{"url":"http://public2.vulnerablecode.io/api/packages/392107?format=json","purl":"pkg:apk/alpine/chromium@91.0.4472.77-r0?arch=ppc64le&distroversion=v3.21&reponame=community","type":"apk","namespace":"alpine","name":"chromium","version":"91.0.4472.77-r0","qualifiers":{"arch":"ppc64le","distroversion":"v3.21","reponame":"community"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"91.0.4472.101-r0","latest_non_vulnerable_version":"116.0.5845.187-r0","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49432?format=json","vulnerability_id":"VCID-7fef-qr2c-gbcp","summary":"Multiple vulnerabillities have been found in Chromium and Google\n    Chrome, the worst of which could allow remote attackers to execute\n    arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30523","reference_id":"","reference_type":"","scores":[{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70537","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70563","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70409","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70422","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.7044","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70418","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70463","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70479","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70503","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70488","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70474","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70516","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70524","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70504","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70554","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30523"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30523","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30523"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079","reference_id":"990079","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079"},{"reference_url":"https://security.archlinux.org/ASA-202106-2","reference_id":"ASA-202106-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-2"},{"reference_url":"https://security.archlinux.org/AVG-1990","reference_id":"AVG-1990","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1990"},{"reference_url":"https://security.archlinux.org/AVG-1991","reference_id":"AVG-1991","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1991"},{"reference_url":"https://security.gentoo.org/glsa/202107-06","reference_id":"GLSA-202107-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-06"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/392107?format=json","purl":"pkg:apk/alpine/chromium@91.0.4472.77-r0?arch=ppc64le&distroversion=v3.21&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/chromium@91.0.4472.77-r0%3Farch=ppc64le&distroversion=v3.21&reponame=community"}],"aliases":["CVE-2021-30523"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7fef-qr2c-gbcp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49442?format=json","vulnerability_id":"VCID-81s9-h9rs-bkfh","summary":"Multiple vulnerabillities have been found in Chromium and Google\n    Chrome, the worst of which could allow remote attackers to execute\n    arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30534","reference_id":"","reference_type":"","scores":[{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.29977","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30117","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30519","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30657","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30703","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30515","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30574","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30608","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30611","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30567","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.3052","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30545","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30527","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30492","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30312","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30198","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30534"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30534","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30534"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079","reference_id":"990079","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079"},{"reference_url":"https://security.archlinux.org/ASA-202106-2","reference_id":"ASA-202106-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-2"},{"reference_url":"https://security.archlinux.org/AVG-1990","reference_id":"AVG-1990","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1990"},{"reference_url":"https://security.archlinux.org/AVG-1991","reference_id":"AVG-1991","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1991"},{"reference_url":"https://security.gentoo.org/glsa/202107-06","reference_id":"GLSA-202107-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-06"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/392107?format=json","purl":"pkg:apk/alpine/chromium@91.0.4472.77-r0?arch=ppc64le&distroversion=v3.21&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/chromium@91.0.4472.77-r0%3Farch=ppc64le&distroversion=v3.21&reponame=community"}],"aliases":["CVE-2021-30534"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-81s9-h9rs-bkfh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49431?format=json","vulnerability_id":"VCID-8bhz-3581-bkca","summary":"Multiple vulnerabillities have been found in Chromium and Google\n    Chrome, the worst of which could allow remote attackers to execute\n    arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30522","reference_id":"","reference_type":"","scores":[{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.77155","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.77147","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.76997","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.77003","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.77032","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.77013","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.77045","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.77055","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.77084","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.77063","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.77058","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.77099","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.77101","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.77091","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.77126","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.77133","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30522"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30522","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30522"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079","reference_id":"990079","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079"},{"reference_url":"https://security.archlinux.org/ASA-202106-2","reference_id":"ASA-202106-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-2"},{"reference_url":"https://security.archlinux.org/AVG-1990","reference_id":"AVG-1990","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1990"},{"reference_url":"https://security.archlinux.org/AVG-1991","reference_id":"AVG-1991","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1991"},{"reference_url":"https://security.gentoo.org/glsa/202107-06","reference_id":"GLSA-202107-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-06"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/392107?format=json","purl":"pkg:apk/alpine/chromium@91.0.4472.77-r0?arch=ppc64le&distroversion=v3.21&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/chromium@91.0.4472.77-r0%3Farch=ppc64le&distroversion=v3.21&reponame=community"}],"aliases":["CVE-2021-30522"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8bhz-3581-bkca"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49433?format=json","vulnerability_id":"VCID-9u4b-zjdu-n3b3","summary":"Multiple