4",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202104-4"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1834",
                    "reference_id": "AVG-1834",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1834"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1836",
                    "reference_id": "AVG-1836",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1836"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202104-09",
                    "reference_id": "GLSA-202104-09",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202104-09"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202104-10",
                    "reference_id": "GLSA-202104-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202104-10"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-14",
                    "reference_id": "mfsa2021-14",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-14"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-15",
                    "reference_id": "mfsa2021-15",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-15"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-16",
                    "reference_id": "mfsa2021-16",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-16"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1350",
                    "reference_id": "RHSA-2021:1350",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1350"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1351",
                    "reference_id": "RHSA-2021:1351",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1351"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1352",
                    "reference_id": "RHSA-2021:1352",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1352"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1353",
                    "reference_id": "RHSA-2021:1353",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1353"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1360",
                    "reference_id": "RHSA-2021:1360",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1360"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1361",
                    "reference_id": "RHSA-2021:1361",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1361"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1362",
                    "reference_id": "RHSA-2021:1362",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1362"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1363",
                    "reference_id": "RHSA-2021:1363",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1363"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4926-1/",
                    "reference_id": "USN-4926-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4926-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4995-1/",
                    "reference_id": "USN-4995-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4995-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4995-2/",
                    "reference_id": "USN-4995-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4995-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/448198?format=api",
                    "purl": "pkg:apk/alpine/firefox@88.0-r0?arch=s390x&distroversion=v3.13&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@88.0-r0%3Farch=s390x&distroversion=v3.13&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2021-23995"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qq5h-5k45-rycm"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63192?format=api",
            "vulnerability_id": "VCID-rmzq-gwbe-qyba",
            "summary": "By utilizing 3D CSS in conjunction with Javascript, content could have been rendered outside the webpage's viewport, resulting in a spoofing attack that could have been used for phishing or other attacks on a user.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-23996",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50551",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5041",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50503",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50546",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50466",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50494",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50448",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50502",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50499",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50541",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50518",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-23996"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202104-3",
                    "reference_id": "ASA-202104-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202104-3"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1834",
                    "reference_id": "AVG-1834",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1834"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-16",
                    "reference_id": "mfsa2021-16",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-16"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4926-1/",
                    "reference_id": "USN-4926-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4926-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/448198?format=api",
                    "purl": "pkg:apk/alpine/firefox@88.0-r0?arch=s390x&distroversion=v3.13&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@88.0-r0%3Farch=s390x&distroversion=v3.13&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2021-23996"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rmzq-gwbe-qyba"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50235?format=api",
            "vulnerability_id": "VCID-tjtk-gghp-1kdf",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the\n    worst of which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23999.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23999.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-23999",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00152",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35924",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00152",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35931",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00152",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35954",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00152",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3596",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00152",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35921",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00152",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35897",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00152",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35937",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00152",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35828",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00152",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36018",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00152",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36049",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00152",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3588",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-23999"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23961",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23961"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23991",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23991"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23992",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23992"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23993",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23993"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23994",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23994"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23995",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23995"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23998",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23998"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23999",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23999"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24002",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24002"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29945",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29945"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29946",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29946"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29948",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29948"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29949",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29949"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951368",
                    "reference_id": "1951368",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951368"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202104-3",
                    "reference_id": "ASA-202104-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202104-3"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202104-4",
                    "reference_id": "ASA-202104-4",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202104-4"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1834",
                    "reference_id": "AVG-1834",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1834"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1836",
                    "reference_id": "AVG-1836",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1836"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202104-09",
                    "reference_id": "GLSA-202104-09",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202104-09"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202104-10",
                    "reference_id": "GLSA-202104-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202104-10"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-14",
                    "reference_id": "mfsa2021-14",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-14"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-15",
                    "reference_id": "mfsa2021-15",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-15"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-16",
                    "reference_id": "mfsa2021-16",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-16"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1350",
                    "reference_id": "RHSA-2021:1350",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1350"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1351",
                    "reference_id": "RHSA-2021:1351",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1351"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1352",
                    "reference_id": "RHSA-2021:1352",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1352"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1353",
                    "reference_id": "RHSA-2021:1353",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1353"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1360",
                    "reference_id": "RHSA-2021:1360",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1360"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1361",
                    "reference_id": "RHSA-2021:1361",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1361"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1362",
                    "reference_id": "RHSA-2021:1362",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1362"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1363",
                    "reference_id": "RHSA-2021:1363",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1363"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4926-1/",
                    "reference_id": "USN-4926-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4926-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4995-1/",
                    "reference_id": "USN-4995-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4995-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4995-2/",
                    "reference_id": "USN-4995-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4995-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/448198?format=api",
                    "purl": "pkg:apk/alpine/firefox@88.0-r0?arch=s390x&distroversion=v3.13&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@88.0-r0%3Farch=s390x&distroversion=v3.13&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2021-23999"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tjtk-gghp-1kdf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50236?format=api",
