{"url":"http://public2.vulnerablecode.io/api/packages/100209?format=json","purl":"pkg:rpm/redhat/webkit2gtk3@2.32.3-2?arch=el8","type":"rpm","namespace":"redhat","name":"webkit2gtk3","version":"2.32.3-2","qualifiers":{"arch":"el8"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59500?format=json","vulnerability_id":"VCID-3ghs-su4t-cqg7","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30744.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30744.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30744","reference_id":"","reference_type":"","scores":[{"value":"0.0061","scoring_system":"epss","scoring_elements":"0.69685","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0061","scoring_system":"epss","scoring_elements":"0.69938","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0061","scoring_system":"epss","scoring_elements":"0.69861","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0061","scoring_system":"epss","scoring_elements":"0.69888","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0061","scoring_system":"epss","scoring_elements":"0.69697","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0061","scoring_system":"epss","scoring_elements":"0.69713","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0061","scoring_system":"epss","scoring_elements":"0.6969","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0061","scoring_system":"epss","scoring_elements":"0.69738","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0061","scoring_system":"epss","scoring_elements":"0.69755","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0061","scoring_system":"epss","scoring_elements":"0.69776","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0061","scoring_system":"epss","scoring_elements":"0.69761","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0061","scoring_system":"epss","scoring_elements":"0.69747","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0061","scoring_system":"epss","scoring_elements":"0.69788","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0061","scoring_system":"epss","scoring_elements":"0.69798","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0061","scoring_system":"epss","scoring_elements":"0.69779","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0061","scoring_system":"epss","scoring_elements":"0.6983","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0061","scoring_system":"epss","scoring_elements":"0.69839","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0061","scoring_system":"epss","scoring_elements":"0.69843","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0061","scoring_system":"epss","scoring_elements":"0.69818","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0061","scoring_system":"epss","scoring_elements":"0.69862","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0061","scoring_system":"epss","scoring_elements":"0.69892","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986888","reference_id":"1986888","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986888"},{"reference_url":"https://security.archlinux.org/ASA-202107-67","reference_id":"ASA-202107-67","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-67"},{"reference_url":"https://security.archlinux.org/ASA-202107-68","reference_id":"ASA-202107-68","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-68"},{"reference_url":"https://security.archlinux.org/AVG-2220","reference_id":"AVG-2220","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2220"},{"reference_url":"https://security.archlinux.org/AVG-2221","reference_id":"AVG-2221","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2221"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4381","reference_id":"RHSA-2021:4381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5024-1/","reference_id":"USN-5024-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5024-1/"}],"fixed_packages":[],"aliases":["CVE-2021-30744"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3ghs-su4t-cqg7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41467?format=json","vulnerability_id":"VCID-3udf-shtq-g7br","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst\n    of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1799.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1799.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-1799","reference_id":"","reference_type":"","scores":[{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.31983","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.31522","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.31521","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.3143","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.31453","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.32111","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.3215","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.31973","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.32024","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.32053","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.32057","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.32018","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.31984","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.32017","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.31994","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.31968","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.318","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.31673","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.31591","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.31438","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.31511","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-1799"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27918","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27918"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29623","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1765","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1765"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1789","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1789"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1799","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1799"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1801","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1801"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1870","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1870"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21806"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1944340","reference_id":"1944340","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1944340"},{"reference_url":"https://security.archlinux.org/ASA-202103-24","reference_id":"ASA-202103-24","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202103-24"},{"reference_url":"https://security.archlinux.org/ASA-202103-25","reference_id":"ASA-202103-25","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202103-25"},{"reference_url":"https://security.archlinux.org/AVG-1721","reference_id":"AVG-1721","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1721"},{"reference_url":"https://security.archlinux.org/AVG-1722","reference_id":"AVG-1722","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1722"},{"reference_url":"https://security.gentoo.org/glsa/202104-03","reference_id":"GLSA-202104-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202104-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4381","reference_id":"RHSA-2021:4381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/4894-1/","reference_id":"USN-4894-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4894-1/"}],"fixed_packages":[],"aliases":["CVE-2021-1799"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3udf-shtq-g7br"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59505?format=json","vulnerability_id":"VCID-4dcz-sdeb-p7ar","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30795.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30795.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30795","reference_id":"","reference_type":"","scores":[{"value":"0.00914","scoring_system":"epss","scoring_elements":"0.75823","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00914","scoring_system":"epss","scoring_elements":"0.76077","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00914","scoring_system":"epss","scoring_elements":"0.76013","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00914","scoring_system":"epss","scoring_elements":"0.76028","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00914","scoring_system":"epss","scoring_elements":"0.75826","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00914","scoring_system":"epss","scoring_elements":"0.75859","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00914","scoring_system":"epss","scoring_elements":"0.75837","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00914","scoring_system":"epss","scoring_elements":"0.7587","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00914","scoring_system":"epss","scoring_elements":"0.75883","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00914","scoring_system":"epss","scoring_elements":"0.75906","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00914","scoring_system":"epss","scoring_elements":"0.75888","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00914","scoring_system":"epss","scoring_elements":"0.75881","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00914","scoring_system":"epss","scoring_elements":"0.75919","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00914","scoring_system":"epss","scoring_elements":"0.75922","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00914","scoring_system":"epss","scoring_elements":"0.75909","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00914","scoring_system":"epss","scoring_elements":"0.75946","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00914","scoring_system":"epss","scoring_elements":"0.75956","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00914","scoring_system":"epss","scoring_elements":"0.75966","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00914","scoring_system":"epss","scoring_elements":"0.75976","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00914","scoring_system":"epss","scoring_elements":"0.76005","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00914","scoring_system":"epss","scoring_elements":"0.76029","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30795"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986900","reference_id":"1986900","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986900"},{"reference_url":"https://security.archlinux.org/ASA-202107-67","reference_id":"ASA-202107-67","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-67"},{"reference_url":"https://security.archlinux.org/ASA-202107-68","reference_id":"ASA-202107-68","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-68"},{"reference_url":"https://security.archlinux.org/AVG-2220","reference_id":"AVG-2220","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2220"},{"reference_url":"https://security.archlinux.org/AVG-2221","reference_id":"AVG-2221","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2221"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4381","reference_id":"RHSA-2021:4381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5024-1/","reference_id":"USN-5024-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5024-1/"}],"fixed_packages":[],"aliases":["CVE-2021-30795"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4dcz-sdeb-p7ar"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59494?format=json","vulnerability_id":"VCID-4fv8-5wm3-byf9","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30665.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30665.