{"url":"http://public2.vulnerablecode.io/api/packages/77880?format=json","purl":"pkg:ebuild/www-client/google-chrome@91.0.4472.114","type":"ebuild","namespace":"www-client","name":"google-chrome","version":"91.0.4472.114","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"91.0.4472.164","latest_non_vulnerable_version":"141.0.7390.107","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49448?format=json","vulnerability_id":"VCID-164n-utpb-2kbu","summary":"Multiple vulnerabillities have been found in Chromium and Google\n    Chrome, the worst of which could allow remote attackers to execute\n    arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30544","reference_id":"","reference_type":"","scores":[{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55135","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.5505","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55076","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.54965","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55067","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55092","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55068","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55118","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55117","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55129","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55109","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55133","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55113","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55047","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.5504","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.5499","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55031","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55089","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30544"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30544","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30544"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079","reference_id":"990079","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079"},{"reference_url":"https://security.archlinux.org/ASA-202106-31","reference_id":"ASA-202106-31","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-31"},{"reference_url":"https://security.archlinux.org/ASA-202106-32","reference_id":"ASA-202106-32","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-32"},{"reference_url":"https://security.archlinux.org/AVG-2057","reference_id":"AVG-2057","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2057"},{"reference_url":"https://security.archlinux.org/AVG-2058","reference_id":"AVG-2058","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2058"},{"reference_url":"https://security.gentoo.org/glsa/202107-06","reference_id":"GLSA-202107-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-06"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77880?format=json","purl":"pkg:ebuild/www-client/google-chrome@91.0.4472.114","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/google-chrome@91.0.4472.114"}],"aliases":["CVE-2021-30544"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-164n-utpb-2kbu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49450?format=json","vulnerability_id":"VCID-1xad-pgff-w3ad","summary":"Multiple vulnerabillities have been found in Chromium and Google\n    Chrome, the worst of which could allow remote attackers to execute\n    arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30546","reference_id":"","reference_type":"","scores":[{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.71411","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.71328","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.71356","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.71163","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.71173","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.7119","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.71165","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.71207","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.7122","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.71243","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.71228","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.71212","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.71258","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.71265","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.71242","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.71296","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.71303","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.71307","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.71292","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.71329","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.71364","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30546"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30546","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30546"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079","reference_id":"990079","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079"},{"reference_url":"https://security.archlinux.org/ASA-202106-31","reference_id":"ASA-202106-31","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-31"},{"reference_url":"https://security.archlinux.org/ASA-202106-32","reference_id":"ASA-202106-32","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-32"},{"reference_url":"https://security.archlinux.org/AVG-2057","reference_id":"AVG-2057","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2057"},{"reference_url":"https://security.archlinux.org/AVG-2058","reference_id":"AVG-2058","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2058"},{"reference_url":"https://security.gentoo.org/glsa/202107-06","reference_id":"GLSA-202107-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-06"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77880?format=json","purl":"pkg:ebuild/www-client/google-chrome@91.0.4472.114","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/google-chrome@91.0.4472.114"}],"aliases":["CVE-2021-30546"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1xad-pgff-w3ad"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49427?format=json","vulnerability_id":"VCID-2csy-wafr-bydm","summary":"Multiple vulnerabillities have been found in Chromium and Google\n    Chrome, the worst of which could allow remote attackers to execute\n    arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30518","reference_id":"","reference_type":"","scores":[{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75285","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.7523","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75053","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75056","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75086","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75063","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75097","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75108","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.7513","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75109","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75098","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75136","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75143","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75133","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75171","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75175","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75179","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75188","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75216","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.7524","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75222","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