Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/webkit2gtk3@2.34.6-1?arch=el8
Typerpm
Namespaceredhat
Namewebkit2gtk3
Version2.34.6-1
Qualifiers
arch el8
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-1fqx-3rnb-13bh
vulnerability_id VCID-1fqx-3rnb-13bh
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30953.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30953.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30953
reference_id
reference_type
scores
0
value 0.00482
scoring_system epss
scoring_elements 0.6508
published_at 2026-04-01T12:55:00Z
1
value 0.00482
scoring_system epss
scoring_elements 0.6513
published_at 2026-04-02T12:55:00Z
2
value 0.00482
scoring_system epss
scoring_elements 0.65157
published_at 2026-04-04T12:55:00Z
3
value 0.00482
scoring_system epss
scoring_elements 0.65123
published_at 2026-04-07T12:55:00Z
4
value 0.00482
scoring_system epss
scoring_elements 0.65172
published_at 2026-04-08T12:55:00Z
5
value 0.00482
scoring_system epss
scoring_elements 0.65186
published_at 2026-04-09T12:55:00Z
6
value 0.00482
scoring_system epss
scoring_elements 0.65204
published_at 2026-04-11T12:55:00Z
7
value 0.00482
scoring_system epss
scoring_elements 0.65191
published_at 2026-04-12T12:55:00Z
8
value 0.00482
scoring_system epss
scoring_elements 0.65163
published_at 2026-04-13T12:55:00Z
9
value 0.00482
scoring_system epss
scoring_elements 0.65198
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30953
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2044542
reference_id 2044542
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2044542
13
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
14
reference_url https://access.redhat.com/errata/RHSA-2022:1777
reference_id RHSA-2022:1777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1777
15
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
16
reference_url https://usn.ubuntu.com/5255-1/
reference_id USN-5255-1
reference_type
scores
url https://usn.ubuntu.com/5255-1/
fixed_packages
aliases CVE-2021-30953
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1fqx-3rnb-13bh
1
url VCID-2umj-w8zs-m3em
vulnerability_id VCID-2umj-w8zs-m3em
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30889.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30889.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30889
reference_id
reference_type
scores
0
value 0.00685
scoring_system epss
scoring_elements 0.71641
published_at 2026-04-01T12:55:00Z
1
value 0.00685
scoring_system epss
scoring_elements 0.71647
published_at 2026-04-02T12:55:00Z
2
value 0.00685
scoring_system epss
scoring_elements 0.71665
published_at 2026-04-04T12:55:00Z
3
value 0.00685
scoring_system epss
scoring_elements 0.71638
published_at 2026-04-07T12:55:00Z
4
value 0.00685
scoring_system epss
scoring_elements 0.71678
published_at 2026-04-08T12:55:00Z
5
value 0.00685
scoring_system epss
scoring_elements 0.71688
published_at 2026-04-09T12:55:00Z
6
value 0.00685
scoring_system epss
scoring_elements 0.71712
published_at 2026-04-11T12:55:00Z
7
value 0.00685
scoring_system epss
scoring_elements 0.71695
published_at 2026-04-12T12:55:00Z
8
value 0.00685
scoring_system epss
scoring_elements 0.71677
published_at 2026-04-13T12:55:00Z
9
value 0.00685
scoring_system epss
scoring_elements 0.7172
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30889
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2034386
reference_id 2034386
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2034386
14
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
15
reference_url https://access.redhat.com/errata/RHSA-2022:1777
reference_id RHSA-2022:1777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1777
16
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2021-30889
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2umj-w8zs-m3em
2
url VCID-37kv-4cp4-5fas
vulnerability_id VCID-37kv-4cp4-5fas
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30846.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30846.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30846
reference_id
reference_type
scores
0
value 0.00503
scoring_system epss
scoring_elements 0.66006
published_at 2026-04-01T12:55:00Z
1
value 0.00503
scoring_system epss
scoring_elements 0.66116
published_at 2026-04-16T12:55:00Z
2
value 0.00503
scoring_system epss
scoring_elements 0.66123
published_at 2026-04-11T12:55:00Z
3
value 0.00503
scoring_system epss
scoring_elements 0.6611
published_at 2026-04-12T12:55:00Z
4
value 0.00503
scoring_system epss
scoring_elements 0.6608
published_at 2026-04-13T12:55:00Z
5
value 0.00503
scoring_system epss
scoring_elements 0.66048
published_at 2026-04-02T12:55:00Z
6
value 0.00503
scoring_system epss
scoring_elements 0.66076
published_at 2026-04-04T12:55:00Z
7
value 0.00503
scoring_system epss
scoring_elements 0.66043
published_at 2026-04-07T12:55:00Z
8
value 0.00503
scoring_system epss
scoring_elements 0.66091
published_at 2026-04-08T12:55:00Z
9
value 0.00503
scoring_system epss
scoring_elements 0.66104
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30846
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2017898
reference_id 2017898
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2017898
14
reference_url https://security.archlinux.org/ASA-202110-10
reference_id ASA-202110-10
reference_type
scores
url https://security.archlinux.org/ASA-202110-10
15
reference_url https://security.archlinux.org/ASA-202110-9
reference_id ASA-202110-9
reference_type
scores
url https://security.archlinux.org/ASA-202110-9
16
reference_url https://security.archlinux.org/AVG-2483
reference_id AVG-2483
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2483
17
reference_url https://security.archlinux.org/AVG-2484
reference_id AVG-2484
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2484
18
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
19
reference_url https://access.redhat.com/errata/RHSA-2022:1777
reference_id RHSA-2022:1777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1777
20
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
21
reference_url https://usn.ubuntu.com/5127-1/
reference_id USN-5127-1
reference_type
scores
url https://usn.ubuntu.com/5127-1/
fixed_packages
aliases CVE-2021-30846
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-37kv-4cp4-5fas
3
url VCID-48jv-7tnc-8fb3
vulnerability_id VCID-48jv-7tnc-8fb3
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22620.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22620.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-22620
reference_id
reference_type
scores
0
value 0.04022
scoring_system epss
scoring_elements 0.88483
published_at 2026-04-16T12:55:00Z
1
value 0.04022
scoring_system epss
scoring_elements 0.8843
published_at 2026-04-02T12:55:00Z
2
value 0.04022
scoring_system epss
scoring_elements 0.88438
published_at 2026-04-04T12:55:00Z
3
value 0.04022
scoring_system epss
scoring_elements 0.88442
published_at 2026-04-07T12:55:00Z
4
value 0.04022
scoring_system epss
scoring_elements 0.8846
published_at 2026-04-08T12:55:00Z
5
value 0.04022
scoring_system epss
scoring_elements 0.88466
published_at 2026-04-09T12:55:00Z
6
value 0.04022
scoring_system epss
scoring_elements 0.88477
published_at 2026-04-11T12:55:00Z
7
value 0.04022
scoring_system epss
scoring_elements 0.88469
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-22620
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22589
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22589
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22590
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22590
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22592
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22592
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22620
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2056474
reference_id 2056474
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2056474
8
reference_url https://security.archlinux.org/AVG-2649
reference_id AVG-2649
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2649