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30665","reference_id":"","reference_type":"","scores":[{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68394","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.6824","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68251","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68231","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68273","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68281","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68286","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.6826","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68305","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68343","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68307","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68334","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69615","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69627","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69643","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69622","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69673","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.6969","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69712","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69698","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69684","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30665"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986874","reference_id":"1986874","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986874"},{"reference_url":"https://security.archlinux.org/ASA-202107-67","reference_id":"ASA-202107-67","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-67"},{"reference_url":"https://security.archlinux.org/ASA-202107-68","reference_id":"ASA-202107-68","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-68"},{"reference_url":"https://security.archlinux.org/AVG-2220","reference_id":"AVG-2220","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2220"},{"reference_url":"https://security.archlinux.org/AVG-2221","reference_id":"AVG-2221","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2221"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://support.apple.com/en-us/HT212335","reference_id":"HT212335","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:26:21Z/"}],"url":"https://support.apple.com/en-us/HT212335"},{"reference_url":"https://support.apple.com/en-us/HT212336","reference_id":"HT212336","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:26:21Z/"}],"url":"https://support.apple.com/en-us/HT212336"},{"reference_url":"https://support.apple.com/en-us/HT212339","reference_id":"HT212339","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:26:21Z/"}],"url":"https://support.apple.com/en-us/HT212339"},{"reference_url":"https://support.apple.com/en-us/HT212341","reference_id":"HT212341","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:26:21Z/"}],"url":"https://support.apple.com/en-us/HT212341"},{"reference_url":"https://support.apple.com/en-us/HT212532","reference_id":"HT212532","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:26:21Z/"}],"url":"https://support.apple.com/en-us/HT212532"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4381","reference_id":"RHSA-2021:4381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5024-1/","reference_id":"USN-5024-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5024-1/"}],"fixed_packages":[],"aliases":["CVE-2021-30665"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4fv8-5wm3-byf9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59507?format=json","vulnerability_id":"VCID-67td-2hu4-eqdp","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30799.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30799.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30799","reference_id":"","reference_type":"","scores":[{"value":"0.01008","scoring_system":"epss","scoring_elements":"0.77006","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01008","scoring_system":"epss","scoring_elements":"0.77266","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01008","scoring_system":"epss","scoring_elements":"0.77202","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01008","scoring_system":"epss","scoring_elements":"0.77218","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01008","scoring_system":"epss","scoring_elements":"0.77012","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01008","scoring_system":"epss","scoring_elements":"0.77041","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01008","scoring_system":"epss","scoring_elements":"0.77021","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01008","scoring_system":"epss","scoring_elements":"0.77053","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01008","scoring_system":"epss","scoring_elements":"0.77064","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01008","scoring_system":"epss","scoring_elements":"0.77092","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01008","scoring_system":"epss","scoring_elements":"0.77072","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01008","scoring_system":"epss","scoring_elements":"0.77067","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01008","scoring_system":"epss","scoring_elements":"0.77109","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01008","scoring_system":"epss","scoring_elements":"0.7711","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01008","scoring_system":"epss","scoring_elements":"0.77101","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01008","scoring_system":"epss","scoring_elements":"0.77135","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01008","scoring_system":"epss","scoring_elements":"0.77142","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01008","scoring_system":"epss","scoring_elements":"0.77156","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01008","scoring_system":"epss","scoring_elements":"0.77164","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01008","scoring_system":"epss","scoring_elements":"0.77193","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01008","scoring_system":"epss","scoring_elements":"0.77214","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30799"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986906","reference_id":"1986906","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986906"},{"reference_url":"https://security.archlinux.org/ASA-202107-67","reference_id":"ASA-202107-67","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-67"},{"reference_url":"https://security.archlinux.org/ASA-202107-68","reference_id":"ASA-202107-68","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-68"},{"reference_url":"https://security.archlinux.org/AVG-2220","reference_id":"AVG-2220","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2220"},{"reference_url":"https://security.archlinux.org/AVG-2221","reference_id":"AVG-2221","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2221"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4381","reference_id":"RHSA-2021:4381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5024-1/","reference_id":"USN-5024-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5024-1/"}],"fixed_packages":[],"aliases":["CVE-2021-30799"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-67td-2hu4-eqdp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59502?format=json","vulnerability_id":"VCID-7cef-namz-wkec","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30758.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30758.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30758","reference_id":"","reference_type":"","scores":[{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.5702","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.57167","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.57079","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.57104","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.57115","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.57137","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.57113","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.57164","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.57166","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.57178","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.57157","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.57165","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.57161","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.5714","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.57071","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.5709","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.57072","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.57022","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.57068","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.57131","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30758"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986892","reference_id":"1986892","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986892"},{"reference_url":"https://security.archlinux.org/AVG-2218","reference_id":"AVG-2218","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2218"},{"reference_url":"https://security.archlinux.org/AVG-2219","reference_id":"AVG-2219","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2219"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4381","reference_id":"RHSA-2021:4381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5024-1/","reference_id":"USN-5024-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5024-1/"}],"fixed_packages":[],"aliases":["CVE-2021-30758"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7cef-namz-wkec"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59490?format=json","vulnerability_id":"VCID-7gbc-786y-hyc8","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21779.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21779.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-21779","reference_id":"","reference_type":"","scores":[{"value":"0.00508","scoring_system":"epss","scoring_elements":"0.66233","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00508","scoring_system":"epss","scoring_elements":"0.66499","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00508","scoring_system":"epss","scoring_elements":"0.66445","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00508","scoring_system":"epss","scoring_elements":"0.66417","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00508","scoring_system":"epss","scoring_elements":"0.66439","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00508","scoring_system":"epss","scoring_elements":"0.66273","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00508","scoring_system":"epss","scoring_elements":"0.66299","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00508","scoring_system":"epss","scoring_elements":"0.66269","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00508","scoring_system":"epss","scoring_elements":"0.66317","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00508","scoring_system":"epss","scoring_elements":"0.6633","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00508","scoring_system":"epss","scoring_elements":"0.6635","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00508","scoring_system":"epss","scoring_elements":"0.66337","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00508","scoring_system":"epss","scoring_elements":"0.66306","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00508","scoring_system":"epss","scoring_elements":"0.66341","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00508","scoring_system":"epss","scoring_elements":"0.66357","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00508","scoring_system":"epss","scoring_elements":"0.66342","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00508","scoring_system":"epss","scoring_elements":"0.66365","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00508","scoring_system":"epss","scoring_elements":"0.66379","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00508","scoring_system":"epss","scoring_elements":"0.66356","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00508","scoring_system":"epss","scoring_elements":"0.664","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-21779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986866","reference_id":"1986866","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986866"},{"reference_url":"https://security.archlinux.org/ASA-202107-67","reference_id":"ASA-202107-67","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-67"},{"reference_url":"https://security.archlinux.org/ASA-202107-68","reference_id":"ASA-202107-68","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-68"},{"reference_url":"https://security.archlinux.org/AVG-2220","reference_id":"AVG-2220","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2220"},{"reference_url":"https://security.archlinux.org/AVG-2221","reference_id":"AVG-2221","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2221"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4381","reference_id":"RHSA-2021:4381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5024-1/","reference_id":"USN-5024-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5024-1/"}],"fixed_packages":[],"aliases":["CVE-2021-21779"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7gbc-786y-hyc8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59501?format=json","vulnerability_id":"VCID-835v-4yds-ebem","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30749.