vulnerabillities have been found in Chromium and Google\n    Chrome, the worst of which could allow remote attackers to execute\n    arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30524","reference_id":"","reference_type":"","scores":[{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51424","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.5148","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51428","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51479","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51506","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51466","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51519","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51517","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51561","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.5154","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51528","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51571","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.5158","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.5156","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51513","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30524"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30524","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30524"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079","reference_id":"990079","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079"},{"reference_url":"https://security.archlinux.org/ASA-202106-2","reference_id":"ASA-202106-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-2"},{"reference_url":"https://security.archlinux.org/AVG-1990","reference_id":"AVG-1990","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1990"},{"reference_url":"https://security.archlinux.org/AVG-1991","reference_id":"AVG-1991","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1991"},{"reference_url":"https://security.gentoo.org/glsa/202107-06","reference_id":"GLSA-202107-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-06"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/392107?format=json","purl":"pkg:apk/alpine/chromium@91.0.4472.77-r0?arch=ppc64le&distroversion=v3.21&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/chromium@91.0.4472.77-r0%3Farch=ppc64le&distroversion=v3.21&reponame=community"}],"aliases":["CVE-2021-30524"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9u4b-zjdu-n3b3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49445?format=json","vulnerability_id":"VCID-amkk-esp8-53af","summary":"Multiple vulnerabillities have been found in Chromium and Google\n    Chrome, the worst of which could allow remote attackers to execute\n    arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30538","reference_id":"","reference_type":"","scores":[{"value":"0.00205","scoring_system":"epss","scoring_elements":"0.423","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00205","scoring_system":"epss","scoring_elements":"0.42442","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00205","scoring_system":"epss","scoring_elements":"0.42544","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00205","scoring_system":"epss","scoring_elements":"0.42616","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00205","scoring_system":"epss","scoring_elements":"0.42644","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00205","scoring_system":"epss","scoring_elements":"0.42584","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00205","scoring_system":"epss","scoring_elements":"0.42636","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00205","scoring_system":"epss","scoring_elements":"0.42647","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00205","scoring_system":"epss","scoring_elements":"0.42671","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00205","scoring_system":"epss","scoring_elements":"0.42634","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00205","scoring_system":"epss","scoring_elements":"0.42606","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00205","scoring_system":"epss","scoring_elements":"0.42665","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00205","scoring_system":"epss","scoring_elements":"0.42652","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00205","scoring_system":"epss","scoring_elements":"0.42587","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00205","scoring_system":"epss","scoring_elements":"0.42525","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00205","scoring_system":"epss","scoring_elements":"0.42526","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30538"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30538","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30538"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079","reference_id":"990079","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079"},{"reference_url":"https://security.archlinux.org/ASA-202106-2","reference_id":"ASA-202106-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-2"},{"reference_url":"https://security.archlinux.org/AVG-1990","reference_id":"AVG-1990","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1990"},{"reference_url":"https://security.archlinux.org/AVG-1991","reference_id":"AVG-1991","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1991"},{"reference_url":"https://security.gentoo.org/glsa/202107-06","reference_id":"GLSA-202107-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-06"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/392107?format=json","purl":"pkg:apk/alpine/chromium@91.0.4472.77-r0?arch=ppc64le&distroversion=v3.21&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/chromium@91.0.4472.77-r0%3Farch=ppc64le&distroversion=v3.21&reponame=community"}],"aliases":["CVE-2021-30538"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-amkk-esp8-53af"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49441?format=json","vulnerability_id":"VCID-aswr-a7yz-tbb3","summary":"Multiple vulnerabillities have been found in Chromium and Google\n    Chrome, the worst of which could allow remote attackers to execute\n    arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30533","reference_id":"","reference_type":"","scores":[{"value":"0.10532","scoring_system":"epss","scoring_elements":"0.93296","published_at":"2026-05-05T12:55:00Z"},{"value":"0.10532","scoring_system":"epss","scoring_elements":"0.93255","published_at":"2026-04-08T12:55:00Z"},{"value":"0.10532","scoring_system":"epss","scoring_elements":"0.93259","published_at":"2026-04-09T12:55:00Z"},{"value":"0.10532","scoring_system":"epss","scoring_elements":"0.93263","published_at":"2026-04-11T12:55:00Z"},{"value":"0.10532","scoring_system":"epss","scoring_elements":"0.93261","published_at":"2026-04-12T12:55:00Z"},{"value":"0.10532","scoring_system":"epss","scoring_elements":"0.93262","published_at":"2026-04-13T12:55:00Z"},{"value":"0.10532","scoring_system":"epss","scoring_elements":"0.9328","published_at":"2026-04-16T12:55:00Z"},{"value":"0.10532","scoring_system":"epss","scoring_elements":"0.93285","published_at":"2026-04-18T12:55:00Z"},{"value":"0.10532","scoring_system":"epss","scoring_elements":"0.93292","published_at":"2026-04-21T12:55:00Z"},{"value":"0.10532","scoring_system":"epss","scoring_elements":"0.93297","published_at":"2026-04-24T12:55:00Z"},{"value":"0.10532","scoring_system":"epss","scoring_elements":"0.93294","published_at":"2026-04-26T12:55:00Z"},{"value":"0.10532","scoring_system":"epss","scoring_elements":"0.9329","published_at":"2026-04-29T12:55:00Z"},{"value":"0.10532","scoring_system":"epss","scoring_elements":"0.93234","published_at":"2026-04-01T12:55:00Z"},{"value":"0.10532","scoring_system":"epss","scoring_elements":"0.93243","published_at":"2026-04-02T12:55:00Z"},{"value":"0.10532","scoring_system":"epss","scoring_elements":"0.93248","published_at":"2026-04-04T12:55:00Z"},{"value":"0.10532","scoring_system":"epss","scoring_elements":"0.93246","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30533"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30533","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30533"},{"reference_url":"https://crbug.com/1145553","reference_id":"1145553","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T15:04:01Z/"}],"url":"https://crbug.com/1145553"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079","reference_id":"990079","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079"},{"reference_url":"https://security.archlinux.org/ASA-202106-2","reference_id":"ASA-202106-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-2"},{"reference_url":"https://security.archlinux.org/AVG-1990","reference_id":"AVG-1990","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1990"},{"reference_url":"https://security.archlinux.org/AVG-1991","reference_id":"AVG-1991","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1991"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ETMZL6IHCTCTREEL434BQ4THQ7EOHJ43/","reference_id":"ETMZL6IHCTCTREEL434BQ4THQ7EOHJ43","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T15:04:01Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ETMZL6IHCTCTREEL434BQ4THQ7EOHJ43/"},{"reference_url":"https://security.gentoo.org/glsa/202107-06","reference_id":"GLSA-202107-06","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T15:04:01Z/"}],"url":"https://security.gentoo.org/glsa/202107-06"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAT6EOXVQFE6JFMFQF4IKAOUQSHMHL54/","reference_id":"PAT6EOXVQFE6JFMFQF4IKAOUQSHMHL54","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T15:04:01Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAT6EOXVQFE6JFMFQF4IKAOUQSHMHL54/"},{"reference_url":"https://chromereleases.googleblog.com/2021/05/stable-channel-update-for-desktop_25.html","reference_id":"stable-channel-update-for-desktop_25.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T15:04:01Z/"}],"url":"https://chromereleases.googleblog.com/2021/05/stable-channel-update-for-desktop_25.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/392107?format=json","purl":"pkg:apk/alpine/chromium@91.0.4472.77-r0?arch=ppc64le&distroversion=v3.21&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/chromium@91.0.4472.77-r0%3Farch=ppc64le&distroversion=v3.21&reponame=community"}],"aliases":["CVE-2021-30533"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-aswr-a7yz-tbb3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49436?format=json","vulnerability_id":"VCID-cntb-k34n-dbaq","summary":"Multiple vulnerabillities have been found in Chromium and Google\n    Chrome, the worst of which could allow remote attackers to execute\n    arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30527","reference_id":"","reference_type":"","scores":[{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55688","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55743","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55668","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.5578","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55802","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55782","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55833","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55836","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55844","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55825","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55806","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55843","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55848","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55823","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.5575","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55766","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30527"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30527","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30527"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079","reference_id":"990079","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079"},{"reference_url":"https://security.archlinux.org/ASA-202106-2","reference_id":"ASA-202106-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-2"},{"reference_url":"https://security.archlinux.org/AVG-1990","reference_id":"AVG-1990","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1990"},{"reference_url":"https://security.archlinux.org/AVG-1991","reference_id":"AVG-1991","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1991"},{"reference_url":"https://security.gentoo.org/glsa/202107-06","reference_id":"GLSA-202107-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-06"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/392107?format=json","purl":"pkg:apk/alpine/chromium@91.0.4472.77-r0?arch=ppc64le&distroversion=v3.21&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/chromium@91.0.4472.77-r0%3Farch=ppc64le&distroversion=v3.21&reponame=community"}],"aliases":["CVE-2021-30527"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cntb-k34n-dbaq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49443?format=json","vulnerability_id":"VCID-e5qg-urfz-37b6","summary":"Multiple vulnerabillities have been found in Chromium and Google\n    Chrome, the worst of which could allow remote attackers to execute\n    arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30536","reference_id":"","reference_type":"","scores":[{"value":"0.01023","scoring_system":"epss","scoring_elements":"0.77344","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01023","scoring_system":"epss","scoring_elements":"0.77338","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01023","scoring_system":"epss","scoring_elements":"0.77191","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01023","scoring_system":"epss","scoring_elements":"0.77197","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01023","scoring_system":"epss","scoring_elements":"0.77226","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01023","scoring_system":"epss","scoring_elements":"0.77208","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01023","scoring_system":"epss","scoring_elements":"0.7724","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01023","scoring_system":"epss","scoring_elements":"0.77248","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01023","scoring_system":"epss","scoring_elements":"0.77275","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01023","scoring_system":"epss","scoring_elements":"0.77254","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01023","scoring_system":"epss","scoring_elements":"0.77251","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01023","scoring_system":"epss","scoring_elements":"0.77291","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01023","scoring_system":"epss","scoring_elements":"0.77283","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01023","scoring_system":"epss","scoring_elements":"0.77318","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01023","scoring_system":"epss","scoring_elements":"0.77324","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30536"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30536","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30536"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079","reference_id":"990079","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079"},{"reference_url":"https://security.archlinux.org/ASA-202106-2","reference_id":"ASA-202106-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-2"},{"reference_url":"https://security.archlinux.org/AVG-1990","reference_id":"AVG-1990","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1990"},{"reference_url":"https://security.archlinux.org/AVG-1991","reference_id":"AVG-1991","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1991"},{"reference_url":"https://security.gentoo.org/glsa/202107-06","reference_id":"GLSA-202107-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-06"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/392107?format=json","purl":"pkg:apk/alpine/chromium@91.0.4472.77-r0?arch=ppc64le&distroversion=v3.21&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/chromium@91.0.4472.77-r0%3Farch=ppc64le&distroversion=v3.21&reponame=community"}],"aliases":["CVE-2021-30536"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e5qg-urfz-37b6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49446?format=json","vulnerability_id":"VCID-ej7g-qqsm-y7ch","summary":"Multiple vulnerabillities have been found in Chromium and Google\n    Chrome, the worst of which could allow remote attackers to execute\n    arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30539","reference_id":"","reference_type":"","scores":[{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.33461","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.33578","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.33832","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.3417","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.34204","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.34066","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.34109","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.34139","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.34137","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.34095","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.34071","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.34107","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.34094","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.34058","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.33685","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.33663","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30539"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30539","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30539"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079","reference_id":"990079","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079"},{"reference_url":"https://security.archlinux.org/ASA-202106-2","reference_id":"ASA-202106-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-2"},{"reference_url":"https://security.archlinux.org/AVG-1990","reference_id":"AVG-1990","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1990"},{"reference_url":"https://security.archlinux.org/AVG-1991","reference_id":"AVG-1991","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1991"},{"reference_url":"https://security.gentoo.org/glsa/202107-06","reference_id":"GLSA-202107-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-06"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/392107?format=json","purl":"pkg:apk/alpine/chromium@91.0.4472.77-r0?arch=ppc64le&distroversion=v3.21&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/chromium@91.0.4472.77-r0%3Farch=ppc64le&distroversion=v3.21&reponame=community"}],"aliases":["CVE-2021-30539"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ej7g-qqsm-y7ch"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49437?format=json","vulnerability_id":"VCID-fgt6-p8h5-wyf2","summary":"Multiple vulnerabillities have been found in Chromium and Google\n    Chrome, the worst of which could allow remote attackers to execute\n    arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30528","reference_id":"","reference_type":"","scores":[{"value":"0.01064","scoring_system":"epss","scoring_elements":"0.77769","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01064","scoring_system":"epss","scoring_elements":"0.77612","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01064","scoring_system":"epss","scoring_elements":"0.7762","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01064","scoring_system":"epss","scoring_elements":"0.77647","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01064","scoring_system":"epss","scoring_elements":"0.77629","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01064","scoring_system":"epss","scoring_elements":"0.77657","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01064","scoring_system":"epss","scoring_elements":"0.77663","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01064","scoring_system":"epss","scoring_elements":"0.77689","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01064","scoring_system":"epss","scoring_elements":"0.77673","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01064","scoring_system":"epss","scoring_elements":"0.77671","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01064","scoring_system":"epss","scoring_elements":"0.77708","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01064","scoring_system":"epss","scoring_elements":"0.77707","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01064","scoring_system":"epss","scoring_elements":"0.77701","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01064","scoring_system":"epss","scoring_elements":"0.77732","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01064","scoring_system":"epss","scoring_elements":"0.77741","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01064","scoring_system":"epss","scoring_elements":"0.77756","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30528"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30528","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30528"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079","reference_id":"990079","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079"},{"reference_url":"https://security.archlinux.org/AVG-2044","reference_id":"AVG-2044","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2044"},{"reference_url":"https://security.gentoo.org/glsa/202107-06","reference_id":"GLSA-202107-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-06"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/392107?format=json","purl":"pkg:apk/alpine/chromium@91.0.4472.77-r0?arch=ppc64le&distroversion=v3.21&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/chromium@91.0.4472.77-r0%3Farch=ppc64le&distroversion=v3.21&reponame=community"}],"aliases":["CVE-2021-30528"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fgt6-p8h5-wyf2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49438?format=json","vulnerability_id":"VCID-jm7s-knrf-vqcj","summary":"Multiple