9
reference_url https://security.archlinux.org/AVG-2650
reference_id AVG-2650
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2650
10
reference_url https://security.gentoo.org/glsa/202208-39
reference_id GLSA-202208-39
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:36:15Z/
url https://security.gentoo.org/glsa/202208-39
11
reference_url https://support.apple.com/en-us/HT213091
reference_id HT213091
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:36:15Z/
url https://support.apple.com/en-us/HT213091
12
reference_url https://support.apple.com/en-us/HT213092
reference_id HT213092
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:36:15Z/
url https://support.apple.com/en-us/HT213092
13
reference_url https://support.apple.com/en-us/HT213093
reference_id HT213093
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:36:15Z/
url https://support.apple.com/en-us/HT213093
14
reference_url https://access.redhat.com/errata/RHSA-2022:1777
reference_id RHSA-2022:1777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1777
15
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2022-22620
risk_score 10.0
exploitability 2.0
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-48jv-7tnc-8fb3
4
url VCID-4a1y-uhze-syfg
vulnerability_id VCID-4a1y-uhze-syfg
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45482.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45482.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-45482
reference_id
reference_type
scores
0
value 0.00028
scoring_system epss
scoring_elements 0.07937
published_at 2026-04-01T12:55:00Z
1
value 0.00028
scoring_system epss
scoring_elements 0.08036
published_at 2026-04-02T12:55:00Z
2
value 0.00028
scoring_system epss
scoring_elements 0.08079
published_at 2026-04-04T12:55:00Z
3
value 0.00028
scoring_system epss
scoring_elements 0.08042
published_at 2026-04-07T12:55:00Z
4
value 0.00028
scoring_system epss
scoring_elements 0.08102
published_at 2026-04-08T12:55:00Z
5
value 0.00028
scoring_system epss
scoring_elements 0.08124
published_at 2026-04-09T12:55:00Z
6
value 0.00028
scoring_system epss
scoring_elements 0.08115
published_at 2026-04-11T12:55:00Z
7
value 0.00028
scoring_system epss
scoring_elements 0.08095
published_at 2026-04-12T12:55:00Z
8
value 0.00028
scoring_system epss
scoring_elements 0.08078
published_at 2026-04-13T12:55:00Z
9
value 0.00028
scoring_system epss
scoring_elements 0.07984
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-45482
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30809
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30809
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30836
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30848
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30848
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30849
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30849
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30858
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45482
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2040329
reference_id 2040329
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2040329
9
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
10
reference_url https://access.redhat.com/errata/RHSA-2022:1777
reference_id RHSA-2022:1777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1777
11
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2021-45482
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4a1y-uhze-syfg
5
url VCID-4mbv-yf9n-puck
vulnerability_id VCID-4mbv-yf9n-puck
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30887.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30887.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30887
reference_id
reference_type
scores
0
value 0.00304
scoring_system epss
scoring_elements 0.53579
published_at 2026-04-01T12:55:00Z
1
value 0.00304
scoring_system epss
scoring_elements 0.53603
published_at 2026-04-02T12:55:00Z
2
value 0.00304
scoring_system epss
scoring_elements 0.53631
published_at 2026-04-04T12:55:00Z
3
value 0.00304
scoring_system epss
scoring_elements 0.536
published_at 2026-04-07T12:55:00Z
4
value 0.00304
scoring_system epss
scoring_elements 0.53652
published_at 2026-04-08T12:55:00Z
5
value 0.00304
scoring_system epss
scoring_elements 0.5365
published_at 2026-04-09T12:55:00Z
6
value 0.00304
scoring_system epss
scoring_elements 0.53699
published_at 2026-04-11T12:55:00Z
7
value 0.00304
scoring_system epss
scoring_elements 0.53682
published_at 2026-04-12T12:55:00Z
8
value 0.00304
scoring_system epss
scoring_elements 0.53665
published_at 2026-04-13T12:55:00Z
9
value 0.00304
scoring_system epss
scoring_elements 0.53702
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30887
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30887
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30887
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30890
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30890
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2034381
reference_id 2034381
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2034381
6
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
7
reference_url https://access.redhat.com/errata/RHSA-2022:1777
reference_id RHSA-2022:1777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1777
8
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
9
reference_url https://usn.ubuntu.com/5213-1/
reference_id USN-5213-1
reference_type
scores
url https://usn.ubuntu.com/5213-1/
fixed_packages
aliases CVE-2021-30887
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4mbv-yf9n-puck
6
url VCID-4vn7-zfkq-a7dm
vulnerability_id VCID-4vn7-zfkq-a7dm
summary webkitgtk: A malicious website may exfiltrate data cross-origin
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22594.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22594.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-22594
reference_id
reference_type
scores
0
value 0.00216
scoring_system epss
scoring_elements 0.44162
published_at 2026-04-02T12:55:00Z
1
value 0.00216
scoring_system epss
scoring_elements 0.44185
published_at 2026-04-04T12:55:00Z
2
value 0.00216
scoring_system epss
scoring_elements 0.44117
published_at 2026-04-07T12:55:00Z
3
value 0.00216
scoring_system epss
scoring_elements 0.44168
published_at 2026-04-08T12:55:00Z
4
value 0.00216
scoring_system epss
scoring_elements 0.44171
published_at 2026-04-09T12:55:00Z
5
value 0.00216
scoring_system epss
scoring_elements 0.44187
published_at 2026-04-11T12:55:00Z
6
value 0.00216
scoring_system epss
scoring_elements 0.44154
published_at 2026-04-13T12:55:00Z
7
value 0.00216
scoring_system epss
scoring_elements 0.44215
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-22594
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2045291
reference_id 2045291
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2045291
13
reference_url https://access.redhat.com/errata/RHSA-2022:1777
reference_id RHSA-2022:1777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1777
14
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2022-22594
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4vn7-zfkq-a7dm
7
url VCID-5828-4rwa-tkcg
vulnerability_id VCID-5828-4rwa-tkcg
summary webkitgtk: logic issue was addressed with improved state management
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22637.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22637.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-22637
reference_id
reference_type
scores
0
value 0.00239
scoring_system epss
scoring_elements 0.47017
published_at 2026-04-16T12:55:00Z
1
value 0.00239
scoring_system epss
scoring_elements 0.46941
published_at 2026-04-02T12:55:00Z
2
value 0.00239
scoring_system epss
scoring_elements 0.46958
published_at 2026-04-04T12:55:00Z
3
value 0.00239
scoring_system epss
scoring_elements 0.46905
published_at 2026-04-07T12:55:00Z
4
value 0.00239
scoring_system epss
scoring_elements 0.4696
published_at 2026-04-08T12:55:00Z
5
value 0.00239
scoring_system epss
scoring_elements 0.46957