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30749.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30749","reference_id":"","reference_type":"","scores":[{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.79327","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.79565","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.79516","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.79514","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.79529","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.79333","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.79357","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.79343","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.79369","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.79378","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.79401","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.79386","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.79375","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.79407","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.79405","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.79408","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.79441","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.79446","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.79461","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.79476","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.79498","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986890","reference_id":"1986890","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986890"},{"reference_url":"https://security.archlinux.org/ASA-202107-67","reference_id":"ASA-202107-67","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-67"},{"reference_url":"https://security.archlinux.org/ASA-202107-68","reference_id":"ASA-202107-68","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-68"},{"reference_url":"https://security.archlinux.org/AVG-2220","reference_id":"AVG-2220","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2220"},{"reference_url":"https://security.archlinux.org/AVG-2221","reference_id":"AVG-2221","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2221"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4381","reference_id":"RHSA-2021:4381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5024-1/","reference_id":"USN-5024-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5024-1/"}],"fixed_packages":[],"aliases":["CVE-2021-30749"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-835v-4yds-ebem"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59498?format=json","vulnerability_id":"VCID-8y8h-r2c8-hudj","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30720.json","reference_id":"","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30720.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30720","reference_id":"","reference_type":"","scores":[{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59508","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59745","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59648","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59676","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59581","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59606","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59576","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59627","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59639","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59659","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59642","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59623","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59656","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59663","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59647","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59617","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59637","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59584","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59632","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59691","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30720"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986883","reference_id":"1986883","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986883"},{"reference_url":"https://security.archlinux.org/ASA-202107-67","reference_id":"ASA-202107-67","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-67"},{"reference_url":"https://security.archlinux.org/ASA-202107-68","reference_id":"ASA-202107-68","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-68"},{"reference_url":"https://security.archlinux.org/AVG-2220","reference_id":"AVG-2220","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2220"},{"reference_url":"https://security.archlinux.org/AVG-2221","reference_id":"AVG-2221","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2221"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4381","reference_id":"RHSA-2021:4381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5024-1/","reference_id":"USN-5024-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5024-1/"}],"fixed_packages":[],"aliases":["CVE-2021-30720"],"risk_score":4.2,"exploitability":"0.5","weighted_severity":"8.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8y8h-r2c8-hudj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41460?format=json","vulnerability_id":"VCID-96uu-rhdj-ebbq","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst\n    of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27918.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27918.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-27918","reference_id":"","reference_type":"","scores":[{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46183","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46223","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46181","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46121","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.4615","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46225","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46244","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46192","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46248","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.4625","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46273","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46245","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46254","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46311","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46307","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46251","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46233","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46189","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46096","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46161","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-27918"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27918","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27918"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29623","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1765","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1765"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1789","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1789"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1799","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1799"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1801","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1801"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1870","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1870"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21806"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1944323","reference_id":"1944323","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1944323"},{"reference_url":"https://security.archlinux.org/ASA-202103-24","reference_id":"ASA-202103-24","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202103-24"},{"reference_url":"https://security.archlinux.org/ASA-202103-25","reference_id":"ASA-202103-25","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202103-25"},{"reference_url":"https://security.archlinux.org/AVG-1721","reference_id":"AVG-1721","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1721"},{"reference_url":"https://security.archlinux.org/AVG-1722","reference_id":"AVG-1722","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1722"},{"reference_url":"https://security.gentoo.org/glsa/202104-03","reference_id":"GLSA-202104-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202104-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4381","reference_id":"RHSA-2021:4381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/4894-1/","reference_id":"USN-4894-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4894-1/"}],"fixed_packages":[],"aliases":["CVE-2020-27918"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-96uu-rhdj-ebbq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59491?format=json","vulnerability_id":"VCID-afqa-zafe-cqhn","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21806.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21806.