{"url":"http://public2.vulnerablecode.io/api/packages/552187?format=json","purl":"pkg:apk/alpine/mozjs78@78.7.0-r0?arch=aarch64&distroversion=v3.16&reponame=community","type":"apk","namespace":"alpine","name":"mozjs78","version":"78.7.0-r0","qualifiers":{"arch":"aarch64","distroversion":"v3.16","reponame":"community"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"78.8.0-r0","latest_non_vulnerable_version":"78.15.0-r0","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36565?format=json","vulnerability_id":"VCID-3nzs-5tgj-q3hw","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird,\n    the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23964.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23964.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-23964","reference_id":"","reference_type":"","scores":[{"value":"0.00376","scoring_system":"epss","scoring_elements":"0.59204","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00376","scoring_system":"epss","scoring_elements":"0.59215","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00376","scoring_system":"epss","scoring_elements":"0.59196","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00376","scoring_system":"epss","scoring_elements":"0.59232","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00376","scoring_system":"epss","scoring_elements":"0.59237","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00376","scoring_system":"epss","scoring_elements":"0.59218","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00376","scoring_system":"epss","scoring_elements":"0.59199","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00376","scoring_system":"epss","scoring_elements":"0.59087","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00376","scoring_system":"epss","scoring_elements":"0.59161","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00376","scoring_system":"epss","scoring_elements":"0.59185","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00376","scoring_system":"epss","scoring_elements":"0.59149","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00376","scoring_system":"epss","scoring_elements":"0.592","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00376","scoring_system":"epss","scoring_elements":"0.59213","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00376","scoring_system":"epss","scoring_elements":"0.59233","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-23964"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15685","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15685"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16044","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16044"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26976","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26976"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23953","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23953"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23954","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23954"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23960","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23960"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23964","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23964"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1920651","reference_id":"1920651","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1920651"},{"reference_url":"https://security.archlinux.org/ASA-202102-1","reference_id":"ASA-202102-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202102-1"},{"reference_url":"https://security.archlinux.org/ASA-202102-2","reference_id":"ASA-202102-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202102-2"},{"reference_url":"https://security.archlinux.org/AVG-1492","reference_id":"AVG-1492","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1492"},{"reference_url":"https://security.archlinux.org/AVG-1496","reference_id":"AVG-1496","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1496"},{"reference_url":"https://security.gentoo.org/glsa/202102-01","reference_id":"GLSA-202102-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202102-01"},{"reference_url":"https://security.gentoo.org/glsa/202102-02","reference_id":"GLSA-202102-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202102-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-03","reference_id":"mfsa2021-03","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-03"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-04","reference_id":"mfsa2021-04","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-04"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-05","reference_id":"mfsa2021-05","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0285","reference_id":"RHSA-2021:0285","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0285"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0288","reference_id":"RHSA-2021:0288","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0288"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0289","reference_id":"RHSA-2021:0289","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0289"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0290","reference_id":"RHSA-2021:0290","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0290"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0297","reference_id":"RHSA-2021:0297","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0297"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0298","reference_id":"RHSA-2021:0298","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0298"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0299","reference_id":"RHSA-2021:0299","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0299"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0397","reference_id":"RHSA-2021:0397","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0397"},{"reference_url":"https://usn.ubuntu.com/4717-1/","reference_id":"USN-4717-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4717-1/"},{"reference_url":"https://usn.ubuntu.com/4736-1/","reference_id":"USN-4736-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4736-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/552187?format=json","purl":"pkg:apk/alpine/mozjs78@78.7.0-r0?arch=aarch64&distroversion=v3.16&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/mozjs78@78.7.0-r0%3Farch=aarch64&distroversion=v3.16&reponame=community"}],"aliases":["CVE-2021-23964"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3nzs-5tgj-q3hw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36562?format=json","vulnerability_id":"VCID-uhde-5x3s-u7fk","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird,\n    the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23954.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23954.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-23954","reference_id":"","reference_type":"","scores":[{"value":"0.00251","scoring_system":"epss","scoring_elements":"0.48435","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00251","scoring_system":"epss","scoring_elements":"0.48476","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00251","scoring_system":"epss","scoring_elements":"0.48489","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00251","scoring_system":"epss","scoring_elements":"0.48539","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00251","scoring_system":"epss","scoring_elements":"0.48534","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00251","scoring_system":"epss","scoring_elements":"0.48492","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00251","scoring_system":"epss","scoring_elements":"0.48477","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00251","scoring_system":"epss","scoring_elements":"0.4842","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00251","scoring_system":"epss","scoring_elements":"0.48456","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00251","scoring_system":"epss","scoring_elements":"0.48478","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00251","scoring_system":"epss","scoring_elements":"0.48431","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00251","scoring_system":"epss","scoring_elements":"0.48485","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00251","scoring_system":"epss","scoring_elements":"0.4848","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00251","scoring_system":"epss","scoring_elements":"0.48503","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-23954"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15685","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15685"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16044","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16044"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26976","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26976"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23953","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23953"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23954","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