30518"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30506","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30506"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30507","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30507"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30508","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30508"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30509","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30509"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30510","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30510"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30511","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30511"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30512","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30512"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30513","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30513"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30514","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30514"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30515","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30515"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30516","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30516"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30517","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30517"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30518","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30518"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30519","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30519"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30520","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30520"},{"reference_url":"https://security.archlinux.org/ASA-202105-7","reference_id":"ASA-202105-7","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202105-7"},{"reference_url":"https://security.archlinux.org/ASA-202105-8","reference_id":"ASA-202105-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202105-8"},{"reference_url":"https://security.archlinux.org/AVG-1936","reference_id":"AVG-1936","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1936"},{"reference_url":"https://security.archlinux.org/AVG-1937","reference_id":"AVG-1937","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1937"},{"reference_url":"https://security.gentoo.org/glsa/202107-06","reference_id":"GLSA-202107-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-06"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77880?format=json","purl":"pkg:ebuild/www-client/google-chrome@91.0.4472.114","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/google-chrome@91.0.4472.114"}],"aliases":["CVE-2021-30518"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2csy-wafr-bydm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49425?format=json","vulnerability_id":"VCID-3fmx-ejpm-eydy","summary":"Multiple vulnerabillities have been found in Chromium and Google\n    Chrome, the worst of which could allow remote attackers to execute\n    arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30516","reference_id":"","reference_type":"","scores":[{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75285","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.7523","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75053","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75056","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75086","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75063","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75097","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75108","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.7513","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75109","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75098","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75136","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75143","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75133","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75171","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75175","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75179","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75188","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75216","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.7524","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75222","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30516"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30506","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30506"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30507","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30507"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30508","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30508"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30509","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30509"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30510","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30510"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30511","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30511"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30512","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30512"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30513","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30513"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30514","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30514"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30515","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30515"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30516","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30516"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30517","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30517"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30518","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30518"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30519","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30519"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30520","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30520"},{"reference_url":"https://security.archlinux.org/ASA-202105-7","reference_id":"ASA-202105-7","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202105-7"},{"reference_url":"https://security.archlinux.org/ASA-202105-8","reference_id":"ASA-202105-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202105-8"},{"reference_url":"https://security.archlinux.org/AVG-1936","reference_id":"AVG-1936","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1936"},{"reference_url":"https://security.archlinux.org/AVG-1937","reference_id":"AVG-1937","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1937"},{"reference_url":"https://security.gentoo.org/glsa/202107-06","reference_id":"GLSA-202107-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-06"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77880?format=json","purl":"pkg:ebuild/www-client/google-chrome@91.0.4472.114","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/google-chrome@91.0.4472.114"}],"aliases":["CVE-2021-30516"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3fmx-ejpm-eydy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49458?format=json","vulnerability_id":"VCID-45u1-h4wv-uqck","summary":"Multiple vulnerabillities have been found in Chromium and Google\n    Chrome, the worst of which could allow remote attackers to execute\n    arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30555","reference_id":"","reference_type":"","scores":[{"value":"0.00287","scoring_system":"epss","scoring_elements":"0.52238","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00287","scoring_system":"epss","scoring_elements":"0.52158","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00287","scoring_system":"epss","scoring_elements":"0.52086","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00287","scoring_system":"epss","scoring_elements":"0.52129","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00287","scoring_system":"epss","scoring_elements":"0.52156","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00287","scoring_system":"epss","scoring_elements":"0.52121","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00287","scoring_system":"epss","scoring_elements":"0.52173","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00287","scoring_system":"epss","scoring_elements":"0.52169","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00287","scoring_system":"epss","scoring_elements":"0.52221","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00287","scoring_system":"epss","scoring_elements":"0.52204","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00287","scoring_system":"epss","scoring_elements":"0.52189","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00287","scoring_system":"epss","scoring_elements":"0.52229","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00287","scoring_system":"epss","scoring_elements":"0.52232","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00287","scoring_system":"epss","scoring_elements":"0.52215","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00287","scoring_system":"epss","scoring_elements":"0.52164","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00287","scoring_system":"epss","scoring_elements":"0.5217","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00287","scoring_system":"epss","scoring_elements":"0.52134","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00287","scoring_system":"epss","scoring_elements":"0.5208","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00287","scoring_system":"epss","scoring_elements":"0.52131","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30555"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30555","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30555"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079","reference_id":"990079","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079"},{"reference_url":"https://security.archlinux.org/ASA-202106-46","reference_id":"ASA-202106-46","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-46"},{"reference_url":"https://security.archlinux.org/ASA-202106-47","reference_id":"ASA-202106-47","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-47"},{"reference_url":"https://security.archlinux.org/AVG-2081","reference_id":"AVG-2081","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2081"},{"reference_url":"https://security.archlinux.org/AVG-2082","reference_id":"AVG-2082","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2082"},{"reference_url":"https://security.gentoo.org/glsa/202107-06","reference_id":"GLSA-202107-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-06"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77880?format=json","purl":"pkg:ebuild/www-client/google-chrome@91.0.4472.114","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/google-chrome@91.0.4472.114"}],"aliases":["CVE-2021-30555"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-45u1-h4wv-uqck"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49422?format=json","vulnerability_id":"VCID-4mtb-xuvx-p7a1","summary":"Multiple vulnerabillities have been found in Chromium and Google\n    Chrome, the worst of which could allow remote attackers to execute\n    arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30513","reference_id":"","reference_type":"","scores":[{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.78106","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.78063","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.77856","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.77864","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.77891","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.77874","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.77901","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.77906","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.77932","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.77916","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.77954","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.77952","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.77946","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.77979","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.77987","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.77999","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.78009","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.78038","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.78055","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.78045","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30513"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30506","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30506"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30507","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30507"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30508","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30508"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30509","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30509"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30510","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30510"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30511","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30511"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30512","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30512"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30513","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30513"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30514","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30514"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30515","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30515"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30516","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30516"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30517","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30517"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30518","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30518"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30519","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30519"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30520","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30520"},{"reference_url":"https://security.archlinux.org/ASA-202105-7","reference_id":"ASA-202105-7","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202105-7"},{"reference_url":"https://security.archlinux.org/ASA-202105-8","reference_id":"ASA-202105-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202105-8"},{"reference_url":"https://security.archlinux.org/AVG-1936","reference_id":"AVG-1936","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1936"},{"reference_url":"https://security.archlinux.org/AVG-1937","reference_id":"AVG-1937","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1937"},{"reference_url":"https://security.gentoo.org/glsa/202107-06","reference_id":"GLSA-202107-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-06"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77880?format=json","purl":"pkg:ebuild/www-client/google-chrome@91.0.4472.114","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/google-chrome@91.0.4472.114"}],"aliases":["CVE-2021-30513"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4mtb-xuvx-p7a1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49428?format=json","vulnerability_id":"VCID-72nk-wdkx-pkh6","summary":"Multiple