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-21806","reference_id":"","reference_type":"","scores":[{"value":"0.02072","scoring_system":"epss","scoring_elements":"0.83883","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02072","scoring_system":"epss","scoring_elements":"0.84126","published_at":"2026-05-14T12:55:00Z"},{"value":"0.02072","scoring_system":"epss","scoring_elements":"0.84077","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02072","scoring_system":"epss","scoring_elements":"0.84076","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02072","scoring_system":"epss","scoring_elements":"0.84093","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02072","scoring_system":"epss","scoring_elements":"0.83897","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02072","scoring_system":"epss","scoring_elements":"0.83913","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02072","scoring_system":"epss","scoring_elements":"0.83916","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02072","scoring_system":"epss","scoring_elements":"0.8394","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02072","scoring_system":"epss","scoring_elements":"0.83946","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02072","scoring_system":"epss","scoring_elements":"0.83962","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02072","scoring_system":"epss","scoring_elements":"0.83956","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02072","scoring_system":"epss","scoring_elements":"0.83952","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02072","scoring_system":"epss","scoring_elements":"0.83976","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02072","scoring_system":"epss","scoring_elements":"0.83978","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02072","scoring_system":"epss","scoring_elements":"0.84004","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02072","scoring_system":"epss","scoring_elements":"0.84012","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02072","scoring_system":"epss","scoring_elements":"0.84017","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02072","scoring_system":"epss","scoring_elements":"0.84038","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02072","scoring_system":"epss","scoring_elements":"0.84061","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-21806"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27918","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27918"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29623","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1765","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1765"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1789","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1789"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1799","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1799"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1801","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1801"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1870","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1870"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21806"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1980441","reference_id":"1980441","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1980441"},{"reference_url":"https://security.archlinux.org/AVG-2214","reference_id":"AVG-2214","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2214"},{"reference_url":"https://security.archlinux.org/AVG-2215","reference_id":"AVG-2215","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2215"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4381","reference_id":"RHSA-2021:4381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2021-21806"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-afqa-zafe-cqhn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41464?format=json","vulnerability_id":"VCID-e1rg-8a3d-z7a5","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst\n    of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1765.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1765.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-1765","reference_id":"","reference_type":"","scores":[{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24197","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24065","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24013","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.23957","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.23978","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24326","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24359","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24142","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24208","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24251","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24267","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24224","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24167","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24183","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.2417","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24147","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24023","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24011","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.23971","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.23861","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.23944","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-1765"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27918","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27918"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29623","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1765","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1765"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1789","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1789"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1799","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1799"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1801","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1801"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1870","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1870"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21806"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1944333","reference_id":"1944333","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1944333"},{"reference_url":"https://security.archlinux.org/ASA-202103-24","reference_id":"ASA-202103-24","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202103-24"},{"reference_url":"https://security.archlinux.org/ASA-202103-25","reference_id":"ASA-202103-25","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202103-25"},{"reference_url":"https://security.archlinux.org/AVG-1721","reference_id":"AVG-1721","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1721"},{"reference_url":"https://security.archlinux.org/AVG-1722","reference_id":"AVG-1722","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1722"},{"reference_url":"https://security.gentoo.org/glsa/202104-03","reference_id":"GLSA-202104-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202104-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4381","reference_id":"RHSA-2021:4381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/4894-1/","reference_id":"USN-4894-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4894-1/"}],"fixed_packages":[],"aliases":["CVE-2021-1765"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e1rg-8a3d-z7a5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59506?format=json","vulnerability_id":"VCID-feqc-qs1m-ube7","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30797.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30797.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30797","reference_id":"","reference_type":"","scores":[{"value":"0.00672","scoring_system":"epss","scoring_elements":"0.7132","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00672","scoring_system":"epss","scoring_elements":"0.7157","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00672","scoring_system":"epss","scoring_elements":"0.71518","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00672","scoring_system":"epss","scoring_elements":"0.71513","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00672","scoring_system":"epss","scoring_elements":"0.71328","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00672","scoring_system":"epss","scoring_elements":"0.71346","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00672","scoring_system":"epss","scoring_elements":"0.71361","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00672","scoring_system":"epss","scoring_elements":"0.71374","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00672","scoring_system":"epss","scoring_elements":"0.71397","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00672","scoring_system":"epss","scoring_elements":"0.71381","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00672","scoring_system":"epss","scoring_elements":"0.71364","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00672","scoring_system":"epss","scoring_elements":"0.7141","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00672","scoring_system":"epss","scoring_elements":"0.71416","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00672","scoring_system":"epss","scoring_elements":"0.71396","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00672","scoring_system":"epss","scoring_elements":"0.71448","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00672","scoring_system":"epss","scoring_elements":"0.71456","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00672","scoring_system":"epss","scoring_elements":"0.7146","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00672","scoring_system":"epss","scoring_elements":"0.71447","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00672","scoring_system":"epss","scoring_elements":"0.71483","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986902","reference_id":"1986902","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986902"},{"reference_url":"https://security.archlinux.org/ASA-202107-67","reference_id":"ASA-202107-67","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-67"},{"reference_url":"https://security.archlinux.org/ASA-202107-68","reference_id":"ASA-202107-68","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-68"},{"reference_url":"https://security.archlinux.org/AVG-2220","reference_id":"AVG-2220","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2220"},{"reference_url":"https://security.archlinux.org/AVG-2221","reference_id":"AVG-2221","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2221"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4381","reference_id":"RHSA-2021:4381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5024-1/","reference_id":"USN-5024-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5024-1/"}],"fixed_packages":[],"aliases":["CVE-2021-30797"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-feqc-qs1m-ube7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41461?format=json","vulnerability_id":"VCID-hgwz-tyjg-r7h8","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst\n    of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-29623.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-29623.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-29623","reference_id":"","reference_type":"","scores":[{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09361","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09653","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09578","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.0956","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09592","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09362","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09412","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09323","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09397","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09445","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09458","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09431","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09416","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09309","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09311","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09512","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09478","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09439","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.0935","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09507","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-29623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27918","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27918"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29623","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1765","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1765"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1789","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1789"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1799","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1799"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1801","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1801"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1870","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1870"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21806"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1944329","reference_id":"1944329","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1944329"},{"reference_url":"https://security.archlinux.org/ASA-202103-24","reference_id":"ASA-202103-24","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202103-24"},{"reference_url":"https://security.archlinux.org/ASA-202103-25","reference_id":"ASA-202103-25","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202103-25"},{"reference_url":"https://security.archlinux.org/AVG-1721","reference_id":"AVG-1721","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1721"},{"reference_url":"https://security.archlinux.org/AVG-1722","reference_id":"AVG-1722","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1722"},{"reference_url":"https://security.gentoo.org/glsa/202104-03","reference_id":"GLSA-202104-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202104-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4381","reference_id":"RHSA-2021:4381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/4894-1/","reference_id":"USN-4894-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4894-1/"}],"fixed_packages":[],"aliases":["CVE-2020-29623"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hgwz-tyjg-r7h8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41469?format=json","vulnerability_id":"VCID-j6q2-urw5-nffz","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst\n    of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1870.json","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1870.