published_at 2026-04-09T12:55:00Z
6
value 0.00239
scoring_system epss
scoring_elements 0.46981
published_at 2026-04-11T12:55:00Z
7
value 0.00239
scoring_system epss
scoring_elements 0.46955
published_at 2026-04-12T12:55:00Z
8
value 0.00239
scoring_system epss
scoring_elements 0.46962
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-22637
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2073903
reference_id 2073903
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2073903
13
reference_url https://security.archlinux.org/AVG-2703
reference_id AVG-2703
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2703
14
reference_url https://support.apple.com/en-us/HT213182
reference_id HT213182
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-22T15:51:39Z/
url https://support.apple.com/en-us/HT213182
15
reference_url https://support.apple.com/en-us/HT213186
reference_id HT213186
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-22T15:51:39Z/
url https://support.apple.com/en-us/HT213186
16
reference_url https://support.apple.com/en-us/HT213187
reference_id HT213187
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-22T15:51:39Z/
url https://support.apple.com/en-us/HT213187
17
reference_url https://support.apple.com/en-us/HT213193
reference_id HT213193
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-22T15:51:39Z/
url https://support.apple.com/en-us/HT213193
18
reference_url https://access.redhat.com/errata/RHSA-2022:1777
reference_id RHSA-2022:1777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1777
19
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
20
reference_url https://usn.ubuntu.com/5394-1/
reference_id USN-5394-1
reference_type
scores
url https://usn.ubuntu.com/5394-1/
fixed_packages
aliases CVE-2022-22637
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5828-4rwa-tkcg
8
url VCID-5cwk-td7w-3uem
vulnerability_id VCID-5cwk-td7w-3uem
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30851.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30851.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30851
reference_id
reference_type
scores
0
value 0.01034
scoring_system epss
scoring_elements 0.77308
published_at 2026-04-01T12:55:00Z
1
value 0.01034
scoring_system epss
scoring_elements 0.77406
published_at 2026-04-16T12:55:00Z
2
value 0.01034
scoring_system epss
scoring_elements 0.7739
published_at 2026-04-11T12:55:00Z
3
value 0.01034
scoring_system epss
scoring_elements 0.77369
published_at 2026-04-12T12:55:00Z
4
value 0.01034
scoring_system epss
scoring_elements 0.77366
published_at 2026-04-13T12:55:00Z
5
value 0.01034
scoring_system epss
scoring_elements 0.77315
published_at 2026-04-02T12:55:00Z
6
value 0.01034
scoring_system epss
scoring_elements 0.77343
published_at 2026-04-04T12:55:00Z
7
value 0.01034
scoring_system epss
scoring_elements 0.77323
published_at 2026-04-07T12:55:00Z
8
value 0.01034
scoring_system epss
scoring_elements 0.77354
published_at 2026-04-08T12:55:00Z
9
value 0.01034
scoring_system epss
scoring_elements 0.77363
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30851
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2018573
reference_id 2018573
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2018573
14
reference_url https://security.archlinux.org/ASA-202110-10
reference_id ASA-202110-10
reference_type
scores
url https://security.archlinux.org/ASA-202110-10
15
reference_url https://security.archlinux.org/ASA-202110-9
reference_id ASA-202110-9
reference_type
scores
url https://security.archlinux.org/ASA-202110-9
16
reference_url https://security.archlinux.org/AVG-2483
reference_id AVG-2483
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2483
17
reference_url https://security.archlinux.org/AVG-2484
reference_id AVG-2484
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2484
18
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
19
reference_url https://access.redhat.com/errata/RHSA-2022:1777
reference_id RHSA-2022:1777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1777
20
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
21
reference_url https://usn.ubuntu.com/5127-1/
reference_id USN-5127-1
reference_type
scores
url https://usn.ubuntu.com/5127-1/
fixed_packages
aliases CVE-2021-30851
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5cwk-td7w-3uem
9
url VCID-9jak-ycxb-bfgx
vulnerability_id VCID-9jak-ycxb-bfgx
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30848.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30848.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30848
reference_id
reference_type
scores
0
value 0.00316
scoring_system epss
scoring_elements 0.54628
published_at 2026-04-01T12:55:00Z
1
value 0.00316
scoring_system epss
scoring_elements 0.54752
published_at 2026-04-16T12:55:00Z
2
value 0.00316
scoring_system epss
scoring_elements 0.54751
published_at 2026-04-11T12:55:00Z
3
value 0.00316
scoring_system epss
scoring_elements 0.54736
published_at 2026-04-12T12:55:00Z
4
value 0.00316
scoring_system epss
scoring_elements 0.54714
published_at 2026-04-13T12:55:00Z
5
value 0.00316
scoring_system epss
scoring_elements 0.54698
published_at 2026-04-02T12:55:00Z
6
value 0.00316
scoring_system epss
scoring_elements 0.54721
published_at 2026-04-04T12:55:00Z
7
value 0.00316
scoring_system epss
scoring_elements 0.54691
published_at 2026-04-07T12:55:00Z
8
value 0.00316
scoring_system epss
scoring_elements 0.54743
published_at 2026-04-08T12:55:00Z
9
value 0.00316
scoring_system epss
scoring_elements 0.54739
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30848
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30809
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30809
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30836
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30848
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30848
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30849
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30849
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30858
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45482
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2017901
reference_id 2017901
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2017901
10
reference_url https://security.archlinux.org/AVG-2399
reference_id AVG-2399
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2399
11
reference_url https://security.archlinux.org/AVG-2400
reference_id AVG-2400
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2400
12
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
13
reference_url https://access.redhat.com/errata/RHSA-2022:1777
reference_id RHSA-2022:1777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1777
14
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2021-30848
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9jak-ycxb-bfgx
10
url VCID-b3jh-p9hd-ebb7
vulnerability_id VCID-b3jh-p9hd-ebb7
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30934.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30934.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30934
reference_id
reference_type
scores
0
value 0.0169
scoring_system epss
scoring_elements 0.82155
published_at 2026-04-01T12:55:00Z
1
value 0.0169
scoring_system epss
scoring_elements 0.82168
published_at 2026-04-02T12:55:00Z
2
value 0.0169
scoring_system epss
scoring_elements 0.82189
published_at 2026-04-04T12:55:00Z
3
value 0.0169
scoring_system epss
scoring_elements 0.82185
published_at 2026-04-07T12:55:00Z
4
value 0.0169
scoring_system epss
scoring_elements 0.82212
published_at 2026-04-08T12:55:00Z
5
value 0.0169
scoring_system epss
scoring_elements 0.82219
published_at 2026-04-09T12:55:00Z
6
value 0.0169
scoring_system epss
scoring_elements 0.82238
published_at 2026-04-11T12:55:00Z
7
value 0.0169
scoring_system epss
scoring_elements 0.82231
published_at 2026-04-12T12:55:00Z
8
value 0.0169
scoring_system epss
scoring_elements 0.82225
published_at 2026-04-13T12:55:00Z
9
value 0.0169
scoring_system epss
scoring_elements 0.82261
