Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-t3ek-dz66-4khy
SummaryA vulnerability has been discovered in Poppler which could allow for arbitrary code execution.
Aliases
0
alias CVE-2021-30860
Fixed_packages
0
url pkg:ebuild/app-text/poppler@22.09.0
purl pkg:ebuild/app-text/poppler@22.09.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/poppler@22.09.0
Affected_packages
References
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30860
reference_id
reference_type
scores
0
value 0.70642
scoring_system epss
scoring_elements 0.98683
published_at 2026-04-01T12:55:00Z
1
value 0.70642
scoring_system epss
scoring_elements 0.98684
published_at 2026-04-02T12:55:00Z
2
value 0.70642
scoring_system epss
scoring_elements 0.98699
published_at 2026-04-18T12:55:00Z
3
value 0.70642
scoring_system epss
scoring_elements 0.98698
published_at 2026-04-16T12:55:00Z
4
value 0.70642
scoring_system epss
scoring_elements 0.98695
published_at 2026-04-13T12:55:00Z
5
value 0.70642
scoring_system epss
scoring_elements 0.98694
published_at 2026-04-12T12:55:00Z
6
value 0.70642
scoring_system epss
scoring_elements 0.98691
published_at 2026-04-09T12:55:00Z
7
value 0.70642
scoring_system epss
scoring_elements 0.9869
published_at 2026-04-07T12:55:00Z
8
value 0.70642
scoring_system epss
scoring_elements 0.98687
published_at 2026-04-04T12:55:00Z
9
value 0.71055
scoring_system epss
scoring_elements 0.9871
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30860
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url http://www.openwall.com/lists/oss-security/2022/09/02/11
reference_id 11
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-05T18:40:44Z/
url http://www.openwall.com/lists/oss-security/2022/09/02/11
3
reference_url http://seclists.org/fulldisclosure/2021/Sep/25
reference_id 25
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-05T18:40:44Z/
url http://seclists.org/fulldisclosure/2021/Sep/25
4
reference_url http://seclists.org/fulldisclosure/2021/Sep/26
reference_id 26
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-05T18:40:44Z/
url http://seclists.org/fulldisclosure/2021/Sep/26
5
reference_url http://seclists.org/fulldisclosure/2021/Sep/27
reference_id 27
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-05T18:40:44Z/
url http://seclists.org/fulldisclosure/2021/Sep/27
6
reference_url http://seclists.org/fulldisclosure/2021/Sep/28
reference_id 28
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-05T18:40:44Z/
url http://seclists.org/fulldisclosure/2021/Sep/28
7
reference_url http://seclists.org/fulldisclosure/2021/Sep/38
reference_id 38
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-05T18:40:44Z/
url http://seclists.org/fulldisclosure/2021/Sep/38
8
reference_url http://seclists.org/fulldisclosure/2021/Sep/39
reference_id 39
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-05T18:40:44Z/
url http://seclists.org/fulldisclosure/2021/Sep/39
9
reference_url http://seclists.org/fulldisclosure/2021/Sep/40
reference_id 40
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-05T18:40:44Z/
url http://seclists.org/fulldisclosure/2021/Sep/40
10
reference_url http://seclists.org/fulldisclosure/2021/Sep/50
reference_id 50
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-05T18:40:44Z/
url http://seclists.org/fulldisclosure/2021/Sep/50
11
reference_url https://security.gentoo.org/glsa/202209-21
reference_id GLSA-202209-21
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-05T18:40:44Z/
url https://security.gentoo.org/glsa/202209-21
12
reference_url https://support.apple.com/en-us/HT212804
reference_id HT212804
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-05T18:40:44Z/
url https://support.apple.com/en-us/HT212804
13
reference_url https://support.apple.com/en-us/HT212805
reference_id HT212805
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-05T18:40:44Z/
url https://support.apple.com/en-us/HT212805
14
reference_url https://support.apple.com/en-us/HT212806
reference_id HT212806
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-05T18:40:44Z/
url https://support.apple.com/en-us/HT212806
15
reference_url https://support.apple.com/en-us/HT212807
reference_id HT212807
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-05T18:40:44Z/
url https://support.apple.com/en-us/HT212807
16
reference_url https://support.apple.com/kb/HT212824
reference_id HT212824
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-05T18:40:44Z/
url https://support.apple.com/kb/HT212824
Weaknesses
Exploits
0
date_added 2021-11-03
description Apple iOS, iPadOS, macOS, and watchOS CoreGraphics contain an integer overflow vulnerability which may allow code execution when processing a maliciously crafted PDF. The vulnerability is also known under the moniker of FORCEDENTRY.
required_action Apply updates per vendor instructions.
due_date 2021-11-17
notes https://nvd.nist.gov/vuln/detail/CVE-2021-30860
known_ransomware_campaign_use false
source_date_published null
exploit_type null
platform null
source_date_updated null
data_source KEV
source_url null
Severity_range_score7.8 - 7.8
Exploitabilitynull
Weighted_severitynull
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-t3ek-dz66-4khy