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-1870","reference_id":"","reference_type":"","scores":[{"value":"0.01151","scoring_system":"epss","scoring_elements":"0.78442","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01151","scoring_system":"epss","scoring_elements":"0.7868","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01151","scoring_system":"epss","scoring_elements":"0.78519","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01151","scoring_system":"epss","scoring_elements":"0.785","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01151","scoring_system":"epss","scoring_elements":"0.78492","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01151","scoring_system":"epss","scoring_elements":"0.7852","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01151","scoring_system":"epss","scoring_elements":"0.78516","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01151","scoring_system":"epss","scoring_elements":"0.78549","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01151","scoring_system":"epss","scoring_elements":"0.78556","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01151","scoring_system":"epss","scoring_elements":"0.78572","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01151","scoring_system":"epss","scoring_elements":"0.78589","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01151","scoring_system":"epss","scoring_elements":"0.78614","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01151","scoring_system":"epss","scoring_elements":"0.78628","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01151","scoring_system":"epss","scoring_elements":"0.78625","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01151","scoring_system":"epss","scoring_elements":"0.78641","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01151","scoring_system":"epss","scoring_elements":"0.78448","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01151","scoring_system":"epss","scoring_elements":"0.78479","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01151","scoring_system":"epss","scoring_elements":"0.78462","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01151","scoring_system":"epss","scoring_elements":"0.78489","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01151","scoring_system":"epss","scoring_elements":"0.78494","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-1870"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27918","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27918"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29623","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1765","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1765"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1789","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1789"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1799","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1799"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1801","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1801"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1870","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1870"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21806"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1944350","reference_id":"1944350","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1944350"},{"reference_url":"https://security.archlinux.org/ASA-202103-24","reference_id":"ASA-202103-24","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202103-24"},{"reference_url":"https://security.archlinux.org/ASA-202103-25","reference_id":"ASA-202103-25","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202103-25"},{"reference_url":"https://security.archlinux.org/AVG-1721","reference_id":"AVG-1721","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1721"},{"reference_url":"https://security.archlinux.org/AVG-1722","reference_id":"AVG-1722","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1722"},{"reference_url":"https://security.gentoo.org/glsa/202104-03","reference_id":"GLSA-202104-03","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-01-29T17:34:00Z/"}],"url":"https://security.gentoo.org/glsa/202104-03"},{"reference_url":"https://support.apple.com/en-us/HT212146","reference_id":"HT212146","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-01-29T17:34:00Z/"}],"url":"https://support.apple.com/en-us/HT212146"},{"reference_url":"https://support.apple.com/en-us/HT212147","reference_id":"HT212147","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-01-29T17:34:00Z/"}],"url":"https://support.apple.com/en-us/HT212147"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN6ZOD62CTO54CHTMJTHVEF6R2Y532TJ/","reference_id":"JN6ZOD62CTO54CHTMJTHVEF6R2Y532TJ","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-01-29T17:34:00Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN6ZOD62CTO54CHTMJTHVEF6R2Y532TJ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3L6ZZOU5JS7E3RFYGLP7UFLXCG7TNLU/","reference_id":"L3L6ZZOU5JS7E3RFYGLP7UFLXCG7TNLU","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-01-29T17:34:00Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3L6ZZOU5JS7E3RFYGLP7UFLXCG7TNLU/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4381","reference_id":"RHSA-2021:4381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/4894-1/","reference_id":"USN-4894-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4894-1/"}],"fixed_packages":[],"aliases":["CVE-2021-1870"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j6q2-urw5-nffz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59489?format=json","vulnerability_id":"VCID-jw1q-qa6v-kqct","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21775.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21775.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-21775","reference_id":"","reference_type":"","scores":[{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70241","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70487","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70441","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70409","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70436","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70254","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70271","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70248","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70294","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70309","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70331","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70316","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70304","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70346","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70356","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70338","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70389","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70398","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70396","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70368","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.7041","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-21775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986863","reference_id":"1986863","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986863"},{"reference_url":"https://security.archlinux.org/ASA-202107-67","reference_id":"ASA-202107-67","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-67"},{"reference_url":"https://security.archlinux.org/ASA-202107-68","reference_id":"ASA-202107-68","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-68"},{"reference_url":"https://security.archlinux.org/AVG-2220","reference_id":"AVG-2220","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2220"},{"reference_url":"https://security.archlinux.org/AVG-2221","reference_id":"AVG-2221","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2221"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4381","reference_id":"RHSA-2021:4381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5024-1/","reference_id":"USN-5024-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5024-1/"}],"fixed_packages":[],"aliases":["CVE-2021-21775"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jw1q-qa6v-kqct"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41468?format=json","vulnerability_id":"VCID-k9zt-dc56-w7f8","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst\n    of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1801.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1801.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-1801","reference_id":"","reference_type":"","scores":[{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.2512","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25236","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25225","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25196","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.2515","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25138","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25094","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.24972","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25035","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25095","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25024","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25044","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00089","scoring_system":"epss","scoring_elements":"0.25226","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47905","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.4796","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47984","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47961","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47943","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47964","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47912","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47965","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-1801"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27918","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27918"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29623","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1765","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1765"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1789","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1789"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1799","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1799"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1801","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1801"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1870","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1870"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21806"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1944343","reference_id":"1944343","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1944343"},{"reference_url":"https://security.archlinux.org/ASA-202103-24","reference_id":"ASA-202103-24","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202103-24"},{"reference_url":"https://security.archlinux.org/ASA-202103-25","reference_id":"ASA-202103-25","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202103-25"},{"reference_url":"https://security.archlinux.org/AVG-1721","reference_id":"AVG-1721","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1721"},{"reference_url":"https://security.archlinux.org/AVG-1722","reference_id":"AVG-1722","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1722"},{"reference_url":"https://security.gentoo.org/glsa/202104-03","reference_id":"GLSA-202104-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202104-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4381","reference_id":"RHSA-2021:4381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/4894-1/","reference_id":"USN-4894-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4894-1/"}],"fixed_packages":[],"aliases":["CVE-2021-1801"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k9zt-dc56-w7f8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59487?format=json","vulnerability_id":"VCID-kshe-e6w9-37ez","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1844.