vulnerabillities have been found in Chromium and Google\n    Chrome, the worst of which could allow remote attackers to execute\n    arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30530","reference_id":"","reference_type":"","scores":[{"value":"0.00742","scoring_system":"epss","scoring_elements":"0.73058","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00742","scoring_system":"epss","scoring_elements":"0.73061","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00742","scoring_system":"epss","scoring_elements":"0.72911","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00742","scoring_system":"epss","scoring_elements":"0.72922","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00742","scoring_system":"epss","scoring_elements":"0.72942","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00742","scoring_system":"epss","scoring_elements":"0.72917","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00742","scoring_system":"epss","scoring_elements":"0.72955","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00742","scoring_system":"epss","scoring_elements":"0.72969","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00742","scoring_system":"epss","scoring_elements":"0.72994","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00742","scoring_system":"epss","scoring_elements":"0.72974","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00742","scoring_system":"epss","scoring_elements":"0.72967","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00742","scoring_system":"epss","scoring_elements":"0.73009","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00742","scoring_system":"epss","scoring_elements":"0.73018","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00742","scoring_system":"epss","scoring_elements":"0.73011","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00742","scoring_system":"epss","scoring_elements":"0.73051","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30530"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30530","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30530"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079","reference_id":"990079","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079"},{"reference_url":"https://security.archlinux.org/ASA-202106-2","reference_id":"ASA-202106-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-2"},{"reference_url":"https://security.archlinux.org/AVG-1990","reference_id":"AVG-1990","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1990"},{"reference_url":"https://security.archlinux.org/AVG-1991","reference_id":"AVG-1991","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1991"},{"reference_url":"https://security.gentoo.org/glsa/202107-06","reference_id":"GLSA-202107-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-06"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/392107?format=json","purl":"pkg:apk/alpine/chromium@91.0.4472.77-r0?arch=ppc64le&distroversion=v3.21&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/chromium@91.0.4472.77-r0%3Farch=ppc64le&distroversion=v3.21&reponame=community"}],"aliases":["CVE-2021-30530"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jm7s-knrf-vqcj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49430?format=json","vulnerability_id":"VCID-jzch-bp6c-mqgd","summary":"Multiple vulnerabillities have been found in Chromium and Google\n    Chrome, the worst of which could allow remote attackers to execute\n    arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30521","reference_id":"","reference_type":"","scores":[{"value":"0.0082","scoring_system":"epss","scoring_elements":"0.7446","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0082","scoring_system":"epss","scoring_elements":"0.7434","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0082","scoring_system":"epss","scoring_elements":"0.74344","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0082","scoring_system":"epss","scoring_elements":"0.74371","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0082","scoring_system":"epss","scoring_elements":"0.74345","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0082","scoring_system":"epss","scoring_elements":"0.74378","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0082","scoring_system":"epss","scoring_elements":"0.74393","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0082","scoring_system":"epss","scoring_elements":"0.74414","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0082","scoring_system":"epss","scoring_elements":"0.74394","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0082","scoring_system":"epss","scoring_elements":"0.74386","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0082","scoring_system":"epss","scoring_elements":"0.74423","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0082","scoring_system":"epss","scoring_elements":"0.74432","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0082","scoring_system":"epss","scoring_elements":"0.74421","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0082","scoring_system":"epss","scoring_elements":"0.74456","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0082","scoring_system":"epss","scoring_elements":"0.74463","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0082","scoring_system":"epss","scoring_elements":"0.74462","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30521"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30521","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30521"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079","reference_id":"990079","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079"},{"reference_url":"https://security.archlinux.org/AVG-2044","reference_id":"AVG-2044","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2044"},{"reference_url":"https://security.gentoo.org/glsa/202107-06","reference_id":"GLSA-202107-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-06"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/392107?format=json","purl":"pkg:apk/alpine/chromium@91.0.4472.77-r0?arch=ppc64le&distroversion=v3.21&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/chromium@91.0.4472.77-r0%3Farch=ppc64le&distroversion=v3.21&reponame=community"}],"aliases":["CVE-2021-30521"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jzch-bp6c-mqgd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/94721?format=json","vulnerability_id":"VCID-k2cy-dr3z-83cy","summary":"Use after free in Bookmarks in Google Chrome prior to 91.0.4472.77 