Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/webkit2gtk@2.32.4-r0?arch=x86&distroversion=v3.16&reponame=community
Typeapk
Namespacealpine
Namewebkit2gtk
Version2.32.4-r0
Qualifiers
arch x86
distroversion v3.16
reponame community
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2.34.0-r0
Latest_non_vulnerable_version2.36.5-r0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-4a1y-uhze-syfg
vulnerability_id VCID-4a1y-uhze-syfg
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45482.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45482.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-45482
reference_id
reference_type
scores
0
value 0.00028
scoring_system epss
scoring_elements 0.07937
published_at 2026-04-01T12:55:00Z
1
value 0.00028
scoring_system epss
scoring_elements 0.08036
published_at 2026-04-02T12:55:00Z
2
value 0.00028
scoring_system epss
scoring_elements 0.08079
published_at 2026-04-04T12:55:00Z
3
value 0.00028
scoring_system epss
scoring_elements 0.08042
published_at 2026-04-07T12:55:00Z
4
value 0.00028
scoring_system epss
scoring_elements 0.08102
published_at 2026-04-08T12:55:00Z
5
value 0.00028
scoring_system epss
scoring_elements 0.08124
published_at 2026-04-09T12:55:00Z
6
value 0.00028
scoring_system epss
scoring_elements 0.08115
published_at 2026-04-11T12:55:00Z
7
value 0.00028
scoring_system epss
scoring_elements 0.08095
published_at 2026-04-12T12:55:00Z
8
value 0.00028
scoring_system epss
scoring_elements 0.08078
published_at 2026-04-13T12:55:00Z
9
value 0.00028
scoring_system epss
scoring_elements 0.07984
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-45482
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30809
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30809
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30836
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30848
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30848
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30849
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30849
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30858
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45482
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2040329
reference_id 2040329
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2040329
9
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
10
reference_url https://access.redhat.com/errata/RHSA-2022:1777
reference_id RHSA-2022:1777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1777
11
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
0
url pkg:apk/alpine/webkit2gtk@2.32.4-r0?arch=x86&distroversion=v3.16&reponame=community
purl pkg:apk/alpine/webkit2gtk@2.32.4-r0?arch=x86&distroversion=v3.16&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/webkit2gtk@2.32.4-r0%3Farch=x86&distroversion=v3.16&reponame=community
aliases CVE-2021-45482
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4a1y-uhze-syfg
1
url VCID-9jak-ycxb-bfgx
vulnerability_id VCID-9jak-ycxb-bfgx
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30848.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30848.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30848
reference_id
reference_type
scores
0
value 0.00316
scoring_system epss
scoring_elements 0.54628
published_at 2026-04-01T12:55:00Z
1
value 0.00316
scoring_system epss
scoring_elements 0.54752
published_at 2026-04-16T12:55:00Z
2
value 0.00316
scoring_system epss
scoring_elements 0.54751
published_at 2026-04-11T12:55:00Z
3
value 0.00316
scoring_system epss
scoring_elements 0.54736
published_at 2026-04-12T12:55:00Z
4
value 0.00316
scoring_system epss
scoring_elements 0.54714
published_at 2026-04-13T12:55:00Z
5
value 0.00316
scoring_system epss
scoring_elements 0.54698
published_at 2026-04-02T12:55:00Z
6
value 0.00316
scoring_system epss
scoring_elements 0.54721
published_at 2026-04-04T12:55:00Z
7
value 0.00316
scoring_system epss
scoring_elements 0.54691
published_at 2026-04-07T12:55:00Z
8
value 0.00316
scoring_system epss
scoring_elements 0.54743
published_at 2026-04-08T12:55:00Z
9
value 0.00316
scoring_system epss
scoring_elements 0.54739
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30848
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30809
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30809
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30836
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30848
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30848
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30849
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30849
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30858
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45482
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2017901
reference_id 2017901
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2017901
10
reference_url https://security.archlinux.org/AVG-2399
reference_id AVG-2399
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2399
11
reference_url https://security.archlinux.org/AVG-2400
reference_id AVG-2400
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2400
12
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
13
reference_url https://access.redhat.com/errata/RHSA-2022:1777
