{"url":"http://public2.vulnerablecode.io/api/packages/440713?format=json","purl":"pkg:apk/alpine/firefox@88.0-r0?arch=s390x&distroversion=v3.20&reponame=community","type":"apk","namespace":"alpine","name":"firefox","version":"88.0-r0","qualifiers":{"arch":"s390x","distroversion":"v3.20","reponame":"community"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"88.0.1-r0","latest_non_vulnerable_version":"119.0-r0","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50232?format=json","vulnerability_id":"VCID-1e61-jk2b-aubw","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23994.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23994.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-23994","reference_id":"","reference_type":"","scores":[{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57307","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57373","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57388","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57368","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57347","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57304","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57327","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57238","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.5732","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57344","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57371","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-23994"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23961","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23961"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23991","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23991"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23992","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23992"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23993","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23993"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23994","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23994"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23995","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23995"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23998","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23998"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23999","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23999"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24002","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24002"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29945","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29945"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29946","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29946"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29948","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29948"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29949","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29949"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951364","reference_id":"1951364","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951364"},{"reference_url":"https://security.archlinux.org/ASA-202104-3","reference_id":"ASA-202104-3","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202104-3"},{"reference_url":"https://security.archlinux.org/ASA-202104-4","reference_id":"ASA-202104-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202104-4"},{"reference_url":"https://security.archlinux.org/AVG-1834","reference_id":"AVG-1834","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1834"},{"reference_url":"https://security.archlinux.org/AVG-1836","reference_id":"AVG-1836","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1836"},{"reference_url":"https://security.gentoo.org/glsa/202104-09","reference_id":"GLSA-202104-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202104-09"},{"reference_url":"https://security.gentoo.org/glsa/202104-10","reference_id":"GLSA-202104-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202104-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-14","reference_id":"mfsa2021-14","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-14"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-15","reference_id":"mfsa2021-15","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-15"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-16","reference_id":"mfsa2021-16","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-16"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1350","reference_id":"RHSA-2021:1350","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1350"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1351","reference_id":"RHSA-2021:1351","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1351"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1352","reference_id":"RHSA-2021:1352","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1353","reference_id":"RHSA-2021:1353","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1353"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1360","reference_id":"RHSA-2021:1360","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1360"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1361","reference_id":"RHSA-2021:1361","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1361"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1362","reference_id":"RHSA-2021:1362","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1362"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1363","reference_id":"RHSA-2021:1363","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1363"},{"reference_url":"https://usn.ubuntu.com/4926-1/","reference_id":"USN-4926-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4926-1/"},{"reference_url":"https://usn.ubuntu.com/4995-1/","reference_id":"USN-4995-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4995-1/"},{"reference_url":"https://usn.ubuntu.com/4995-2/","reference_id":"USN-4995-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4995-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/440713?format=json","purl":"pkg:apk/alpine/firefox@88.0-r0?arch=s390x&distroversion=v3.20&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@88.0-r0%3Farch=s390x&distroversion=v3.20&reponame=community"}],"aliases":["CVE-2021-23994"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1e61-jk2b-aubw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50238?format=json","vulnerability_id":"VCID-2cd3-m37k-5ydh","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29946.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29946.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-29946","reference_id":"","reference_type":"","scores":[{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.36875","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37243","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37289","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37272","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37218","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.36994","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.36962","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37207","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37374","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.374","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37228","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37279","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37293","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37304","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.3727","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-29946"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23961","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23961"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23991","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23991"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23992","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23992"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23993","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23993"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23994","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23994"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23995","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23995"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