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30934
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2044521
reference_id 2044521
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2044521
13
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
14
reference_url https://access.redhat.com/errata/RHSA-2022:1777
reference_id RHSA-2022:1777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1777
15
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
16
reference_url https://usn.ubuntu.com/5255-1/
reference_id USN-5255-1
reference_type
scores
url https://usn.ubuntu.com/5255-1/
fixed_packages
aliases CVE-2021-30934
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b3jh-p9hd-ebb7
11
url VCID-b6zs-hjbz-mugn
vulnerability_id VCID-b6zs-hjbz-mugn
summary webkitgtk: use-after-free in WebCore::Frame::page
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45483.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45483.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-45483
reference_id
reference_type
scores
0
value 0.00044
scoring_system epss
scoring_elements 0.1353
published_at 2026-04-01T12:55:00Z
1
value 0.00044
scoring_system epss
scoring_elements 0.1363
published_at 2026-04-02T12:55:00Z
2
value 0.00044
scoring_system epss
scoring_elements 0.13691
published_at 2026-04-04T12:55:00Z
3
value 0.00044
scoring_system epss
scoring_elements 0.13491
published_at 2026-04-07T12:55:00Z
4
value 0.00044
scoring_system epss
scoring_elements 0.13572
published_at 2026-04-08T12:55:00Z
5
value 0.00044
scoring_system epss
scoring_elements 0.13622
published_at 2026-04-09T12:55:00Z
6
value 0.00044
scoring_system epss
scoring_elements 0.13594
published_at 2026-04-11T12:55:00Z
7
value 0.00044
scoring_system epss
scoring_elements 0.13556
published_at 2026-04-12T12:55:00Z
8
value 0.00044
scoring_system epss
scoring_elements 0.13508
published_at 2026-04-13T12:55:00Z
9
value 0.00044
scoring_system epss
scoring_elements 0.13421
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-45483
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2040331
reference_id 2040331
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2040331
13
reference_url https://access.redhat.com/errata/RHSA-2022:1777
reference_id RHSA-2022:1777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1777
14
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2021-45483
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b6zs-hjbz-mugn
12
url VCID-b9t6-k4u8-qqbt
vulnerability_id VCID-b9t6-k4u8-qqbt
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30809.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30809.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30809
reference_id
reference_type
scores
0
value 0.00387
scoring_system epss
scoring_elements 0.59731
published_at 2026-04-01T12:55:00Z
1
value 0.00387
scoring_system epss
scoring_elements 0.59805
published_at 2026-04-02T12:55:00Z
2
value 0.00387
scoring_system epss
scoring_elements 0.59829
published_at 2026-04-04T12:55:00Z
3
value 0.00387
scoring_system epss
scoring_elements 0.59799
published_at 2026-04-07T12:55:00Z
4
value 0.00387
scoring_system epss
scoring_elements 0.5985
published_at 2026-04-08T12:55:00Z
5
value 0.00387
scoring_system epss
scoring_elements 0.59864
published_at 2026-04-09T12:55:00Z
6
value 0.00387
scoring_system epss
scoring_elements 0.59885
published_at 2026-04-11T12:55:00Z
7
value 0.00387
scoring_system epss
scoring_elements 0.59869
published_at 2026-04-12T12:55:00Z
8
value 0.00387
scoring_system epss
scoring_elements 0.59851
published_at 2026-04-13T12:55:00Z
9
value 0.00387
scoring_system epss
scoring_elements 0.59888
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30809
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30809
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30809
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30836
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30848
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30848
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30849
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30849
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30858
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45482
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2034347
reference_id 2034347
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2034347
10
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
11
reference_url https://access.redhat.com/errata/RHSA-2022:1777
reference_id RHSA-2022:1777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1777
12
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2021-30809
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b9t6-k4u8-qqbt
13
url VCID-bm12-ezac-rye8
vulnerability_id VCID-bm12-ezac-rye8
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30897.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30897.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30897
reference_id
reference_type
scores
0
value 0.00312
scoring_system epss
scoring_elements 0.54287
published_at 2026-04-01T12:55:00Z
1
value 0.00312
scoring_system epss
scoring_elements 0.54307
published_at 2026-04-02T12:55:00Z
2
value 0.00312
scoring_system epss
scoring_elements 0.54337
published_at 2026-04-04T12:55:00Z
3
value 0.00312
scoring_system epss
scoring_elements 0.54312
published_at 2026-04-07T12:55:00Z
4
value 0.00312
scoring_system epss
scoring_elements 0.54364
published_at 2026-04-08T12:55:00Z
5
value 0.00312
scoring_system epss
scoring_elements 0.54359
published_at 2026-04-09T12:55:00Z
6
value 0.00312
scoring_system epss
scoring_elements 0.54408
published_at 2026-04-11T12:55:00Z
7
value 0.00312
scoring_system epss
scoring_elements 0.5439
published_at 2026-04-12T12:55:00Z
8
value 0.00312
scoring_system epss
scoring_elements 0.54368
published_at 2026-04-13T12:55:00Z
9
value 0.00312
scoring_system epss
scoring_elements 0.54407
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30897
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2038907
reference_id 2038907
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2038907
4
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
5
reference_url https://access.redhat.com/errata/RHSA-2022:1777
reference_id RHSA-2022:1777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1777
6
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2021-30897
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bm12-ezac-rye8
14
url VCID-cjn2-p55e-bbbs
vulnerability_id VCID-cjn2-p55e-bbbs
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30888.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30888.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30888
reference_id
reference_type
scores
0
value 0.00216
scoring_system epss
scoring_elements 0.44074
published_at 2026-04-01T12:55:00Z
1
value 0.00216
scoring_system epss
scoring_elements 0.44138
published_at 2026-04-02T12:55:00Z
2
value 0.00216
scoring_system epss
scoring_elements 0.44162
published_at 2026-04-04T12:55:00Z
3
value 0.00216
scoring_system epss
scoring_elements 0.44093
published_at 2026-04-07T12:55:00Z
4
value 0.00216
scoring_system epss
scoring_elements 0.44144
published_at 2026-04-08T12:55:00Z
5
value 0.00216
scoring_system epss
scoring_elements 0.44147
published_at 2026-04-09T12:55:00Z
6
value 0.00216
scoring_system epss
scoring_elements 0.44163
published_at 2026-04-11T12:55:00Z
7
value 0.00216
scoring_system epss
scoring_elements 0.4413
published_at 2026-04-13T12:55:00Z
8
value 0.00216
scoring_system epss
scoring_elements 0.44191
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30888
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2034383
reference_id 2034383
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2034383
14
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
15
reference_url https://access.redhat.com/errata/RHSA-2022:1777
reference_id RHSA-2022:1777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1777
16
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2021-30888
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cjn2-p55e-bbbs