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30529","reference_id":"","reference_type":"","scores":[{"value":"0.00241","scoring_system":"epss","scoring_elements":"0.47282","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00241","scoring_system":"epss","scoring_elements":"0.47365","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00241","scoring_system":"epss","scoring_elements":"0.47355","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00241","scoring_system":"epss","scoring_elements":"0.4739","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00241","scoring_system":"epss","scoring_elements":"0.47412","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00241","scoring_system":"epss","scoring_elements":"0.47361","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00241","scoring_system":"epss","scoring_elements":"0.47416","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00241","scoring_system":"epss","scoring_elements":"0.47415","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00241","scoring_system":"epss","scoring_elements":"0.47438","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00241","scoring_system":"epss","scoring_elements":"0.47413","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00241","scoring_system":"epss","scoring_elements":"0.47419","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00241","scoring_system":"epss","scoring_elements":"0.47478","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00241","scoring_system":"epss","scoring_elements":"0.4747","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00241","scoring_system":"epss","scoring_elements":"0.47421","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00241","scoring_system":"epss","scoring_elements":"0.47409","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00241","scoring_system":"epss","scoring_elements":"0.47418","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30529"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30529","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30529"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079","reference_id":"990079","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079"},{"reference_url":"https://security.archlinux.org/ASA-202106-2","reference_id":"ASA-202106-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-2"},{"reference_url":"https://security.archlinux.org/AVG-1990","reference_id":"AVG-1990","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1990"},{"reference_url":"https://security.archlinux.org/AVG-1991","reference_id":"AVG-1991","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1991"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/392107?format=json","purl":"pkg:apk/alpine/chromium@91.0.4472.77-r0?arch=ppc64le&distroversion=v3.21&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/chromium@91.0.4472.77-r0%3Farch=ppc64le&distroversion=v3.21&reponame=community"}],"aliases":["CVE-2021-30529"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k2cy-dr3z-83cy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49434?format=json","vulnerability_id":"VCID-n1ux-5z1c-9ban","summary":"Multiple vulnerabillities have been found in Chromium and Google\n    Chrome, the worst of which could allow remote attackers to execute\n    arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30525","reference_id":"","reference_type":"","scores":[{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.5758","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57624","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.5755","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57635","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57656","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57632","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57686","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57689","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57704","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57683","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57664","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57693","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57668","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57626","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57645","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30525"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30525","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30525"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079","reference_id":"990079","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079"},{"reference_url":"https://security.archlinux.org/ASA-202106-2","reference_id":"ASA-202106-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-2"},{"reference_url":"https://security.archlinux.org/AVG-1990","reference_id":"AVG-1990","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1990"},{"reference_url":"https://security.archlinux.org/AVG-1991","reference_id":"AVG-1991","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1991"},{"reference_url":"https://security.gentoo.org/glsa/202107-06","reference_id":"GLSA-202107-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-06"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/392107?format=json","purl":"pkg:apk/alpine/chromium@91.0.4472.77-r0?arch=ppc64le&distroversion=v3.21&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/chromium@91.0.4472.77-r0%3Farch=ppc64le&distroversion=v3.21&reponame=community"}],"aliases":["CVE-2021-30525"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n1ux-5z1c-9ban"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49435?format=json","vulnerability_id":"VCID-qdw1-rhx2-e3fu","summary":"Multiple vulnerabillities have been found in Chromium and Google\n    Chrome, the worst of which could allow remote attackers to execute\n    arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30526","reference_id":"","reference_type":"","scores":[{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55688","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55743","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55668","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.5578","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55802","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55782","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55833","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55836","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55844","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55825","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55806","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55843","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55848","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55823","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.5575","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55766","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30526"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30526","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30526"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079","reference_id":"990079","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079"},{"reference_url":"https://security.archlinux.org/ASA-202106-2","reference_id":"ASA-202106-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-2"},{"reference_url":"https://security.archlinux.org/AVG-1990","reference_id":"AVG-1990","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1990"},{"reference_url":"https://security.archlinux.org/AVG-1991","reference_id":"AVG-1991","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1991"},{"reference_url":"https://security.gentoo.org/glsa/202107-06","reference_id":"GLSA-202107-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-06"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/392107?format=json","purl":"pkg:apk/alpine/chromium@91.0.4472.77-r0?arch=ppc64le&distroversion=v3.21&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/chromium@91.0.4472.77-r0%3Farch=ppc64le&distroversion=v3.21&reponame=community"}],"aliases":["CVE-2021-30526"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qdw1-rhx2-e3fu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49444?format=json","vulnerability_id":"VCID-rfg6-a1b3-2qa4","summary":"Multiple