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1844.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-1844","reference_id":"","reference_type":"","scores":[{"value":"0.014","scoring_system":"epss","scoring_elements":"0.80368","published_at":"2026-04-01T12:55:00Z"},{"value":"0.014","scoring_system":"epss","scoring_elements":"0.80613","published_at":"2026-05-14T12:55:00Z"},{"value":"0.014","scoring_system":"epss","scoring_elements":"0.80561","published_at":"2026-05-09T12:55:00Z"},{"value":"0.014","scoring_system":"epss","scoring_elements":"0.80555","published_at":"2026-05-11T12:55:00Z"},{"value":"0.014","scoring_system":"epss","scoring_elements":"0.80572","published_at":"2026-05-12T12:55:00Z"},{"value":"0.014","scoring_system":"epss","scoring_elements":"0.80374","published_at":"2026-04-02T12:55:00Z"},{"value":"0.014","scoring_system":"epss","scoring_elements":"0.80394","published_at":"2026-04-04T12:55:00Z"},{"value":"0.014","scoring_system":"epss","scoring_elements":"0.80383","published_at":"2026-04-07T12:55:00Z"},{"value":"0.014","scoring_system":"epss","scoring_elements":"0.80412","published_at":"2026-04-08T12:55:00Z"},{"value":"0.014","scoring_system":"epss","scoring_elements":"0.80422","published_at":"2026-04-09T12:55:00Z"},{"value":"0.014","scoring_system":"epss","scoring_elements":"0.80441","published_at":"2026-04-11T12:55:00Z"},{"value":"0.014","scoring_system":"epss","scoring_elements":"0.80426","published_at":"2026-04-12T12:55:00Z"},{"value":"0.014","scoring_system":"epss","scoring_elements":"0.80419","published_at":"2026-04-13T12:55:00Z"},{"value":"0.014","scoring_system":"epss","scoring_elements":"0.80449","published_at":"2026-04-16T12:55:00Z"},{"value":"0.014","scoring_system":"epss","scoring_elements":"0.8045","published_at":"2026-04-18T12:55:00Z"},{"value":"0.014","scoring_system":"epss","scoring_elements":"0.80453","published_at":"2026-04-21T12:55:00Z"},{"value":"0.014","scoring_system":"epss","scoring_elements":"0.80479","published_at":"2026-04-24T12:55:00Z"},{"value":"0.014","scoring_system":"epss","scoring_elements":"0.80485","published_at":"2026-04-26T12:55:00Z"},{"value":"0.014","scoring_system":"epss","scoring_elements":"0.80502","published_at":"2026-04-29T12:55:00Z"},{"value":"0.014","scoring_system":"epss","scoring_elements":"0.80519","published_at":"2026-05-05T12:55:00Z"},{"value":"0.014","scoring_system":"epss","scoring_elements":"0.80541","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-1844"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1788","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1788"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1844","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1844"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1871","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1871"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30682","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30682"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1944862","reference_id":"1944862","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1944862"},{"reference_url":"https://security.archlinux.org/AVG-1744","reference_id":"AVG-1744","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1744"},{"reference_url":"https://security.archlinux.org/AVG-1745","reference_id":"AVG-1745","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1745"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4381","reference_id":"RHSA-2021:4381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/4939-1/","reference_id":"USN-4939-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4939-1/"}],"fixed_packages":[],"aliases":["CVE-2021-1844"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kshe-e6w9-37ez"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59497?format=json","vulnerability_id":"VCID-na3e-x43h-7kgr","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30689.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30689.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30689","reference_id":"","reference_type":"","scores":[{"value":"0.01123","scoring_system":"epss","scoring_elements":"0.78204","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01123","scoring_system":"epss","scoring_elements":"0.78445","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01123","scoring_system":"epss","scoring_elements":"0.7839","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01123","scoring_system":"epss","scoring_elements":"0.78406","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01123","scoring_system":"epss","scoring_elements":"0.78213","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01123","scoring_system":"epss","scoring_elements":"0.78243","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01123","scoring_system":"epss","scoring_elements":"0.78225","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01123","scoring_system":"epss","scoring_elements":"0.78251","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01123","scoring_system":"epss","scoring_elements":"0.78257","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01123","scoring_system":"epss","scoring_elements":"0.78282","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01123","scoring_system":"epss","scoring_elements":"0.78265","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01123","scoring_system":"epss","scoring_elements":"0.7826","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01123","scoring_system":"epss","scoring_elements":"0.78291","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01123","scoring_system":"epss","scoring_elements":"0.78289","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01123","scoring_system":"epss","scoring_elements":"0.78285","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01123","scoring_system":"epss","scoring_elements":"0.78317","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01123","scoring_system":"epss","scoring_elements":"0.78324","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01123","scoring_system":"epss","scoring_elements":"0.7834","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01123","scoring_system":"epss","scoring_elements":"0.78353","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01123","scoring_system":"epss","scoring_elements":"0.78379","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01123","scoring_system":"epss","scoring_elements":"0.78395","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30689"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986881","reference_id":"1986881","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986881"},{"reference_url":"https://security.archlinux.org/ASA-202107-67","reference_id":"ASA-202107-67","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-67"},{"reference_url":"https://security.archlinux.org/ASA-202107-68","reference_id":"ASA-202107-68","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-68"},{"reference_url":"https://security.archlinux.org/AVG-2220","reference_id":"AVG-2220","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2220"},{"reference_url":"https://security.archlinux.org/AVG-2221","reference_id":"AVG-2221","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2221"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4381","reference_id":"RHSA-2021:4381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5024-1/","reference_id":"USN-5024-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5024-1/"}],"fixed_packages":[],"aliases":["CVE-2021-30689"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-na3e-x43h-7kgr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59493?format=json","vulnerability_id":"VCID-nkp9-pvqf-ebcv","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30663.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30663.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30663","reference_id":"","reference_type":"","scores":[{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71505","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71465","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71517","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.7154","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71525","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71506","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71553","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71557","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71536","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71587","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71594","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71598","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71584","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71619","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71653","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01198","scoring_system":"epss","scoring_elements":"0.79037","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01198","scoring_system":"epss","scoring_elements":"0.78848","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01198","scoring_system":"epss","scoring_elements":"0.79075","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01198","scoring_system":"epss","scoring_elements":"0.7902","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01198","scoring_system":"epss","scoring_elements":"0.78854","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01198","scoring_system":"epss","scoring_elements":"0.78883","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986872","reference_id":"1986872","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986872"},{"reference_url":"https://security.archlinux.org/ASA-202107-67","reference_id":"ASA-202107-67","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-67"},{"reference_url":"https://security.archlinux.org/ASA-202107-68","reference_id":"ASA-202107-68","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-68"},{"reference_url":"https://security.archlinux.org/AVG-2220","reference_id":"AVG-2220","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2220"},{"reference_url":"https://security.archlinux.org/AVG-2221","reference_id":"AVG-2221","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2221"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://support.apple.com/en-us/HT212335","reference_id":"HT212335","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T16:23:07Z/"}],"url":"https://support.apple.com/en-us/HT212335"},{"reference_url":"https://support.apple.com/en-us/HT212336","reference_id":"HT212336","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T16:23:07Z/"}],"url":"https://support.apple.com/en-us/HT212336"},{"reference_url":"https://support.apple.com/en-us/HT212341","reference_id":"HT212341","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T16:23:07Z/"}],"url":"https://support.apple.com/en-us/HT212341"},{"reference_url":"https://support.apple.com/en-us/HT212532","reference_id":"HT212532","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T16:23:07Z/"}],"url":"https://support.apple.com/en-us/HT212532"},{"reference_url":"https://support.apple.com/en-us/HT212534","reference_id":"HT212534","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T16:23:07Z/"}],"url":"https://support.apple.com/en-us/HT212534"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4381","reference_id":"RHSA-2021:4381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5024-1/","reference_id":"USN-5024-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5024-1/"}],"fixed_packages":[],"aliases":["CVE-2021-30663"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nkp9-pvqf-ebcv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59482?format=json","vulnerability_id":"VCID-q834-6aag-f3dx","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1788.