15
url VCID-dz61-8f33-t7ej
vulnerability_id VCID-dz61-8f33-t7ej
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30984.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30984.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30984
reference_id
reference_type
scores
0
value 0.00688
scoring_system epss
scoring_elements 0.71687
published_at 2026-04-01T12:55:00Z
1
value 0.00688
scoring_system epss
scoring_elements 0.71693
published_at 2026-04-02T12:55:00Z
2
value 0.00688
scoring_system epss
scoring_elements 0.71711
published_at 2026-04-04T12:55:00Z
3
value 0.00688
scoring_system epss
scoring_elements 0.71685
published_at 2026-04-07T12:55:00Z
4
value 0.00688
scoring_system epss
scoring_elements 0.71724
published_at 2026-04-08T12:55:00Z
5
value 0.00688
scoring_system epss
scoring_elements 0.71735
published_at 2026-04-09T12:55:00Z
6
value 0.00688
scoring_system epss
scoring_elements 0.71759
published_at 2026-04-11T12:55:00Z
7
value 0.00688
scoring_system epss
scoring_elements 0.71743
published_at 2026-04-12T12:55:00Z
8
value 0.00688
scoring_system epss
scoring_elements 0.71725
published_at 2026-04-13T12:55:00Z
9
value 0.00688
scoring_system epss
scoring_elements 0.71769
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30984
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2044553
reference_id 2044553
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2044553
13
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
14
reference_url https://access.redhat.com/errata/RHSA-2022:1777
reference_id RHSA-2022:1777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1777
15
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
16
reference_url https://usn.ubuntu.com/5255-1/
reference_id USN-5255-1
reference_type
scores
url https://usn.ubuntu.com/5255-1/
fixed_packages
aliases CVE-2021-30984
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dz61-8f33-t7ej
16
url VCID-hshv-d587-73b9
vulnerability_id VCID-hshv-d587-73b9
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22589.json
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22589.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-22589
reference_id
reference_type
scores
0
value 0.00788
scoring_system epss
scoring_elements 0.73803
published_at 2026-04-02T12:55:00Z
1
value 0.00788
scoring_system epss
scoring_elements 0.73827
published_at 2026-04-04T12:55:00Z
2
value 0.00788
scoring_system epss
scoring_elements 0.73797
published_at 2026-04-07T12:55:00Z
3
value 0.00788
scoring_system epss
scoring_elements 0.73832
published_at 2026-04-08T12:55:00Z
4
value 0.00788
scoring_system epss
scoring_elements 0.73844
published_at 2026-04-09T12:55:00Z
5
value 0.00788
scoring_system epss
scoring_elements 0.73867
published_at 2026-04-11T12:55:00Z
6
value 0.00788
scoring_system epss
scoring_elements 0.73848
published_at 2026-04-12T12:55:00Z
7
value 0.00788
scoring_system epss
scoring_elements 0.7384
published_at 2026-04-13T12:55:00Z
8
value 0.00788
scoring_system epss
scoring_elements 0.73882
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-22589
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22589
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22589
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22590
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22590
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22592
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22592
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22620
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2053179
reference_id 2053179
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2053179
8
reference_url https://security.gentoo.org/glsa/202208-39
reference_id GLSA-202208-39
reference_type
scores
url https://security.gentoo.org/glsa/202208-39
9
reference_url https://access.redhat.com/errata/RHSA-2022:1777
reference_id RHSA-2022:1777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1777
10
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
11
reference_url https://usn.ubuntu.com/5306-1/
reference_id USN-5306-1
reference_type
scores
url https://usn.ubuntu.com/5306-1/
fixed_packages
aliases CVE-2022-22589
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hshv-d587-73b9
17
url VCID-j8rg-9sya-8qbm
vulnerability_id VCID-j8rg-9sya-8qbm
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30890.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30890.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30890
reference_id
reference_type
scores
0
value 0.00191
scoring_system epss
scoring_elements 0.41001
published_at 2026-04-01T12:55:00Z
1
value 0.00191
scoring_system epss
scoring_elements 0.41083
published_at 2026-04-12T12:55:00Z
2
value 0.00191
scoring_system epss
scoring_elements 0.41114
published_at 2026-04-04T12:55:00Z
3
value 0.00191
scoring_system epss
scoring_elements 0.41041
published_at 2026-04-07T12:55:00Z
4
value 0.00191
scoring_system epss
scoring_elements 0.4109
published_at 2026-04-08T12:55:00Z
5
value 0.00191
scoring_system epss
scoring_elements 0.41097
published_at 2026-04-09T12:55:00Z
6
value 0.00191
scoring_system epss
scoring_elements 0.41117
published_at 2026-04-11T12:55:00Z
7
value 0.00191
scoring_system epss
scoring_elements 0.41066
published_at 2026-04-13T12:55:00Z
8
value 0.00191
scoring_system epss
scoring_elements 0.41108
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30890
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30887
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30887
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30890
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30890
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2034389
reference_id 2034389
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2034389
6
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
7
reference_url https://access.redhat.com/errata/RHSA-2022:1777
reference_id RHSA-2022:1777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1777
8
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
9
reference_url https://usn.ubuntu.com/5213-1/
reference_id USN-5213-1
reference_type
scores
url https://usn.ubuntu.com/5213-1/
fixed_packages
aliases CVE-2021-30890
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j8rg-9sya-8qbm
18
url VCID-javw-gqjb-mfdt
vulnerability_id VCID-javw-gqjb-mfdt
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30849.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30849.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30849
reference_id
reference_type
scores
0
value 0.00257
scoring_system epss
scoring_elements 0.4898
published_at 2026-04-01T12:55:00Z
1
value 0.00257
scoring_system epss
scoring_elements 0.49089
published_at 2026-04-16T12:55:00Z
2
value 0.00257
scoring_system epss
scoring_elements 0.49048
published_at 2026-04-09T12:55:00Z
3
value 0.00257
scoring_system epss
scoring_elements 0.49065
published_at 2026-04-11T12:55:00Z
4
value 0.00257
scoring_system epss
scoring_elements 0.49038
published_at 2026-04-12T12:55:00Z
5
value 0.00257
scoring_system epss
scoring_elements 0.49016
published_at 2026-04-02T12:55:00Z
6
value 0.00257
scoring_system epss
scoring_elements 0.49044
published_at 2026-04-13T12:55:00Z
7
value 0.00257
scoring_system epss
scoring_elements 0.48997
published_at 2026-04-07T12:55:00Z
8
value 0.00257
scoring_system epss
scoring_elements 0.49051
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30849
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30809
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30809
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30836
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30848
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30848
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30849
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30849
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30858
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45482
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2017904
reference_id 2017904