reference_id RHSA-2022:1777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1777
14
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
0
url pkg:apk/alpine/webkit2gtk@2.32.4-r0?arch=x86&distroversion=v3.16&reponame=community
purl pkg:apk/alpine/webkit2gtk@2.32.4-r0?arch=x86&distroversion=v3.16&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/webkit2gtk@2.32.4-r0%3Farch=x86&distroversion=v3.16&reponame=community
aliases CVE-2021-30848
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9jak-ycxb-bfgx
2
url VCID-b9t6-k4u8-qqbt
vulnerability_id VCID-b9t6-k4u8-qqbt
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30809.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30809.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30809
reference_id
reference_type
scores
0
value 0.00387
scoring_system epss
scoring_elements 0.59731
published_at 2026-04-01T12:55:00Z
1
value 0.00387
scoring_system epss
scoring_elements 0.59805
published_at 2026-04-02T12:55:00Z
2
value 0.00387
scoring_system epss
scoring_elements 0.59829
published_at 2026-04-04T12:55:00Z
3
value 0.00387
scoring_system epss
scoring_elements 0.59799
published_at 2026-04-07T12:55:00Z
4
value 0.00387
scoring_system epss
scoring_elements 0.5985
published_at 2026-04-08T12:55:00Z
5
value 0.00387
scoring_system epss
scoring_elements 0.59864
published_at 2026-04-09T12:55:00Z
6
value 0.00387
scoring_system epss
scoring_elements 0.59885
published_at 2026-04-11T12:55:00Z
7
value 0.00387
scoring_system epss
scoring_elements 0.59869
published_at 2026-04-12T12:55:00Z
8
value 0.00387
scoring_system epss
scoring_elements 0.59851
published_at 2026-04-13T12:55:00Z
9
value 0.00387
scoring_system epss
scoring_elements 0.59888
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30809
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30809
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30809
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30836
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30848
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30848
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30849
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30849
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30858
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45482
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2034347
reference_id 2034347
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2034347
10
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
11
reference_url https://access.redhat.com/errata/RHSA-2022:1777
reference_id RHSA-2022:1777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1777
12
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
0
url pkg:apk/alpine/webkit2gtk@2.32.4-r0?arch=x86&distroversion=v3.16&reponame=community
purl pkg:apk/alpine/webkit2gtk@2.32.4-r0?arch=x86&distroversion=v3.16&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/webkit2gtk@2.32.4-r0%3Farch=x86&distroversion=v3.16&reponame=community
aliases CVE-2021-30809
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b9t6-k4u8-qqbt
3
url VCID-javw-gqjb-mfdt
vulnerability_id VCID-javw-gqjb-mfdt
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30849.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30849.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30849
reference_id
reference_type
scores
0
value 0.00257
scoring_system epss
scoring_elements 0.4898
published_at 2026-04-01T12:55:00Z
1
value 0.00257
scoring_system epss
scoring_elements 0.49089
published_at 2026-04-16T12:55:00Z
2
value 0.00257
scoring_system epss
scoring_elements 0.49048
published_at 2026-04-09T12:55:00Z
3
value 0.00257
scoring_system epss
scoring_elements 0.49065
published_at 2026-04-11T12:55:00Z
4
value 0.00257
scoring_system epss
scoring_elements 0.49038
published_at 2026-04-12T12:55:00Z
5
value 0.00257
scoring_system epss
scoring_elements 0.49016
published_at 2026-04-02T12:55:00Z
6
value 0.00257
scoring_system epss
scoring_elements 0.49044
published_at 2026-04-13T12:55:00Z
7
value 0.00257
scoring_system epss
scoring_elements 0.48997
published_at 2026-04-07T12:55:00Z
8
value 0.00257
scoring_system epss
scoring_elements 0.49051
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30849
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30809
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30809
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30836
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30848
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30848
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30849
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30849
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30858
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45482
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2017904
reference_id 2017904
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2017904
10
reference_url https://security.archlinux.org/AVG-2399
reference_id AVG-2399
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2399
11
reference_url https://security.archlinux.org/AVG-2400
reference_id AVG-2400
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2400
12