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1788.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-1788","reference_id":"","reference_type":"","scores":[{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61031","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.6128","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61235","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61196","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61223","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61108","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61136","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61103","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61151","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61166","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61186","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61173","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61154","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61194","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.612","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61181","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.6117","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61185","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61178","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61126","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61175","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-1788"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1788","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1788"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1844","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1844"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1871","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1871"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30682","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30682"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1944859","reference_id":"1944859","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1944859"},{"reference_url":"https://security.archlinux.org/AVG-1744","reference_id":"AVG-1744","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1744"},{"reference_url":"https://security.archlinux.org/AVG-1745","reference_id":"AVG-1745","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1745"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4381","reference_id":"RHSA-2021:4381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/4939-1/","reference_id":"USN-4939-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4939-1/"}],"fixed_packages":[],"aliases":["CVE-2021-1788"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-q834-6aag-f3dx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41466?format=json","vulnerability_id":"VCID-q8gz-5f27-eqhu","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst\n    of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1789.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1789.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-1789","reference_id":"","reference_type":"","scores":[{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47558","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47612","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47597","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47618","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47567","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47622","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47617","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47641","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47626","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47684","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47676","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47629","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47609","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47564","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.4748","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47545","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47566","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47509","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47538","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-1789"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27918","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27918"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29623","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1765","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1765"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1789","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1789"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1799","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1799"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1801","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1801"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1870","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1870"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21806"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1944337","reference_id":"1944337","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1944337"},{"reference_url":"https://security.archlinux.org/ASA-202103-24","reference_id":"ASA-202103-24","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202103-24"},{"reference_url":"https://security.archlinux.org/ASA-202103-25","reference_id":"ASA-202103-25","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202103-25"},{"reference_url":"https://security.archlinux.org/AVG-1721","reference_id":"AVG-1721","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1721"},{"reference_url":"https://security.archlinux.org/AVG-1722","reference_id":"AVG-1722","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1722"},{"reference_url":"https://security.gentoo.org/glsa/202104-03","reference_id":"GLSA-202104-03","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:34:43Z/"}],"url":"https://security.gentoo.org/glsa/202104-03"},{"reference_url":"https://support.apple.com/en-us/HT212146","reference_id":"HT212146","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:34:43Z/"}],"url":"https://support.apple.com/en-us/HT212146"},{"reference_url":"https://support.apple.com/en-us/HT212147","reference_id":"HT212147","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:34:43Z/"}],"url":"https://support.apple.com/en-us/HT212147"},{"reference_url":"https://support.apple.com/en-us/HT212148","reference_id":"HT212148","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:34:43Z/"}],"url":"https://support.apple.com/en-us/HT212148"},{"reference_url":"https://support.apple.com/en-us/HT212149","reference_id":"HT212149","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:34:43Z/"}],"url":"https://support.apple.com/en-us/HT212149"},{"reference_url":"https://support.apple.com/en-us/HT212152","reference_id":"HT212152","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:34:43Z/"}],"url":"https://support.apple.com/en-us/HT212152"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN6ZOD62CTO54CHTMJTHVEF6R2Y532TJ/","reference_id":"JN6ZOD62CTO54CHTMJTHVEF6R2Y532TJ","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:34:43Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN6ZOD62CTO54CHTMJTHVEF6R2Y532TJ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3L6ZZOU5JS7E3RFYGLP7UFLXCG7TNLU/","reference_id":"L3L6ZZOU5JS7E3RFYGLP7UFLXCG7TNLU","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:34:43Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3L6ZZOU5JS7E3RFYGLP7UFLXCG7TNLU/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4381","reference_id":"RHSA-2021:4381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/4894-1/","reference_id":"USN-4894-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4894-1/"}],"fixed_packages":[],"aliases":["CVE-2021-1789"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-q8gz-5f27-eqhu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59488?format=json","vulnerability_id":"VCID-s51n-1ms6-xydk","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1871.json","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1871.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-1871","reference_id":"","reference_type":"","scores":[{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.739","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.73939","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.7391","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.73934","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.73905","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.73953","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.73976","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.73958","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.73949","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00938","scoring_system":"epss","scoring_elements":"0.76245","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00938","scoring_system":"epss","scoring_elements":"0.76287","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00938","scoring_system":"epss","scoring_elements":"0.76227","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00938","scoring_system":"epss","scoring_elements":"0.76274","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00938","scoring_system":"epss","scoring_elements":"0.76297","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00938","scoring_system":"epss","scoring_elements":"0.76325","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00938","scoring_system":"epss","scoring_elements":"0.76265","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00938","scoring_system":"epss","scoring_elements":"0.76346","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00938","scoring_system":"epss","scoring_elements":"0.76332","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00938","scoring_system":"epss","scoring_elements":"0.76348","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00938","scoring_system":"epss","scoring_elements":"0.76398","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00938","scoring_system":"epss","scoring_elements":"0.7624","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-1871"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1788","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1788"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1844","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1844"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1871","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