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2017904
10
reference_url https://security.archlinux.org/AVG-2399
reference_id AVG-2399
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2399
11
reference_url https://security.archlinux.org/AVG-2400
reference_id AVG-2400
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2400
12
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
13
reference_url https://access.redhat.com/errata/RHSA-2022:1777
reference_id RHSA-2022:1777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1777
14
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2021-30849
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-javw-gqjb-mfdt
19
url VCID-jrd5-1g2p-gyg7
vulnerability_id VCID-jrd5-1g2p-gyg7
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30936.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30936.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30936
reference_id
reference_type
scores
0
value 0.00887
scoring_system epss
scoring_elements 0.75403
published_at 2026-04-01T12:55:00Z
1
value 0.00887
scoring_system epss
scoring_elements 0.75407
published_at 2026-04-02T12:55:00Z
2
value 0.00887
scoring_system epss
scoring_elements 0.75438
published_at 2026-04-04T12:55:00Z
3
value 0.00887
scoring_system epss
scoring_elements 0.75419
published_at 2026-04-07T12:55:00Z
4
value 0.00887
scoring_system epss
scoring_elements 0.75462
published_at 2026-04-08T12:55:00Z
5
value 0.00887
scoring_system epss
scoring_elements 0.75471
published_at 2026-04-09T12:55:00Z
6
value 0.00887
scoring_system epss
scoring_elements 0.75491
published_at 2026-04-11T12:55:00Z
7
value 0.00887
scoring_system epss
scoring_elements 0.75469
published_at 2026-04-12T12:55:00Z
8
value 0.00887
scoring_system epss
scoring_elements 0.75459
published_at 2026-04-13T12:55:00Z
9
value 0.00887
scoring_system epss
scoring_elements 0.75501
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30936
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2044528
reference_id 2044528
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2044528
13
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
14
reference_url https://access.redhat.com/errata/RHSA-2022:1777
reference_id RHSA-2022:1777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1777
15
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
16
reference_url https://usn.ubuntu.com/5255-1/
reference_id USN-5255-1
reference_type
scores
url https://usn.ubuntu.com/5255-1/
fixed_packages
aliases CVE-2021-30936
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jrd5-1g2p-gyg7
20
url VCID-m1q1-ma7s-63bd
vulnerability_id VCID-m1q1-ma7s-63bd
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30836.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30836.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30836
reference_id
reference_type
scores
0
value 0.00123
scoring_system epss
scoring_elements 0.31445
published_at 2026-04-01T12:55:00Z
1
value 0.00123
scoring_system epss
scoring_elements 0.3158
published_at 2026-04-02T12:55:00Z
2
value 0.00123
scoring_system epss
scoring_elements 0.31623
published_at 2026-04-04T12:55:00Z
3
value 0.00123
scoring_system epss
scoring_elements 0.31444
published_at 2026-04-07T12:55:00Z
4
value 0.00123
scoring_system epss
scoring_elements 0.31496
published_at 2026-04-08T12:55:00Z
5
value 0.00123
scoring_system epss
scoring_elements 0.31525
published_at 2026-04-09T12:55:00Z
6
value 0.00123
scoring_system epss
scoring_elements 0.3153
published_at 2026-04-11T12:55:00Z
7
value 0.00123
scoring_system epss
scoring_elements 0.31488
published_at 2026-04-12T12:55:00Z
8
value 0.00123
scoring_system epss
scoring_elements 0.31451
published_at 2026-04-13T12:55:00Z
9
value 0.00123
scoring_system epss
scoring_elements 0.31485
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30836
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30809
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30809
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30836
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30848
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30848
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30849
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30849
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30858
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45482
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2034376
reference_id 2034376
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2034376
10
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
11
reference_url https://access.redhat.com/errata/RHSA-2022:1777
reference_id RHSA-2022:1777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1777
12
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2021-30836
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m1q1-ma7s-63bd
21
url VCID-qf9z-ascr-cuf6
vulnerability_id VCID-qf9z-ascr-cuf6
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30954.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30954.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30954
reference_id
reference_type
scores
0
value 0.00321
scoring_system epss
scoring_elements 0.55039
published_at 2026-04-01T12:55:00Z
1
value 0.00321
scoring_system epss
scoring_elements 0.5514
published_at 2026-04-02T12:55:00Z
2
value 0.00321
scoring_system epss
scoring_elements 0.55164
published_at 2026-04-04T12:55:00Z
3
value 0.00321
scoring_system epss
scoring_elements 0.55139
published_at 2026-04-07T12:55:00Z
4
value 0.00321
scoring_system epss
scoring_elements 0.55188
published_at 2026-04-09T12:55:00Z
5
value 0.00321
scoring_system epss
scoring_elements 0.55199
published_at 2026-04-11T12:55:00Z
6
value 0.00321
scoring_system epss
scoring_elements 0.5518
published_at 2026-04-12T12:55:00Z
7
value 0.00321
scoring_system epss
scoring_elements 0.55162
published_at 2026-04-13T12:55:00Z
8
value 0.00321
scoring_system epss
scoring_elements 0.55201
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30954
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2044551
reference_id 2044551
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2044551
13
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
14
reference_url https://access.redhat.com/errata/RHSA-2022:1777
reference_id RHSA-2022:1777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1777
15
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
16
reference_url https://usn.ubuntu.com/5255-1/
reference_id USN-5255-1
reference_type
scores
url https://usn.ubuntu.com/5255-1/
fixed_packages
aliases CVE-2021-30954
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qf9z-ascr-cuf6
22
url VCID-r24t-dva3-kub8
vulnerability_id VCID-r24t-dva3-kub8
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22590.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22590.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-22590
reference_id
reference_type
scores
0
value 0.00401
scoring_system epss
scoring_elements 0.60724
published_at 2026-04-02T12:55:00Z
1
value 0.00401
scoring_system epss
scoring_elements 0.60754
published_at 2026-04-04T12:55:00Z
2
value 0.00401
scoring_system epss
scoring_elements 0.60719
published_at 2026-04-07T12:55:00Z
3
value 0.00401
scoring_system epss
scoring_elements 0.60768
published_at 2026-04-08T12:55:00Z
4
value 0.00401
scoring_system epss
scoring_elements 0.60783
published_at 2026-04-09T12:55:00Z
5
value 0.00401
scoring_system epss
scoring_elements 0.60805
published_at 2026-04-11T12:55:00Z
6
value 0.00401
scoring_system epss
scoring_elements 0.60791
published_at 2026-04-12T12:55:00Z
7
value 0.00401
scoring_system epss
scoring_elements 0.60772
published_at 2026-04-13T12:55:00Z
8
value 0.00401
scoring_system epss
scoring_elements 0.60814
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-22590
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22589
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22589
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22590
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22590
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22592