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
13
reference_url https://access.redhat.com/errata/RHSA-2022:1777
reference_id RHSA-2022:1777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1777
14
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
0
url pkg:apk/alpine/webkit2gtk@2.32.4-r0?arch=x86&distroversion=v3.16&reponame=community
purl pkg:apk/alpine/webkit2gtk@2.32.4-r0?arch=x86&distroversion=v3.16&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/webkit2gtk@2.32.4-r0%3Farch=x86&distroversion=v3.16&reponame=community
aliases CVE-2021-30849
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-javw-gqjb-mfdt
4
url VCID-m1q1-ma7s-63bd
vulnerability_id VCID-m1q1-ma7s-63bd
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30836.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30836.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30836
reference_id
reference_type
scores
0
value 0.00123
scoring_system epss
scoring_elements 0.31445
published_at 2026-04-01T12:55:00Z
1
value 0.00123
scoring_system epss
scoring_elements 0.3158
published_at 2026-04-02T12:55:00Z
2
value 0.00123
scoring_system epss
scoring_elements 0.31623
published_at 2026-04-04T12:55:00Z
3
value 0.00123
scoring_system epss
scoring_elements 0.31444
published_at 2026-04-07T12:55:00Z
4
value 0.00123
scoring_system epss
scoring_elements 0.31496
published_at 2026-04-08T12:55:00Z
5
value 0.00123
scoring_system epss
scoring_elements 0.31525
published_at 2026-04-09T12:55:00Z
6
value 0.00123
scoring_system epss
scoring_elements 0.3153
published_at 2026-04-11T12:55:00Z
7
value 0.00123
scoring_system epss
scoring_elements 0.31488
published_at 2026-04-12T12:55:00Z
8
value 0.00123
scoring_system epss
scoring_elements 0.31451
published_at 2026-04-13T12:55:00Z
9
value 0.00123
scoring_system epss
scoring_elements 0.31485
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30836
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30809
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30809
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30836
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30848
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30848
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30849
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30849
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30858
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45482
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2034376
reference_id 2034376
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2034376
10
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
11
reference_url https://access.redhat.com/errata/RHSA-2022:1777
reference_id RHSA-2022:1777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1777
12
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
0
url pkg:apk/alpine/webkit2gtk@2.32.4-r0?arch=x86&distroversion=v3.16&reponame=community
purl pkg:apk/alpine/webkit2gtk@2.32.4-r0?arch=x86&distroversion=v3.16&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/webkit2gtk@2.32.4-r0%3Farch=x86&distroversion=v3.16&reponame=community
aliases CVE-2021-30836
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m1q1-ma7s-63bd
5
url VCID-zrgu-ez13-tqeq
vulnerability_id VCID-zrgu-ez13-tqeq
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30858.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30858.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30858
reference_id
reference_type
scores
0
value 0.00794
scoring_system epss
scoring_elements 0.73907
published_at 2026-04-01T12:55:00Z
1
value 0.00794
scoring_system epss
scoring_elements 0.73997
published_at 2026-04-16T12:55:00Z
2
value 0.00794
scoring_system epss
scoring_elements 0.73956
published_at 2026-04-13T12:55:00Z
3
value 0.00794
scoring_system epss
scoring_elements 0.73964
published_at 2026-04-12T12:55:00Z
4
value 0.00794
scoring_system epss
scoring_elements 0.73917
published_at 2026-04-02T12:55:00Z
5
value 0.00794
scoring_system epss
scoring_elements 0.73982
published_at 2026-04-11T12:55:00Z
6
value 0.00794
scoring_system epss
scoring_elements 0.73959
published_at 2026-04-09T12:55:00Z
7
value 0.00794
scoring_system epss
scoring_elements 0.73946
published_at 2026-04-08T12:55:00Z
8
value 0.00794
scoring_system epss
scoring_elements 0.73912
published_at 2026-04-07T12:55:00Z
9
value 0.00794
scoring_system epss
scoring_elements 0.73941
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30858
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30809
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30809
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30836
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30848
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30848
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30849
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30849
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30858
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45482
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url http://www.openwall.com/lists/oss-security/2021/09/20/1
reference_id 1
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:31:17Z/
url http://www.openwall.com/lists/oss-security/2021/09/20/1
10