1871"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30682","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30682"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1944867","reference_id":"1944867","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1944867"},{"reference_url":"https://security.archlinux.org/AVG-1744","reference_id":"AVG-1744","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1744"},{"reference_url":"https://security.archlinux.org/AVG-1745","reference_id":"AVG-1745","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1745"},{"reference_url":"https://www.debian.org/security/2021/dsa-4923","reference_id":"dsa-4923","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-01-29T17:33:21Z/"}],"url":"https://www.debian.org/security/2021/dsa-4923"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://support.apple.com/en-us/HT212146","reference_id":"HT212146","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-01-29T17:33:21Z/"}],"url":"https://support.apple.com/en-us/HT212146"},{"reference_url":"https://support.apple.com/en-us/HT212147","reference_id":"HT212147","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-01-29T17:33:21Z/"}],"url":"https://support.apple.com/en-us/HT212147"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3L6ZZOU5JS7E3RFYGLP7UFLXCG7TNLU/","reference_id":"L3L6ZZOU5JS7E3RFYGLP7UFLXCG7TNLU","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-01-29T17:33:21Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3L6ZZOU5JS7E3RFYGLP7UFLXCG7TNLU/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4381","reference_id":"RHSA-2021:4381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/4939-1/","reference_id":"USN-4939-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4939-1/"}],"fixed_packages":[],"aliases":["CVE-2021-1871"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s51n-1ms6-xydk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59499?format=json","vulnerability_id":"VCID-v6kn-1ygj-8kfe","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30734.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30734.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30734","reference_id":"","reference_type":"","scores":[{"value":"0.01081","scoring_system":"epss","scoring_elements":"0.77787","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01081","scoring_system":"epss","scoring_elements":"0.78042","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01081","scoring_system":"epss","scoring_elements":"0.77978","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01081","scoring_system":"epss","scoring_elements":"0.77996","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01081","scoring_system":"epss","scoring_elements":"0.77793","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01081","scoring_system":"epss","scoring_elements":"0.77821","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01081","scoring_system":"epss","scoring_elements":"0.77804","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01081","scoring_system":"epss","scoring_elements":"0.77832","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01081","scoring_system":"epss","scoring_elements":"0.77837","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01081","scoring_system":"epss","scoring_elements":"0.77863","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01081","scoring_system":"epss","scoring_elements":"0.77847","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01081","scoring_system":"epss","scoring_elements":"0.77884","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01081","scoring_system":"epss","scoring_elements":"0.77882","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01081","scoring_system":"epss","scoring_elements":"0.77876","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01081","scoring_system":"epss","scoring_elements":"0.77908","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01081","scoring_system":"epss","scoring_elements":"0.77916","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01081","scoring_system":"epss","scoring_elements":"0.7793","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01081","scoring_system":"epss","scoring_elements":"0.77941","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01081","scoring_system":"epss","scoring_elements":"0.77971","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01081","scoring_system":"epss","scoring_elements":"0.77988","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986886","reference_id":"1986886","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986886"},{"reference_url":"https://security.archlinux.org/ASA-202107-67","reference_id":"ASA-202107-67","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-67"},{"reference_url":"https://security.archlinux.org/ASA-202107-68","reference_id":"ASA-202107-68","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-68"},{"reference_url":"https://security.archlinux.org/AVG-2220","reference_id":"AVG-2220","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2220"},{"reference_url":"https://security.archlinux.org/AVG-2221","reference_id":"AVG-2221","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2221"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4381","reference_id":"RHSA-2021:4381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5024-1/","reference_id":"USN-5024-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5024-1/"}],"fixed_packages":[],"aliases":["CVE-2021-30734"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v6kn-1ygj-8kfe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41459?format=json","vulnerability_id":"VCID-xstk-j7zq-e3bh","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst\n    of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13558.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13558.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-13558","reference_id":"","reference_type":"","scores":[{"value":"0.00599","scoring_system":"epss","scoring_elements":"0.6935","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00599","scoring_system":"epss","scoring_elements":"0.6961","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00599","scoring_system":"epss","scoring_elements":"0.69567","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00599","scoring_system":"epss","scoring_elements":"0.69538","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00599","scoring_system":"epss","scoring_elements":"0.69562","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00599","scoring_system":"epss","scoring_elements":"0.69362","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00599","scoring_system":"epss","scoring_elements":"0.69378","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00599","scoring_system":"epss","scoring_elements":"0.69357","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00599","scoring_system":"epss","scoring_elements":"0.69407","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00599","scoring_system":"epss","scoring_elements":"0.69423","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00599","scoring_system":"epss","scoring_elements":"0.69446","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00599","scoring_system":"epss","scoring_elements":"0.69431","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00599","scoring_system":"epss","scoring_elements":"0.69417","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00599","scoring_system":"epss","scoring_elements":"0.69456","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00599","scoring_system":"epss","scoring_elements":"0.69467","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00599","scoring_system":"epss","scoring_elements":"0.69448","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00599","scoring_system":"epss","scoring_elements":"0.695","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00599","scoring_system":"epss","scoring_elements":"0.69507","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00599","scoring_system":"epss","scoring_elements":"0.69512","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00599","scoring_system":"epss","scoring_elements":"0.6949","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00599","scoring_system":"epss","scoring_elements":"0.69532","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-13558"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13558","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13558"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1928886","reference_id":"1928886","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1928886"},{"reference_url":"https://security.archlinux.org/AVG-1571","reference_id":"AVG-1571","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1571"},{"reference_url":"https://security.archlinux.org/AVG-1572","reference_id":"AVG-1572","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1572"},{"reference_url":"https://security.gentoo.org/glsa/202104-03","reference_id":"GLSA-202104-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202104-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4381","reference_id":"RHSA-2021:4381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/4739-1/","reference_id":"USN-4739-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4739-1/"}],"fixed_packages":[],"aliases":["CVE-2020-13558"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xstk-j7zq-e3bh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59496?format=json","vulnerability_id":"VCID-yjt8-b6qu-m7ag","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30682.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30682.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30682","reference_id":"","reference_type":"","scores":[{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58714","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58937","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58839","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58866","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58788","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58809","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58778","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.5883","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58836","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58854","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58818","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.5885","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58831","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58815","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58829","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58779","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58824","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58883","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30682"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1788","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1788"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1844","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1844"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1871","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1871"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30682","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30682"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986879","reference_id":"1986879","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986879"},{"reference_url":"https://security.archlinux.org/AVG-2216","reference_id":"AVG-2216","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2216"},{"reference_url":"https://security.archlinux.org/AVG-2217","reference_id":"AVG-2217","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2217"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4381","reference_id":"RHSA-2021:4381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2021-30682"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yjt8-b6qu-m7ag"}],"fixing_vulnerabilities":[],"risk_score":"10.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/webkit2gtk3@2.32.3-2%3Farch=el8"}