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22592
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22620
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2053181
reference_id 2053181
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2053181
8
reference_url https://security.gentoo.org/glsa/202208-39
reference_id GLSA-202208-39
reference_type
scores
url https://security.gentoo.org/glsa/202208-39
9
reference_url https://access.redhat.com/errata/RHSA-2022:1777
reference_id RHSA-2022:1777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1777
10
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
11
reference_url https://usn.ubuntu.com/5306-1/
reference_id USN-5306-1
reference_type
scores
url https://usn.ubuntu.com/5306-1/
fixed_packages
aliases CVE-2022-22590
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r24t-dva3-kub8
23
url VCID-sxja-mn3n-hkgt
vulnerability_id VCID-sxja-mn3n-hkgt
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30951.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30951.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30951
reference_id
reference_type
scores
0
value 0.00887
scoring_system epss
scoring_elements 0.75403
published_at 2026-04-01T12:55:00Z
1
value 0.00887
scoring_system epss
scoring_elements 0.75407
published_at 2026-04-02T12:55:00Z
2
value 0.00887
scoring_system epss
scoring_elements 0.75438
published_at 2026-04-04T12:55:00Z
3
value 0.00887
scoring_system epss
scoring_elements 0.75419
published_at 2026-04-07T12:55:00Z
4
value 0.00887
scoring_system epss
scoring_elements 0.75462
published_at 2026-04-08T12:55:00Z
5
value 0.00887
scoring_system epss
scoring_elements 0.75471
published_at 2026-04-09T12:55:00Z
6
value 0.00887
scoring_system epss
scoring_elements 0.75491
published_at 2026-04-11T12:55:00Z
7
value 0.00887
scoring_system epss
scoring_elements 0.75469
published_at 2026-04-12T12:55:00Z
8
value 0.00887
scoring_system epss
scoring_elements 0.75459
published_at 2026-04-13T12:55:00Z
9
value 0.00887
scoring_system epss
scoring_elements 0.75501
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30951
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2044534
reference_id 2044534
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2044534
13
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
14
reference_url https://access.redhat.com/errata/RHSA-2022:1777
reference_id RHSA-2022:1777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1777
15
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
16
reference_url https://usn.ubuntu.com/5255-1/
reference_id USN-5255-1
reference_type
scores
url https://usn.ubuntu.com/5255-1/
fixed_packages
aliases CVE-2021-30951
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sxja-mn3n-hkgt
24
url VCID-tc8n-sk6n-z7f3
vulnerability_id VCID-tc8n-sk6n-z7f3
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30818.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30818.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30818
reference_id
reference_type
scores
0
value 0.00433
scoring_system epss
scoring_elements 0.62605
published_at 2026-04-01T12:55:00Z
1
value 0.00433
scoring_system epss
scoring_elements 0.62663
published_at 2026-04-02T12:55:00Z
2
value 0.00433
scoring_system epss
scoring_elements 0.62695
published_at 2026-04-04T12:55:00Z
3
value 0.00433
scoring_system epss
scoring_elements 0.6266
published_at 2026-04-07T12:55:00Z
4
value 0.00433
scoring_system epss
scoring_elements 0.62712
published_at 2026-04-08T12:55:00Z
5
value 0.00433
scoring_system epss
scoring_elements 0.62728
published_at 2026-04-09T12:55:00Z
6
value 0.00433
scoring_system epss
scoring_elements 0.62747
published_at 2026-04-11T12:55:00Z
7
value 0.00433
scoring_system epss
scoring_elements 0.62736
published_at 2026-04-12T12:55:00Z
8
value 0.00433
scoring_system epss
scoring_elements 0.62713
published_at 2026-04-13T12:55:00Z
9
value 0.00433
scoring_system epss
scoring_elements 0.62752
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30818
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2034368
reference_id 2034368
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2034368
14
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
15
reference_url https://access.redhat.com/errata/RHSA-2022:1777
reference_id RHSA-2022:1777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1777
16
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2021-30818
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tc8n-sk6n-z7f3
25
url VCID-tyra-54yq-4ff6
vulnerability_id VCID-tyra-54yq-4ff6
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30823.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30823.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30823
reference_id
reference_type
scores
0
value 0.00173
scoring_system epss
scoring_elements 0.38602
published_at 2026-04-01T12:55:00Z
1
value 0.00173
scoring_system epss
scoring_elements 0.38731
published_at 2026-04-02T12:55:00Z
2
value 0.00173
scoring_system epss
scoring_elements 0.38753
published_at 2026-04-04T12:55:00Z
3
value 0.00173
scoring_system epss
scoring_elements 0.38682
published_at 2026-04-07T12:55:00Z
4
value 0.00173
scoring_system epss
scoring_elements 0.38733
published_at 2026-04-08T12:55:00Z
5
value 0.00173
scoring_system epss
scoring_elements 0.38743
published_at 2026-04-09T12:55:00Z
6
value 0.00173
scoring_system epss
scoring_elements 0.38754
published_at 2026-04-11T12:55:00Z
7
value 0.00173
scoring_system epss
scoring_elements 0.38717
published_at 2026-04-12T12:55:00Z
8
value 0.00173
scoring_system epss
scoring_elements 0.3869
published_at 2026-04-13T12:55:00Z
9
value 0.00173
scoring_system epss
scoring_elements 0.38738
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30823
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2034373
reference_id 2034373
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2034373
14
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
15
reference_url https://access.redhat.com/errata/RHSA-2022:1777
reference_id RHSA-2022:1777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1777
16
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2021-30823
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tyra-54yq-4ff6
26
url VCID-vy4b-6bqk-8ka1
vulnerability_id VCID-vy4b-6bqk-8ka1
summary webkitgtk: Incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45481.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45481.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-45481
reference_id
reference_type
scores
0
value 0.00028
scoring_system epss
scoring_elements 0.07937
published_at 2026-04-01T12:55:00Z
1
value 0.00028
scoring_system epss
scoring_elements 0.08036
published_at 2026-04-02T12:55:00Z
2
value 0.00028
scoring_system epss
scoring_elements 0.08079
published_at 2026-04-04T12:55:00Z
3
value 0.00028
scoring_system epss
scoring_elements 0.08042
published_at 2026-04-07T12:55:00Z
4
value 0.00028
scoring_system epss
scoring_elements 0.08102
published_at 2026-04-08T12:55:00Z
5
value 0.00028
scoring_system epss
scoring_elements 0.08124
published_at 2026-04-09T12:55:00Z
6
value 0.00028
scoring_system epss
scoring_elements 0.08115
published_at 2026-04-11T12:55:00Z
7
value 0.00028
scoring_system epss
scoring_elements 0.08095
published_at 2026-04-12T12:55:00Z
8
value 0.00028
scoring_system epss
scoring_elements 0.08078
published_at 2026-04-13T12:55:00Z
9
value 0.00028
scoring_system epss
scoring_elements 0.07984
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-45481
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2040327
reference_id 2040327
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2040327
13
reference_url https://access.redhat.com/errata/RHSA-2022:1777
reference_id RHSA-2022:1777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1777
14
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2021-45481
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vy4b-6bqk-8ka1
27
url VCID-wht8-k729-nyh9
vulnerability_id VCID-wht8-k729-nyh9