vulnerabillities have been found in Chromium and Google\n    Chrome, the worst of which could allow remote attackers to execute\n    arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30519","reference_id":"","reference_type":"","scores":[{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55262","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55201","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55092","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55193","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55217","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55195","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55244","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55245","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55256","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55236","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55255","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55259","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55238","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55175","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55196","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55167","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55115","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55158","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55215","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30519"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30506","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30506"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30507","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30507"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30508","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30508"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30509","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30509"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30510","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30510"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30511","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30511"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30512","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30512"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30513","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30513"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30514","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30514"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30515","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30515"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30516","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30516"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30517","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30517"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30518","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30518"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30519","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30519"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30520","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30520"},{"reference_url":"https://security.archlinux.org/ASA-202105-7","reference_id":"ASA-202105-7","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202105-7"},{"reference_url":"https://security.archlinux.org/ASA-202105-8","reference_id":"ASA-202105-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202105-8"},{"reference_url":"https://security.archlinux.org/AVG-1936","reference_id":"AVG-1936","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1936"},{"reference_url":"https://security.archlinux.org/AVG-1937","reference_id":"AVG-1937","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1937"},{"reference_url":"https://security.gentoo.org/glsa/202107-06","reference_id":"GLSA-202107-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-06"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77880?format=json","purl":"pkg:ebuild/www-client/google-chrome@91.0.4472.114","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/google-chrome@91.0.4472.114"}],"aliases":["CVE-2021-30519"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-72nk-wdkx-pkh6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49456?format=json","vulnerability_id":"VCID-7cbs-rmcu-rqgf","summary":"Multiple vulnerabillities have been found in Chromium and Google\n    Chrome, the worst of which could allow remote attackers to execute\n    arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30553","reference_id":"","reference_type":"","scores":[{"value":"0.00774","scoring_system":"epss","scoring_elements":"0.73764","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00774","scoring_system":"epss","scoring_elements":"0.73683","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00774","scoring_system":"epss","scoring_elements":"0.73705","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00774","scoring_system":"epss","scoring_elements":"0.73541","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00774","scoring_system":"epss","scoring_elements":"0.73549","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00774","scoring_system":"epss","scoring_elements":"0.73572","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00774","scoring_system":"epss","scoring_elements":"0.73544","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00774","scoring_system":"epss","scoring_elements":"0.7358","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00774","scoring_system":"epss","scoring_elements":"0.73594","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00774","scoring_system":"epss","scoring_elements":"0.73616","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00774","scoring_system":"epss","scoring_elements":"0.73598","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00774","scoring_system":"epss","scoring_elements":"0.73591","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00774","scoring_system":"epss","scoring_elements":"0.73635","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00774","scoring_system":"epss","scoring_elements":"0.73644","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00774","scoring_system":"epss","scoring_elements":"0.73636","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00774","scoring_system":"epss","scoring_elements":"0.73669","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00774","scoring_system":"epss","scoring_elements":"0.73678","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00774","scoring_system":"epss","scoring_elements":"0.73677","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00774","scoring_system":"epss","scoring_elements":"0.73672","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00774","scoring_system":"epss","scoring_elements":"0.73697","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00774","scoring_system":"epss","scoring_elements":"0.73721","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30553"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30553","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30553"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079","reference_id":"990079","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079"},{"reference_url":"https://security.archlinux.org/ASA-202106-31","reference_id":"ASA-202106-31","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-31"},{"reference_url":"https://security.archlinux.org/ASA-202106-32","reference_id":"ASA-202106-32","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-32"},{"reference_url":"https://security.archlinux.org/AVG-2057","reference_id":"AVG-2057","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2057"},{"reference_url":"https://security.archlinux.org/AVG-2058","reference_id":"AVG-2058","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2058"},{"reference_url":"https://security.gentoo.org/glsa/202107-06","reference_id":"GLSA-202107-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-06"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77880?format=json","purl":"pkg:ebuild/www-client/google-chrome@91.0.4472.114","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/google-chrome@91.0.4472.114"}],"aliases":["CVE-2021-30553"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7cbs-rmcu-rqgf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49432?format=json","vulnerability_id":"VCID-7fef-qr2c-gbcp","summary":"Multiple