23954"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23960","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23960"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23964","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23964"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1920648","reference_id":"1920648","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1920648"},{"reference_url":"https://security.archlinux.org/ASA-202102-1","reference_id":"ASA-202102-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202102-1"},{"reference_url":"https://security.archlinux.org/ASA-202102-2","reference_id":"ASA-202102-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202102-2"},{"reference_url":"https://security.archlinux.org/AVG-1492","reference_id":"AVG-1492","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1492"},{"reference_url":"https://security.archlinux.org/AVG-1496","reference_id":"AVG-1496","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1496"},{"reference_url":"https://security.gentoo.org/glsa/202102-01","reference_id":"GLSA-202102-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202102-01"},{"reference_url":"https://security.gentoo.org/glsa/202102-02","reference_id":"GLSA-202102-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202102-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-03","reference_id":"mfsa2021-03","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-03"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-04","reference_id":"mfsa2021-04","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-04"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-05","reference_id":"mfsa2021-05","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0285","reference_id":"RHSA-2021:0285","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0285"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0288","reference_id":"RHSA-2021:0288","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0288"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0289","reference_id":"RHSA-2021:0289","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0289"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0290","reference_id":"RHSA-2021:0290","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0290"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0297","reference_id":"RHSA-2021:0297","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0297"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0298","reference_id":"RHSA-2021:0298","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0298"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0299","reference_id":"RHSA-2021:0299","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0299"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0397","reference_id":"RHSA-2021:0397","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0397"},{"reference_url":"https://usn.ubuntu.com/4717-1/","reference_id":"USN-4717-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4717-1/"},{"reference_url":"https://usn.ubuntu.com/4736-1/","reference_id":"USN-4736-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4736-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/552187?format=json","purl":"pkg:apk/alpine/mozjs78@78.7.0-r0?arch=aarch64&distroversion=v3.16&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/mozjs78@78.7.0-r0%3Farch=aarch64&distroversion=v3.16&reponame=community"}],"aliases":["CVE-2021-23954"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uhde-5x3s-u7fk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36564?format=json","vulnerability_id":"VCID-y7u2-9qe6-17g4","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird,\n    the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23960.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23960.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-23960","reference_id":"","reference_type":"","scores":[{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53654","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53692","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.5373","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53734","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53715","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53678","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53689","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53608","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53632","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.5366","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53628","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53679","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53677","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53726","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53709","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-23960"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15685","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15685"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16044","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16044"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26976","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26976"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23953","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23953"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23954","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23954"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23960","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23960"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23964","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23964"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1920650","reference_id":"1920650","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1920650"},{"reference_url":"https://security.archlinux.org/ASA-202102-1","reference_id":"ASA-202102-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202102-1"},{"reference_url":"https://security.archlinux.org/ASA-202102-2","reference_id":"ASA-202102-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202102-2"},{"reference_url":"https://security.archlinux.org/AVG-1492","reference_id":"AVG-1492","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1492"},{"reference_url":"https://security.archlinux.org/AVG-1496","reference_id":"AVG-1496","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1496"},{"reference_url":"https://security.gentoo.org/glsa/202102-01","reference_id":"GLSA-202102-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202102-01"},{"reference_url":"https://security.gentoo.org/glsa/202102-02","reference_id":"GLSA-202102-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202102-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-03","reference_id":"mfsa2021-03","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-03"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-04","reference_id":"mfsa2021-04","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-04"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-05","reference_id":"mfsa2021-05","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0285","reference_id":"RHSA-2021:0285","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0285"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0288","reference_id":"RHSA-2021:0288","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0288"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0289","reference_id":"RHSA-2021:0289","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0289"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0290","reference_id":"RHSA-2021:0290","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0290"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0297","reference_id":"RHSA-2021:0297","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0297"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0298","reference_id":"RHSA-2021:0298","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0298"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0299","reference_id":"RHSA-2021:0299","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0299"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0397","reference_id":"RHSA-2021:0397","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0397"},{"reference_url":"https://usn.ubuntu.com/4717-1/","reference_id":"USN-4717-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4717-1/"},{"reference_url":"https://usn.ubuntu.com/4736-1/","reference_id":"USN-4736-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4736-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/552187?format=json","purl":"pkg:apk/alpine/mozjs78@78.7.0-r0?arch=aarch64&distroversion=v3.16&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/mozjs78@78.7.0-r0%3Farch=aarch64&distroversion=v3.16&reponame=community"}],"aliases":["CVE-2021-23960"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y7u2-9qe6-17g4"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/mozjs78@78.7.0-r0%3Farch=aarch64&distroversion=v3.16&reponame=community"}