23998","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23998"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23999","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23999"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24002","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24002"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29945","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29945"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29946","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29946"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29948","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29948"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29949","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29949"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951371","reference_id":"1951371","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951371"},{"reference_url":"https://security.archlinux.org/ASA-202104-3","reference_id":"ASA-202104-3","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202104-3"},{"reference_url":"https://security.archlinux.org/ASA-202104-4","reference_id":"ASA-202104-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202104-4"},{"reference_url":"https://security.archlinux.org/AVG-1834","reference_id":"AVG-1834","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1834"},{"reference_url":"https://security.archlinux.org/AVG-1836","reference_id":"AVG-1836","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1836"},{"reference_url":"https://security.gentoo.org/glsa/202104-09","reference_id":"GLSA-202104-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202104-09"},{"reference_url":"https://security.gentoo.org/glsa/202104-10","reference_id":"GLSA-202104-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202104-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-14","reference_id":"mfsa2021-14","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-14"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-15","reference_id":"mfsa2021-15","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-15"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-16","reference_id":"mfsa2021-16","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-16"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1350","reference_id":"RHSA-2021:1350","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1350"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1351","reference_id":"RHSA-2021:1351","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1351"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1352","reference_id":"RHSA-2021:1352","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1353","reference_id":"RHSA-2021:1353","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1353"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1360","reference_id":"RHSA-2021:1360","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1360"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1361","reference_id":"RHSA-2021:1361","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1361"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1362","reference_id":"RHSA-2021:1362","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1362"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1363","reference_id":"RHSA-2021:1363","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1363"},{"reference_url":"https://usn.ubuntu.com/4926-1/","reference_id":"USN-4926-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4926-1/"},{"reference_url":"https://usn.ubuntu.com/4995-1/","reference_id":"USN-4995-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4995-1/"},{"reference_url":"https://usn.ubuntu.com/4995-2/","reference_id":"USN-4995-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4995-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/440713?format=json","purl":"pkg:apk/alpine/firefox@88.0-r0?arch=s390x&distroversion=v3.20&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@88.0-r0%3Farch=s390x&distroversion=v3.20&reponame=community"}],"aliases":["CVE-2021-29946"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2cd3-m37k-5ydh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63196?format=json","vulnerability_id":"VCID-2vdu-1jvt-5uf3","summary":"Lack of escaping allowed HTML injection when a webpage was viewed in Reader View. While a Content Security Policy prevents direct code execution, HTML injection is still possible.*Note: This issue only affected Firefox for Android. Other operating systems are unaffected.*","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-29944","reference_id":"","reference_type":"","scores":[{"value":"0.00377","scoring_system":"epss","scoring_elements":"0.59311","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00377","scoring_system":"epss","scoring_elements":"0.59204","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00377","scoring_system":"epss","scoring_elements":"0.59353","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00377","scoring_system":"epss","scoring_elements":"0.59334","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00377","scoring_system":"epss","scoring_elements":"0.59278","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00377","scoring_system":"epss","scoring_elements":"0.59301","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00377","scoring_system":"epss","scoring_elements":"0.59265","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00377","scoring_system":"epss","scoring_elements":"0.59316","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00377","scoring_system":"epss","scoring_elements":"0.59329","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00377","scoring_system":"epss","scoring_elements":"0.59348","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00377","scoring_system":"epss","scoring_elements":"0.59331","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00377","scoring_system":"epss","scoring_elements":"0.59314","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00377","scoring_system":"epss","scoring_elements":"0.59347","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-29944"},{"reference_url":"https://security.archlinux.org/AVG-1835","reference_id":"AVG-1835","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1835"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-16","reference_id":"mfsa2021-16","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-16"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/440713?format=json","purl":"pkg:apk/alpine/firefox@88.0-r0?arch=s390x&distroversion=v3.20&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@88.0-r0%3Farch=s390x&distroversion=v3.20&reponame=community"}],"aliases":["CVE-2021-29944"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2vdu-1jvt-5uf3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63193?format=json","vulnerability_id":"VCID-7ddz-65jt-pudk","summary":"Due to unexpected data type conversions, a use-after-free could have occurred when interacting with the font cache. We presume that with enough effort this could have been exploited to run arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-23997","reference_id":"","reference_type":"","scores":[{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42374","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42483","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42519","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42456","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42457","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42554","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42583","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42521","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42573","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42582","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42604","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42567","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42539","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42599","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42584","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-23997"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.archlinux.org/ASA-202104-3","reference_id":"ASA-202104-3","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202104-3"},{"reference_url":"https://security.archlinux.org/AVG-1834","reference_id":"AVG-1834","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1834"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-16","reference_id":"mfsa2021-16","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-16"},{"reference_url":"https://usn.ubuntu.com/4926-1/","reference_id":"USN-4926-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4926-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/440713?format=json","purl":"pkg:apk/alpine/firefox@88.0-r0?arch=s390x&distroversion=v3.20&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@88.0-r0%3Farch=s390x&distroversion=v3.20&reponame=community"}],"aliases":["CVE-2021-23997"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7ddz-65jt-pudk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63195?format=json","vulnerability_id":"VCID-8jkx-ad5d-e7cd","summary":"A compromised content process could have performed session history manipulations it should not have been able to due to testing infrastructure that was not restricted to testing-only configurations.