vulnerabillities have been found in Chromium and Google\n    Chrome, the worst of which could allow remote attackers to execute\n    arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30537","reference_id":"","reference_type":"","scores":[{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30065","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30206","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.306","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30736","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30784","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30658","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.3069","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30695","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30651","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30606","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30631","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30613","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30579","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.304","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30286","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30537"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30537","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30537"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079","reference_id":"990079","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079"},{"reference_url":"https://security.archlinux.org/ASA-202106-2","reference_id":"ASA-202106-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-2"},{"reference_url":"https://security.archlinux.org/AVG-1990","reference_id":"AVG-1990","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1990"},{"reference_url":"https://security.archlinux.org/AVG-1991","reference_id":"AVG-1991","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1991"},{"reference_url":"https://security.gentoo.org/glsa/202107-06","reference_id":"GLSA-202107-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-06"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/392107?format=json","purl":"pkg:apk/alpine/chromium@91.0.4472.77-r0?arch=ppc64le&distroversion=v3.21&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/chromium@91.0.4472.77-r0%3Farch=ppc64le&distroversion=v3.21&reponame=community"}],"aliases":["CVE-2021-30537"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rfg6-a1b3-2qa4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49439?format=json","vulnerability_id":"VCID-rx6k-fvxg-ruh7","summary":"Multiple vulnerabillities have been found in Chromium and Google\n    Chrome, the worst of which could allow remote attackers to execute\n    arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30531","reference_id":"","reference_type":"","scores":[{"value":"0.00374","scoring_system":"epss","scoring_elements":"0.59045","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00374","scoring_system":"epss","scoring_elements":"0.59086","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00374","scoring_system":"epss","scoring_elements":"0.58981","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00374","scoring_system":"epss","scoring_elements":"0.59056","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00374","scoring_system":"epss","scoring_elements":"0.59079","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00374","scoring_system":"epss","scoring_elements":"0.59044","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00374","scoring_system":"epss","scoring_elements":"0.59094","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00374","scoring_system":"epss","scoring_elements":"0.59099","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00374","scoring_system":"epss","scoring_elements":"0.59118","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00374","scoring_system":"epss","scoring_elements":"0.5908","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00374","scoring_system":"epss","scoring_elements":"0.59117","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00374","scoring_system":"epss","scoring_elements":"0.59121","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00374","scoring_system":"epss","scoring_elements":"0.59101","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00374","scoring_system":"epss","scoring_elements":"0.59081","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30531"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30531","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30531"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079","reference_id":"990079","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079"},{"reference_url":"https://security.archlinux.org/ASA-202106-2","reference_id":"ASA-202106-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-2"},{"reference_url":"https://security.archlinux.org/AVG-1990","reference_id":"AVG-1990","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1990"},{"reference_url":"https://security.archlinux.org/AVG-1991","reference_id":"AVG-1991","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1991"},{"reference_url":"https://security.gentoo.org/glsa/202107-06","reference_id":"GLSA-202107-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-06"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/392107?format=json","purl":"pkg:apk/alpine/chromium@91.0.4472.77-r0?arch=ppc64le&distroversion=v3.21&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/chromium@91.0.4472.77-r0%3Farch=ppc64le&distroversion=v3.21&reponame=community"}],"aliases":["CVE-2021-30531"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rx6k-fvxg-ruh7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49440?format=json","vulnerability_id":"VCID-s575-newv-r3h9","summary":"Multiple vulnerabillities have been found in Chromium and Google\n    Chrome, the worst of which could allow remote attackers to execute\n    arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30532","reference_id":"","reference_type":"","scores":[{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68262","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68287","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.6814","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68163","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.6818","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68158","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68209","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68224","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.6825","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68236","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68203","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68242","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68252","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68232","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68274","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68282","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30532"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30532","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30532"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079","reference_id":"990079","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079"},{"reference_url":"https://security.archlinux.org/ASA-202106-2","reference_id":"ASA-202106-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-2"},{"reference_url":"https://security.archlinux.org/AVG-1990","reference_id":"AVG-1990","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1990"},{"reference_url":"https://security.archlinux.org/AVG-1991","reference_id":"AVG-1991","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1991"},{"reference_url":"https://security.gentoo.org/glsa/202107-06","reference_id":"GLSA-202107-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-06"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/392107?format=json","purl":"pkg:apk/alpine/chromium@91.0.4472.77-r0?arch=ppc64le&distroversion=v3.21&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/chromium@91.0.4472.77-r0%3Farch=ppc64le&distroversion=v3.21&reponame=community"}],"aliases":["CVE-2021-30532"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s575-newv-r3h9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49447?format=json","vulnerability_id":"VCID-u4hw-r55c-mqg9","summary":"Multiple vulnerabillities have been found in Chromium and Google\n    Chrome, the worst of which could allow remote attackers to execute\n    arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30540","reference_id":"","reference_type":"","scores":[{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67394","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.6729","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67327","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.6735","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67378","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67391","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67412","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.674","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67365","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67399","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67411","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67389","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67408","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67419","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30540"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30540","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30540"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079","reference_id":"990079","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079"},{"reference_url":"https://security.archlinux.org/AVG-2044","reference_id":"AVG-2044","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2044"},{"reference_url":"https://security.gentoo.org/glsa/202107-06","reference_id":"GLSA-202107-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-06"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/392107?format=json","purl":"pkg:apk/alpine/chromium@91.0.4472.77-r0?arch=ppc64le&distroversion=v3.21&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/chromium@91.0.4472.77-r0%3Farch=ppc64le&distroversion=v3.21&reponame=community"}],"aliases":["CVE-2021-30540"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-u4hw-r55c-mqg9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/94722?format=json","vulnerability_id":"VCID-v547-6z4g-kba3","summary":"Double free in ICU in Google Chrome prior to 91.0.4472.77 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30535","reference_id":"","reference_type":"","scores":[{"value":"0.00559","scoring_system":"epss","scoring_elements":"0.68295","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00559","scoring_system":"epss","scoring_elements":"0.6832","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00559","scoring_system":"epss","scoring_elements":"0.68173","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00559","scoring_system":"epss","scoring_elements":"0.68196","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00559","scoring_system":"epss","scoring_elements":"0.68214","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00559","scoring_system":"epss","scoring_elements":"0.6819","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00559","scoring_system":"epss","scoring_elements":"0.68241","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00559","scoring_system":"epss","scoring_elements":"0.68256","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00559","scoring_system":"epss","scoring_elements":"0.68281","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00559","scoring_system":"epss","scoring_elements":"0.68269","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00559","scoring_system":"epss","scoring_elements":"0.68235","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00559","scoring_system":"epss","scoring_elements":"0.68275","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00559","scoring_system":"epss","scoring_elements":"0.68286","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00559","scoring_system":"epss","scoring_elements":"0.68266","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00559","scoring_system":"epss","scoring_elements":"0.68309","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00559","scoring_system":"epss","scoring_elements":"0.68318","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30535"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30535","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30535"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079","reference_id":"990079","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079"},{"reference_url":"https://security.archlinux.org/ASA-202106-2","reference_id":"ASA-202106-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-2"},{"reference_url":"https://security.archlinux.org/AVG-1990","reference_id":"AVG-1990","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1990"},{"reference_url":"https://security.archlinux.org/AVG-1991","reference_id":"AVG-1991","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1991"},{"reference_url":"https://usn.ubuntu.com/5156-1/","reference_id":"USN-5156-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5156-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/392107?format=json","purl":"pkg:apk/alpine/chromium@91.0.4472.77-r0?arch=ppc64le&distroversion=v3.21&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/chromium@91.0.4472.77-r0%3Farch=ppc64le&distroversion=v3.21&reponame=community"}],"aliases":["CVE-2021-30535"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v547-6z4g-kba3"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/chromium@91.0.4472.77-r0%3Farch=ppc64le&distroversion=v3.21&reponame=community"}