vulnerabillities have been found in Chromium and Google\n    Chrome, the worst of which could allow remote attackers to execute\n    arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30523","reference_id":"","reference_type":"","scores":[{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70659","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70607","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70409","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70422","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.7044","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70418","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70463","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70479","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70503","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70488","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70474","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70516","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70524","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70504","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70554","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70563","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70537","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70577","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70609","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70579","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30523"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30523","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30523"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079","reference_id":"990079","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079"},{"reference_url":"https://security.archlinux.org/ASA-202106-2","reference_id":"ASA-202106-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-2"},{"reference_url":"https://security.archlinux.org/AVG-1990","reference_id":"AVG-1990","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1990"},{"reference_url":"https://security.archlinux.org/AVG-1991","reference_id":"AVG-1991","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1991"},{"reference_url":"https://security.gentoo.org/glsa/202107-06","reference_id":"GLSA-202107-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-06"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77880?format=json","purl":"pkg:ebuild/www-client/google-chrome@91.0.4472.114","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/google-chrome@91.0.4472.114"}],"aliases":["CVE-2021-30523"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7fef-qr2c-gbcp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49426?format=json","vulnerability_id":"VCID-813k-vj23-nfa2","summary":"Multiple vulnerabillities have been found in Chromium and Google\n    Chrome, the worst of which could allow remote attackers to execute\n    arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30517","reference_id":"","reference_type":"","scores":[{"value":"0.09601","scoring_system":"epss","scoring_elements":"0.92961","published_at":"2026-05-14T12:55:00Z"},{"value":"0.14196","scoring_system":"epss","scoring_elements":"0.94382","published_at":"2026-04-13T12:55:00Z"},{"value":"0.14196","scoring_system":"epss","scoring_elements":"0.94435","published_at":"2026-05-11T12:55:00Z"},{"value":"0.14196","scoring_system":"epss","scoring_elements":"0.94442","published_at":"2026-05-12T12:55:00Z"},{"value":"0.14196","scoring_system":"epss","scoring_elements":"0.94351","published_at":"2026-04-02T12:55:00Z"},{"value":"0.14196","scoring_system":"epss","scoring_elements":"0.94362","published_at":"2026-04-04T12:55:00Z"},{"value":"0.14196","scoring_system":"epss","scoring_elements":"0.94363","published_at":"2026-04-07T12:55:00Z"},{"value":"0.14196","scoring_system":"epss","scoring_elements":"0.94372","published_at":"2026-04-08T12:55:00Z"},{"value":"0.14196","scoring_system":"epss","scoring_elements":"0.94377","published_at":"2026-04-09T12:55:00Z"},{"value":"0.14196","scoring_system":"epss","scoring_elements":"0.9438","published_at":"2026-04-11T12:55:00Z"},{"value":"0.14196","scoring_system":"epss","scoring_elements":"0.94381","published_at":"2026-04-12T12:55:00Z"},{"value":"0.14196","scoring_system":"epss","scoring_elements":"0.94343","published_at":"2026-04-01T12:55:00Z"},{"value":"0.14196","scoring_system":"epss","scoring_elements":"0.94397","published_at":"2026-04-16T12:55:00Z"},{"value":"0.14196","scoring_system":"epss","scoring_elements":"0.94402","published_at":"2026-04-29T12:55:00Z"},{"value":"0.14196","scoring_system":"epss","scoring_elements":"0.94405","published_at":"2026-04-26T12:55:00Z"},{"value":"0.14196","scoring_system":"epss","scoring_elements":"0.94407","published_at":"2026-04-24T12:55:00Z"},{"value":"0.14196","scoring_system":"epss","scoring_elements":"0.94409","published_at":"2026-05-05T12:55:00Z"},{"value":"0.14196","scoring_system":"epss","scoring_elements":"0.94416","published_at":"2026-05-07T12:55:00Z"},{"value":"0.14196","scoring_system":"epss","scoring_elements":"0.94428","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30517"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30506","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30506"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30507","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30507"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30508","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30508"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30509","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30509"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30510","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30510"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30511","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30511"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30512","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30512"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30513","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30513"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30514","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30514"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30515","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30515"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30516","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30516"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30517","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30517"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30518","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30518"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30519","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30519"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30520","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30520"},{"reference_url":"https://security.archlinux.org/ASA-202105-7","reference_id":"ASA-202105-7","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202105-7"},{"reference_url":"https://security.archlinux.org/ASA-202105-8","reference_id":"ASA-202105-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202105-8"},{"reference_url":"https://security.archlinux.org/AVG-1936","reference_id":"AVG-1936","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1936"},{"reference_url":"https://security.archlinux.org/AVG-1937","reference_id":"AVG-1937","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1937"},{"reference_url":"https://security.gentoo.org/glsa/202107-06","reference_id":"GLSA-202107-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-06"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77880?format=json","purl":"pkg:ebuild/www-client/google-chrome@91.0.4472.114","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/google-chrome@91.0.4472.114"}],"aliases":["CVE-2021-30517"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-813k-vj23-nfa2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49442?format=json","vulnerability_id":"VCID-81s9-h9rs-bkfh","summary":"Multiple