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-24001","reference_id":"","reference_type":"","scores":[{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50438","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.5041","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50474","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50483","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50466","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50494","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50448","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50502","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50499","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50541","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50518","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50503","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50546","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50551","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50528","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-24001"},{"reference_url":"https://security.archlinux.org/ASA-202104-3","reference_id":"ASA-202104-3","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202104-3"},{"reference_url":"https://security.archlinux.org/AVG-1834","reference_id":"AVG-1834","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1834"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-16","reference_id":"mfsa2021-16","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-16"},{"reference_url":"https://usn.ubuntu.com/4926-1/","reference_id":"USN-4926-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4926-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/440713?format=json","purl":"pkg:apk/alpine/firefox@88.0-r0?arch=s390x&distroversion=v3.20&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@88.0-r0%3Farch=s390x&distroversion=v3.20&reponame=community"}],"aliases":["CVE-2021-24001"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8jkx-ad5d-e7cd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50234?format=json","vulnerability_id":"VCID-e38r-grgp-rfbn","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23998.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23998.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-23998","reference_id":"","reference_type":"","scores":[{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.36859","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37257","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37229","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37275","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37204","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.36979","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.36947","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37195","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37361","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37387","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37215","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37267","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.3728","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37291","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-23998"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23961","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23961"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23991","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23991"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23992","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23992"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23993","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23993"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23994","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23994"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23995","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23995"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23998","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23998"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23999","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23999"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24002","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24002"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29945","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29945"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29946","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29946"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29948","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29948"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29949","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29949"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951366","reference_id":"1951366","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951366"},{"reference_url":"https://security.archlinux.org/ASA-202104-3","reference_id":"ASA-202104-3","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202104-3"},{"reference_url":"https://security.archlinux.org/ASA-202104-4","reference_id":"ASA-202104-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202104-4"},{"reference_url":"https://security.archlinux.org/AVG-1834","reference_id":"AVG-1834","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1834"},{"reference_url":"https://security.archlinux.org/AVG-1836","reference_id":"AVG-1836","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1836"},{"reference_url":"https://security.gentoo.org/glsa/202104-09","reference_id":"GLSA-202104-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202104-09"},{"reference_url":"https://security.gentoo.org/glsa/202104-10","reference_id":"GLSA-202104-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202104-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-14","reference_id":"mfsa2021-14","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-14"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-15","reference_id":"mfsa2021-15","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-15"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-16","reference_id":"mfsa2021-16","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-16"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1350","reference_id":"RHSA-2021:1350","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1350"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1351","reference_id":"RHSA-2021:1351","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1351"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1352","reference_id":"RHSA-2021:1352","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1353","reference_id":"RHSA-2021:1353","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1353"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1360","reference_id":"RHSA-2021:1360","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1360"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1361","reference_id":"RHSA-2021:1361","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1361"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1362","reference_id":"RHSA-2021:1362","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1362"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1363","reference_id":"RHSA-2021:1363","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1363"},{"reference_url":"https://usn.ubuntu.com/4926-1/","reference_id":"USN-4926-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4926-1/"},{"reference_url":"https://usn.ubuntu.com/4995-1/","reference_id":"USN-4995-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4995-1/"},{"reference_url":"https://usn.ubuntu.com/4995-2/","reference_id":"USN-4995-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4995-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/440713?format=json","purl":"pkg:apk/alpine/firefox@88.0-r0?arch=s390x&distroversion=v3.20&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@88.0-r0%3Farch=s390x&distroversion=v3.20&reponame=community"}],"aliases":["CVE-2021-23998"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e38r-grgp-rfbn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63194?format=json","vulnerability_id":"VCID-e6xd-fmsu-jkgn","summary":"A race condition with requestPointerLock() and setTimeout() could have resulted in a user interacting with one tab when they believed they were on a separate tab. In conjunction with certain elements (such as <input type=\"file\">) this could have led to an attack where a user was confused about the origin of the webpage and potentially disclosed information they did not intend to.