reference_url http://www.openwall.com/lists/oss-security/2021/10/27/1
reference_id 1
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:31:17Z/
url http://www.openwall.com/lists/oss-security/2021/10/27/1
11
reference_url http://www.openwall.com/lists/oss-security/2021/10/27/2
reference_id 2
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:31:17Z/
url http://www.openwall.com/lists/oss-security/2021/10/27/2
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2006099
reference_id 2006099
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2006099
13
reference_url http://seclists.org/fulldisclosure/2021/Sep/25
reference_id 25
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:31:17Z/
url http://seclists.org/fulldisclosure/2021/Sep/25
14
reference_url http://seclists.org/fulldisclosure/2021/Sep/27
reference_id 27
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:31:17Z/
url http://seclists.org/fulldisclosure/2021/Sep/27
15
reference_url http://seclists.org/fulldisclosure/2021/Sep/29
reference_id 29
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:31:17Z/
url http://seclists.org/fulldisclosure/2021/Sep/29
16
reference_url http://seclists.org/fulldisclosure/2021/Sep/38
reference_id 38
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:31:17Z/
url http://seclists.org/fulldisclosure/2021/Sep/38
17
reference_url http://seclists.org/fulldisclosure/2021/Sep/39
reference_id 39
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:31:17Z/
url http://seclists.org/fulldisclosure/2021/Sep/39
18
reference_url http://www.openwall.com/lists/oss-security/2021/10/27/4
reference_id 4
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:31:17Z/
url http://www.openwall.com/lists/oss-security/2021/10/27/4
19
reference_url http://seclists.org/fulldisclosure/2021/Sep/50
reference_id 50
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:31:17Z/
url http://seclists.org/fulldisclosure/2021/Sep/50
20
reference_url http://www.openwall.com/lists/oss-security/2021/10/26/9
reference_id 9
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:31:17Z/
url http://www.openwall.com/lists/oss-security/2021/10/26/9
21
reference_url https://security.archlinux.org/AVG-2399
reference_id AVG-2399
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2399
22
reference_url https://security.archlinux.org/AVG-2400
reference_id AVG-2400
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2400
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BO6DMTHZR57JDBOXPSNR2MKDMCRWV265/
reference_id BO6DMTHZR57JDBOXPSNR2MKDMCRWV265
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:31:17Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BO6DMTHZR57JDBOXPSNR2MKDMCRWV265/
24
reference_url https://www.debian.org/security/2021/dsa-4975
reference_id dsa-4975
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:31:17Z/
url https://www.debian.org/security/2021/dsa-4975
25
reference_url https://www.debian.org/security/2021/dsa-4976
reference_id dsa-4976
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:31:17Z/
url https://www.debian.org/security/2021/dsa-4976
26
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
27
reference_url https://support.apple.com/en-us/HT212804
reference_id HT212804
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:31:17Z/
url https://support.apple.com/en-us/HT212804
28
reference_url https://support.apple.com/en-us/HT212807
reference_id HT212807
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:31:17Z/
url https://support.apple.com/en-us/HT212807
29
reference_url https://support.apple.com/kb/HT212824
reference_id HT212824
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:31:17Z/
url https://support.apple.com/kb/HT212824
30
reference_url https://access.redhat.com/errata/RHSA-2021:4097
reference_id RHSA-2021:4097
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4097
31
reference_url https://access.redhat.com/errata/RHSA-2021:4686
reference_id RHSA-2021:4686
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4686
32
reference_url https://access.redhat.com/errata/RHSA-2022:0059
reference_id RHSA-2022:0059
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0059
33
reference_url https://access.redhat.com/errata/RHSA-2022:0075
reference_id RHSA-2022:0075
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0075
34
reference_url https://usn.ubuntu.com/5087-1/
reference_id USN-5087-1
reference_type
scores
url https://usn.ubuntu.com/5087-1/
35
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XYNV7ASK4LQVAUMJXNXBS3Z7RVDQ2N3W/
reference_id XYNV7ASK4LQVAUMJXNXBS3Z7RVDQ2N3W
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:31:17Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XYNV7ASK4LQVAUMJXNXBS3Z7RVDQ2N3W/
fixed_packages
0
url pkg:apk/alpine/webkit2gtk@2.32.4-r0?arch=x86&distroversion=v3.16&reponame=community
purl pkg:apk/alpine/webkit2gtk@2.32.4-r0?arch=x86&distroversion=v3.16&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/webkit2gtk@2.32.4-r0%3Farch=x86&distroversion=v3.16&reponame=community
aliases CVE-2021-30858
risk_score 10.0
exploitability 2.0
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zrgu-ez13-tqeq
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/webkit2gtk@2.32.4-r0%3Farch=x86&distroversion=v3.16&reponame=community