            "vulnerability_id": "VCID-vt2f-abwe-4ba2",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the\n    worst of which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-24002.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-24002.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-24002",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00457",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63954",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00457",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63926",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00457",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63943",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00457",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63955",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00457",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63942",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00457",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63909",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00457",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63944",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00457",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63832",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00457",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63891",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00457",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63918",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00457",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63875",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-24002"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23961",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23961"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23991",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23991"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23992",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23992"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23993",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23993"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23994",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23994"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23995",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23995"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23998",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23998"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23999",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23999"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24002",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24002"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29945",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29945"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29946",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29946"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29948",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29948"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29949",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29949"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951369",
                    "reference_id": "1951369",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951369"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202104-3",
                    "reference_id": "ASA-202104-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202104-3"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202104-4",
                    "reference_id": "ASA-202104-4",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202104-4"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1834",
                    "reference_id": "AVG-1834",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1834"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1836",
                    "reference_id": "AVG-1836",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1836"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202104-09",
                    "reference_id": "GLSA-202104-09",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202104-09"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202104-10",
                    "reference_id": "GLSA-202104-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202104-10"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-14",
                    "reference_id": "mfsa2021-14",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-14"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-15",
                    "reference_id": "mfsa2021-15",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-15"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-16",
                    "reference_id": "mfsa2021-16",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-16"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1350",
                    "reference_id": "RHSA-2021:1350",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1350"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1351",
                    "reference_id": "RHSA-2021:1351",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1351"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1352",
                    "reference_id": "RHSA-2021:1352",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1352"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1353",
                    "reference_id": "RHSA-2021:1353",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1353"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1360",
                    "reference_id": "RHSA-2021:1360",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1360"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1361",
                    "reference_id": "RHSA-2021:1361",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1361"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1362",
                    "reference_id": "RHSA-2021:1362",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1362"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1363",
                    "reference_id": "RHSA-2021:1363",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1363"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4926-1/",
                    "reference_id": "USN-4926-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4926-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4995-1/",
                    "reference_id": "USN-4995-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4995-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4995-2/",
                    "reference_id": "USN-4995-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4995-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/448198?format=api",
                    "purl": "pkg:apk/alpine/firefox@88.0-r0?arch=s390x&distroversion=v3.13&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@88.0-r0%3Farch=s390x&distroversion=v3.13&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2021-24002"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vt2f-abwe-4ba2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50237?format=api",
            "vulnerability_id": "VCID-vtwu-x1vt-x3bq",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the\n    worst of which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29945.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29945.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-29945",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00409",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61283",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00409",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61237",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00409",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61251",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00409",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61272",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00409",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61258",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00409",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61239",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00409",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61279",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00409",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61116",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00409",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61194",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00409",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61222",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00409",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61189",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-29945"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23961",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23961"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23991",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23991"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23992",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23992"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23993",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23993"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23994",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23994"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23995",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23995"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23998",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23998"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23999",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23999"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24002",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24002"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29945",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29945"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29946",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29946"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29948",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29948"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29949",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29949"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951370",
                    "reference_id": "1951370",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951370"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1835",
                    "reference_id": "AVG-1835",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1835"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1837",
                    "reference_id": "AVG-1837",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1837"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202104-09",
                    "reference_id": "GLSA-202104-09",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202104-09"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202104-10",
                    "reference_id": "GLSA-202104-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202104-10"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-14",
                    "reference_id": "mfsa2021-14",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-14"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-15",
                    "reference_id": "mfsa2021-15",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-15"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-16",
                    "reference_id": "mfsa2021-16",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-16"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1350",
                    "reference_id": "RHSA-2021:1350",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1350"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1351",
                    "reference_id": "RHSA-2021:1351",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1351"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1352",
                    "reference_id": "RHSA-2021:1352",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1352"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1353",
                    "reference_id": "RHSA-2021:1353",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1353"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1360",
                    "reference_id": "RHSA-2021:1360",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1360"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1361",
                    "reference_id": "RHSA-2021:1361",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1361"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1362",
                    "reference_id": "RHSA-2021:1362",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1362"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1363",
                    "reference_id": "RHSA-2021:1363",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1363"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4926-1/",
                    "reference_id": "USN-4926-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4926-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4995-1/",
                    "reference_id": "USN-4995-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4995-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4995-2/",
                    "reference_id": "USN-4995-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4995-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/448198?format=api",
                    "purl": "pkg:apk/alpine/firefox@88.0-r0?arch=s390x&distroversion=v3.13&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@88.0-r0%3Farch=s390x&distroversion=v3.13&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2021-29945"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vtwu-x1vt-x3bq"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@88.0-r0%3Farch=s390x&distroversion=v3.13&reponame=community"
}