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-24000","reference_id":"","reference_type":"","scores":[{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.4619","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46184","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46309","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46253","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46234","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46226","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46245","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46193","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46249","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46251","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46274","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46246","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46256","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46313","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-24000"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.archlinux.org/ASA-202104-3","reference_id":"ASA-202104-3","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202104-3"},{"reference_url":"https://security.archlinux.org/AVG-1834","reference_id":"AVG-1834","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1834"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-16","reference_id":"mfsa2021-16","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-16"},{"reference_url":"https://usn.ubuntu.com/4926-1/","reference_id":"USN-4926-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4926-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/440713?format=json","purl":"pkg:apk/alpine/firefox@88.0-r0?arch=s390x&distroversion=v3.20&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@88.0-r0%3Farch=s390x&distroversion=v3.20&reponame=community"}],"aliases":["CVE-2021-24000"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e6xd-fmsu-jkgn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63197?format=json","vulnerability_id":"VCID-ebus-cbbm-u3dn","summary":"Mozilla developers and community members Ryan VanderMeulen, Sean Feng, Tyson Smith, Julian Seward, Christian Holler reported memory safety bugs present in Firefox 87. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-29947","reference_id":"","reference_type":"","scores":[{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57305","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57236","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57367","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57302","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57325","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57318","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57341","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57369","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57371","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57386","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57366","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57345","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57372","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-29947"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.archlinux.org/ASA-202104-3","reference_id":"ASA-202104-3","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202104-3"},{"reference_url":"https://security.archlinux.org/AVG-1834","reference_id":"AVG-1834","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1834"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-16","reference_id":"mfsa2021-16","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-16"},{"reference_url":"https://usn.ubuntu.com/4926-1/","reference_id":"USN-4926-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4926-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/440713?format=json","purl":"pkg:apk/alpine/firefox@88.0-r0?arch=s390x&distroversion=v3.20&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@88.0-r0%3Farch=s390x&distroversion=v3.20&reponame=community"}],"aliases":["CVE-2021-29947"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ebus-cbbm-u3dn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50233?format=json","vulnerability_id":"VCID-qq5h-5k45-rycm","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23995.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23995.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-23995","reference_id":"","reference_type":"","scores":[{"value":"0.01035","scoring_system":"epss","scoring_elements":"0.77464","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01035","scoring_system":"epss","scoring_elements":"0.77383","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01035","scoring_system":"epss","scoring_elements":"0.7738","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01035","scoring_system":"epss","scoring_elements":"0.7742","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01035","scoring_system":"epss","scoring_elements":"0.77412","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01035","scoring_system":"epss","scoring_elements":"0.77446","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01035","scoring_system":"epss","scoring_elements":"0.77452","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01035","scoring_system":"epss","scoring_elements":"0.77322","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01035","scoring_system":"epss","scoring_elements":"0.77328","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01035","scoring_system":"epss","scoring_elements":"0.77357","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01035","scoring_system":"epss","scoring_elements":"0.77337","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01035","scoring_system":"epss","scoring_elements":"0.77368","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01035","scoring_system":"epss","scoring_elements":"0.77377","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01035","scoring_system":"epss","scoring_elements":"0.77404","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-23995"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23961","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23961"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23991","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23991"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23992","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23992"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23993","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23993"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23994","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23994"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23995","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23995"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23998","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23998"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23999","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23999"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24002","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24002"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29945