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22592.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22592.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-22592
reference_id
reference_type
scores
0
value 0.00178
scoring_system epss
scoring_elements 0.39394
published_at 2026-04-02T12:55:00Z
1
value 0.00178
scoring_system epss
scoring_elements 0.39417
published_at 2026-04-04T12:55:00Z
2
value 0.00178
scoring_system epss
scoring_elements 0.39332
published_at 2026-04-07T12:55:00Z
3
value 0.00178
scoring_system epss
scoring_elements 0.39387
published_at 2026-04-08T12:55:00Z
4
value 0.00178
scoring_system epss
scoring_elements 0.39404
published_at 2026-04-09T12:55:00Z
5
value 0.00178
scoring_system epss
scoring_elements 0.39415
published_at 2026-04-11T12:55:00Z
6
value 0.00178
scoring_system epss
scoring_elements 0.39376
published_at 2026-04-12T12:55:00Z
7
value 0.00178
scoring_system epss
scoring_elements 0.39357
published_at 2026-04-13T12:55:00Z
8
value 0.00178
scoring_system epss
scoring_elements 0.3941
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-22592
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22589
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22589
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22590
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22590
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22592
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22592
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22620
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2053185
reference_id 2053185
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2053185
8
reference_url https://security.gentoo.org/glsa/202208-39
reference_id GLSA-202208-39
reference_type
scores
url https://security.gentoo.org/glsa/202208-39
9
reference_url https://access.redhat.com/errata/RHSA-2022:1777
reference_id RHSA-2022:1777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1777
10
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
11
reference_url https://usn.ubuntu.com/5306-1/
reference_id USN-5306-1
reference_type
scores
url https://usn.ubuntu.com/5306-1/
fixed_packages
aliases CVE-2022-22592
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wht8-k729-nyh9
28
url VCID-wpw7-2u4z-muey
vulnerability_id VCID-wpw7-2u4z-muey
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30884.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30884.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30884
reference_id
reference_type
scores
0
value 0.00165
scoring_system epss
scoring_elements 0.37518
published_at 2026-04-01T12:55:00Z
1
value 0.00165
scoring_system epss
scoring_elements 0.377
published_at 2026-04-02T12:55:00Z
2
value 0.00165
scoring_system epss
scoring_elements 0.37725
published_at 2026-04-04T12:55:00Z
3
value 0.00165
scoring_system epss
scoring_elements 0.37603
published_at 2026-04-07T12:55:00Z
4
value 0.00165
scoring_system epss
scoring_elements 0.37654
published_at 2026-04-08T12:55:00Z
5
value 0.00165
scoring_system epss
scoring_elements 0.37668
published_at 2026-04-09T12:55:00Z
6
value 0.00165
scoring_system epss
scoring_elements 0.37682
published_at 2026-04-11T12:55:00Z
7
value 0.00165
scoring_system epss
scoring_elements 0.37647
published_at 2026-04-12T12:55:00Z
8
value 0.00165
scoring_system epss
scoring_elements 0.3762
published_at 2026-04-13T12:55:00Z
9
value 0.00165
scoring_system epss
scoring_elements 0.37666
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30884
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2034378
reference_id 2034378
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2034378
14
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
15
reference_url https://access.redhat.com/errata/RHSA-2022:1777
reference_id RHSA-2022:1777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1777
16
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2021-30884
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wpw7-2u4z-muey
29
url VCID-xq1c-h5v5-77bs
vulnerability_id VCID-xq1c-h5v5-77bs
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30952.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30952.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30952
reference_id
reference_type
scores
0
value 0.01244
scoring_system epss
scoring_elements 0.79278
published_at 2026-04-13T12:55:00Z
1
value 0.01244
scoring_system epss
scoring_elements 0.79305
published_at 2026-04-16T12:55:00Z
2
value 0.01244
scoring_system epss
scoring_elements 0.79289
published_at 2026-04-12T12:55:00Z
3
value 0.01279
scoring_system epss
scoring_elements 0.79547
published_at 2026-04-04T12:55:00Z
4
value 0.01279
scoring_system epss
scoring_elements 0.79525
published_at 2026-04-02T12:55:00Z
5
value 0.01279
scoring_system epss
scoring_elements 0.79563
published_at 2026-04-08T12:55:00Z
6
value 0.01279
scoring_system epss
scoring_elements 0.79535
published_at 2026-04-07T12:55:00Z
7
value 0.01279
scoring_system epss
scoring_elements 0.79519
published_at 2026-04-01T12:55:00Z
8
value 0.01279
scoring_system epss
scoring_elements 0.7957
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30952
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url http://www.openwall.com/lists/oss-security/2022/01/21/2
reference_id 2
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-05T19:17:22Z/
url http://www.openwall.com/lists/oss-security/2022/01/21/2
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2044538
reference_id 2044538
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2044538
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7EQVZ3CEMTINLBZ7PBC7WRXVEVCRHNSM/
reference_id 7EQVZ3CEMTINLBZ7PBC7WRXVEVCRHNSM
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-05T19:17:22Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7EQVZ3CEMTINLBZ7PBC7WRXVEVCRHNSM/
15
reference_url https://www.debian.org/security/2022/dsa-5060
reference_id dsa-5060
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-05T19:17:22Z/
url https://www.debian.org/security/2022/dsa-5060
16
reference_url https://www.debian.org/security/2022/dsa-5061
reference_id dsa-5061
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-05T19:17:22Z/
url https://www.debian.org/security/2022/dsa-5061
17
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
18
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HQKWD4BXRDD2YGR5AVU7H5J5PIQIEU6V/
reference_id HQKWD4BXRDD2YGR5AVU7H5J5PIQIEU6V
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-05T19:17:22Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HQKWD4BXRDD2YGR5AVU7H5J5PIQIEU6V/
19
reference_url https://support.apple.com/en-us/HT212975
reference_id HT212975
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-05T19:17:22Z/
url https://support.apple.com/en-us/HT212975
20
reference_url https://support.apple.com/en-us/HT212976
reference_id HT212976
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-05T19:17:22Z/
url https://support.apple.com/en-us/HT212976
21
reference_url https://support.apple.com/en-us/HT212978
reference_id HT212978
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-05T19:17:22Z/
url https://support.apple.com/en-us/HT212978
22
reference_url https://support.apple.com/en-us/HT212980
reference_id HT212980
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-05T19:17:22Z/
url https://support.apple.com/en-us/HT212980
23
reference_url https://support.apple.com/en-us/HT212982
reference_id HT212982
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-05T19:17:22Z/
url https://support.apple.com/en-us/HT212982
24
reference_url https://access.redhat.com/errata/RHSA-2022:1777
reference_id RHSA-2022:1777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1777
25
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
26
reference_url https://usn.ubuntu.com/5255-1/
reference_id USN-5255-1
reference_type
scores
url https://usn.ubuntu.com/5255-1/
fixed_packages
aliases CVE-2021-30952
risk_score 10.0
exploitability 2.0
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xq1c-h5v5-77bs
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/webkit2gtk3@2.34.6-1%3Farch=el8