","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29945"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29946","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29946"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29948","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29948"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29949","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29949"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951365","reference_id":"1951365","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951365"},{"reference_url":"https://security.archlinux.org/ASA-202104-3","reference_id":"ASA-202104-3","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202104-3"},{"reference_url":"https://security.archlinux.org/ASA-202104-4","reference_id":"ASA-202104-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202104-4"},{"reference_url":"https://security.archlinux.org/AVG-1834","reference_id":"AVG-1834","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1834"},{"reference_url":"https://security.archlinux.org/AVG-1836","reference_id":"AVG-1836","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1836"},{"reference_url":"https://security.gentoo.org/glsa/202104-09","reference_id":"GLSA-202104-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202104-09"},{"reference_url":"https://security.gentoo.org/glsa/202104-10","reference_id":"GLSA-202104-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202104-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-14","reference_id":"mfsa2021-14","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-14"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-15","reference_id":"mfsa2021-15","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-15"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-16","reference_id":"mfsa2021-16","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-16"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1350","reference_id":"RHSA-2021:1350","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1350"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1351","reference_id":"RHSA-2021:1351","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1351"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1352","reference_id":"RHSA-2021:1352","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1353","reference_id":"RHSA-2021:1353","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1353"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1360","reference_id":"RHSA-2021:1360","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1360"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1361","reference_id":"RHSA-2021:1361","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1361"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1362","reference_id":"RHSA-2021:1362","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1362"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1363","reference_id":"RHSA-2021:1363","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1363"},{"reference_url":"https://usn.ubuntu.com/4926-1/","reference_id":"USN-4926-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4926-1/"},{"reference_url":"https://usn.ubuntu.com/4995-1/","reference_id":"USN-4995-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4995-1/"},{"reference_url":"https://usn.ubuntu.com/4995-2/","reference_id":"USN-4995-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4995-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/440713?format=json","purl":"pkg:apk/alpine/firefox@88.0-r0?arch=s390x&distroversion=v3.20&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@88.0-r0%3Farch=s390x&distroversion=v3.20&reponame=community"}],"aliases":["CVE-2021-23995"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qq5h-5k45-rycm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63192?format=json","vulnerability_id":"VCID-rmzq-gwbe-qyba","summary":"By utilizing 3D CSS in conjunction with Javascript, content could have been rendered outside the webpage's viewport, resulting in a spoofing attack that could have been used for phishing or other attacks on a user.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-23996","reference_id":"","reference_type":"","scores":[{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50438","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.5041","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50474","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50483","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50466","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50494","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50448","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50502","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50499","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50541","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50518","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50503","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50546","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50551","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0027","scoring_system":"epss","scoring_elements":"0.50528","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-23996"},{"reference_url":"https://security.archlinux.org/ASA-202104-3","reference_id":"ASA-202104-3","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202104-3"},{"reference_url":"https://security.archlinux.org/AVG-1834","reference_id":"AVG-1834","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1834"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-16","reference_id":"mfsa2021-16","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-16"},{"reference_url":"https://usn.ubuntu.com/4926-1/","reference_id":"USN-4926-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4926-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/440713?format=json","purl":"pkg:apk/alpine/firefox@88.0-r0?arch=s390x&distroversion=v3.20&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@88.0-r0%3Farch=s390x&distroversion=v3.20&reponame=community"}],"aliases":["CVE-2021-23996"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rmzq-gwbe-qyba"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50235?format=json","vulnerability_id":"VCID-tjtk-gghp-1kdf","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23999.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23999.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-23999","reference_id":"","reference_type":"","scores":[{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35526","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35897","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35937","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35924","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35874","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35646","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35615","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35828","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.36018","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.36049","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.3588","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35931","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35954","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.3596","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35921","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-23999"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23961","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23961"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23991","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23991"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23992","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23992"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23993","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23993"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23994","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23994"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23995","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23995"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23998","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23998"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23999","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23999"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24002","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24002"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29945","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29945"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29946","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29946"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29948","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29948"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29949","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29949"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951368","reference_id":"1951368","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951368"},{"reference_url":"https://security.archlinux.org/ASA-202104-3","reference_id":"ASA-202104-3","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202104-3"},{"reference_url":"https://security.archlinux.org/ASA-202104-4","reference_id":"ASA-202104-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202104-4"},{"reference_url":"https://security.archlinux.org/AVG-1834","reference_id":"AVG-1834","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1834"},{"reference_url":"https://security.archlinux.org/AVG-1836","reference_id":"AVG-1836","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1836"},{"reference_url":"https://security.gentoo.org/glsa/202104-09","reference_id":"GLSA-202104-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202104-09"},{"reference_url":"https://security.gentoo.org/glsa/202104-10","reference_id":"GLSA-202104-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202104-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-14","reference_id":"mfsa2021-14","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-14"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-15","reference_id":"mfsa2021-15","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-15"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-16","reference_id":"mfsa2021-16","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-16"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1350","reference_id":"RHSA-2021:1350","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1350"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1351","reference_id":"RHSA-2021:1351","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1351"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1352","reference_id":"RHSA-2021:1352","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1353","reference_id":"RHSA-2021:1353","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1353"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1360","reference_id":"RHSA-2021:1360","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1360"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1361","reference_id":"RHSA-2021:1361","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1361"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1362","reference_id":"RHSA-2021:1362","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1362"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1363","reference_id":"RHSA-2021:1363","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1363"},{"reference_url":"https://usn.ubuntu.com/4926-1/","reference_id":"USN-4926-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4926-1/"},{"reference_url":"https://usn.ubuntu.com/4995-1/","reference_id":"USN-4995-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4995-1/"},{"reference_url":"https://usn.ubuntu.com/4995-2/","reference_id":"USN-4995-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4995-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/440713?format=json","purl":"pkg:apk/alpine/firefox@88.0-r0?arch=s390x&distroversion=v3.20&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@88.0-r0%3Farch=s390x&distroversion=v3.20&reponame=community"}],"aliases":["CVE-2021-23999"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tjtk-gghp-1kdf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50236?format=json","vulnerability_id":"VCID-vt2f-abwe-4ba2","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-24002.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-24002.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-24002","reference_id":"","reference_type":"","scores":[{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63973","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63942","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63909","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63944","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63954","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63962","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63974","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63832","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63891","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63918","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63875","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63926","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63943","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63955","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-24002"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23961","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23961"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23991","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23991"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23992","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23992"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23993","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23993"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23994","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23994"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23995","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23995"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23998","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23998"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23999","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23999"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24002","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24002"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29945","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29945"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29946","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29946"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29948","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29948"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29949","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29949"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951369","reference_id":"1951369","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951369"},{"reference_url":"https://security.archlinux.org/ASA-202104-3","reference_id":"ASA-202104-3","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202104-3"},{"reference_url":"https://security.archlinux.org/ASA-202104-4","reference_id":"ASA-202104-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202104-4"},{"reference_url":"https://security.archlinux.org/AVG-1834","reference_id":"AVG-1834","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1834"},{"reference_url":"https://security.archlinux.org/AVG-1836","reference_id":"AVG-1836","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1836"},{"reference_url":"https://security.gentoo.org/glsa/202104-09","reference_id":"GLSA-202104-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202104-09"},{"reference_url":"https://security.gentoo.org/glsa/202104-10","reference_id":"GLSA-202104-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202104-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-14","reference_id":"mfsa2021-14","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-14"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-15","reference_id":"mfsa2021-15","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-15"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-16","reference_id":"mfsa2021-16","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-16"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1350","reference_id":"RHSA-2021:1350","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1350"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1351","reference_id":"RHSA-2021:1351","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1351"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1352","reference_id":"RHSA-2021:1352","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1353","reference_id":"RHSA-2021:1353","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1353"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1360","reference_id":"RHSA-2021:1360","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1360"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1361","reference_id":"RHSA-2021:1361","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1361"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1362","reference_id":"RHSA-2021:1362","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1362"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1363","reference_id":"RHSA-2021:1363","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1363"},{"reference_url":"https://usn.ubuntu.com/4926-1/","reference_id":"USN-4926-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4926-1/"},{"reference_url":"https://usn.ubuntu.com/4995-1/","reference_id":"USN-4995-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4995-1/"},{"reference_url":"https://usn.ubuntu.com/4995-2/","reference_id":"USN-4995-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4995-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/440713?format=json","purl":"pkg:apk/alpine/firefox@88.0-r0?arch=s390x&distroversion=v3.20&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@88.0-r0%3Farch=s390x&distroversion=v3.20&reponame=community"}],"aliases":["CVE-2021-24002"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vt2f-abwe-4ba2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50237?format=json","vulnerability_id":"VCID-vtwu-x1vt-x3bq","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29945.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29945.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-29945","reference_id":"","reference_type":"","scores":[{"value":"0.00409","scoring_system":"epss","scoring_elements":"0.61263","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00409","scoring_system":"epss","scoring_elements":"0.61239","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00409","scoring_system":"epss","scoring_elements":"0.61279","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00409","scoring_system":"epss","scoring_elements":"0.61283","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00409","scoring_system":"epss","scoring_elements":"0.61265","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00409","scoring_system":"epss","scoring_elements":"0.61254","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00409","scoring_system":"epss","scoring_elements":"0.6127","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00409","scoring_system":"epss","scoring_elements":"0.61116","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00409","scoring_system":"epss","scoring_elements":"0.61194","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00409","scoring_system":"epss","scoring_elements":"0.61222","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00409","scoring_system":"epss","scoring_elements":"0.61189","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00409","scoring_system":"epss","scoring_elements":"0.61237","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00409","scoring_system":"epss","scoring_elements":"0.61251","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00409","scoring_system":"epss","scoring_elements":"0.61272","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00409","scoring_system":"epss","scoring_elements":"0.61258","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-29945"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23961","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23961"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23991","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23991"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23992","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23992"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23993","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23993"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23994","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23994"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23995","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23995"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23998","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23998"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23999","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23999"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24002","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24002"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29945","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29945"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29946","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29946"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29948","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29948"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29949","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29949"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951370","reference_id":"1951370","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951370"},{"reference_url":"https://security.archlinux.org/AVG-1835","reference_id":"AVG-1835","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1835"},{"reference_url":"https://security.archlinux.org/AVG-1837","reference_id":"AVG-1837","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1837"},{"reference_url":"https://security.gentoo.org/glsa/202104-09","reference_id":"GLSA-202104-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202104-09"},{"reference_url":"https://security.gentoo.org/glsa/202104-10","reference_id":"GLSA-202104-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202104-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-14","reference_id":"mfsa2021-14","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-14"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-15","reference_id":"mfsa2021-15","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-15"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-16","reference_id":"mfsa2021-16","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-16"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1350","reference_id":"RHSA-2021:1350","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1350"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1351","reference_id":"RHSA-2021:1351","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1351"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1352","reference_id":"RHSA-2021:1352","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1353","reference_id":"RHSA-2021:1353","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1353"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1360","reference_id":"RHSA-2021:1360","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1360"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1361","reference_id":"RHSA-2021:1361","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1361"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1362","reference_id":"RHSA-2021:1362","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1362"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1363","reference_id":"RHSA-2021:1363","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1363"},{"reference_url":"https://usn.ubuntu.com/4926-1/","reference_id":"USN-4926-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4926-1/"},{"reference_url":"https://usn.ubuntu.com/4995-1/","reference_id":"USN-4995-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4995-1/"},{"reference_url":"https://usn.ubuntu.com/4995-2/","reference_id":"USN-4995-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4995-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/440713?format=json","purl":"pkg:apk/alpine/firefox@88.0-r0?arch=s390x&distroversion=v3.20&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@88.0-r0%3Farch=s390x&distroversion=v3.20&reponame=community"}],"aliases":["CVE-2021-29945"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vtwu-x1vt-x3bq"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@88.0-r0%3Farch=s390x&distroversion=v3.20&reponame=community"}