vulnerabillities have been found in Chromium and Google\n    Chrome, the worst of which could allow remote attackers to execute\n    arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30534","reference_id":"","reference_type":"","scores":[{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30082","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30009","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30519","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30657","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30703","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30515","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30574","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30608","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30611","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30567","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.3052","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30545","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30527","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30492","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30312","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30198","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30117","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.29977","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30049","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30058","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.29988","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30534"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30534","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30534"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079","reference_id":"990079","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079"},{"reference_url":"https://security.archlinux.org/ASA-202106-2","reference_id":"ASA-202106-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-2"},{"reference_url":"https://security.archlinux.org/AVG-1990","reference_id":"AVG-1990","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1990"},{"reference_url":"https://security.archlinux.org/AVG-1991","reference_id":"AVG-1991","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1991"},{"reference_url":"https://security.gentoo.org/glsa/202107-06","reference_id":"GLSA-202107-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-06"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77880?format=json","purl":"pkg:ebuild/www-client/google-chrome@91.0.4472.114","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/google-chrome@91.0.4472.114"}],"aliases":["CVE-2021-30534"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-81s9-h9rs-bkfh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49460?format=json","vulnerability_id":"VCID-89s1-3src-5qfm","summary":"Multiple vulnerabillities have been found in Chromium and Google\n    Chrome, the worst of which could allow remote attackers to execute\n    arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30557","reference_id":"","reference_type":"","scores":[{"value":"0.01169","scoring_system":"epss","scoring_elements":"0.78845","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01169","scoring_system":"epss","scoring_elements":"0.78806","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01169","scoring_system":"epss","scoring_elements":"0.78606","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01169","scoring_system":"epss","scoring_elements":"0.78613","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01169","scoring_system":"epss","scoring_elements":"0.78643","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01169","scoring_system":"epss","scoring_elements":"0.78624","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01169","scoring_system":"epss","scoring_elements":"0.7865","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01169","scoring_system":"epss","scoring_elements":"0.78657","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01169","scoring_system":"epss","scoring_elements":"0.78682","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01169","scoring_system":"epss","scoring_elements":"0.78663","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01169","scoring_system":"epss","scoring_elements":"0.78655","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01169","scoring_system":"epss","scoring_elements":"0.78683","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01169","scoring_system":"epss","scoring_elements":"0.78681","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01169","scoring_system":"epss","scoring_elements":"0.78678","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01169","scoring_system":"epss","scoring_elements":"0.78708","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01169","scoring_system":"epss","scoring_elements":"0.78716","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01169","scoring_system":"epss","scoring_elements":"0.78733","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01169","scoring_system":"epss","scoring_elements":"0.78752","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01169","scoring_system":"epss","scoring_elements":"0.78776","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01169","scoring_system":"epss","scoring_elements":"0.78792","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01169","scoring_system":"epss","scoring_elements":"0.78789","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30557"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30557","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30557"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079","reference_id":"990079","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079"},{"reference_url":"https://security.archlinux.org/ASA-202106-46","reference_id":"ASA-202106-46","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-46"},{"reference_url":"https://security.archlinux.org/ASA-202106-47","reference_id":"ASA-202106-47","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-47"},{"reference_url":"https://security.archlinux.org/AVG-2081","reference_id":"AVG-2081","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2081"},{"reference_url":"https://security.archlinux.org/AVG-2082","reference_id":"AVG-2082","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2082"},{"reference_url":"https://security.gentoo.org/glsa/202107-06","reference_id":"GLSA-202107-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-06"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77880?format=json","purl":"pkg:ebuild/www-client/google-chrome@91.0.4472.114","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/google-chrome@91.0.4472.114"}],"aliases":["CVE-2021-30557"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-89s1-3src-5qfm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49431?format=json","vulnerability_id":"VCID-8bhz-3581-bkca","summary":"Multiple vulnerabillities have been found in Chromium and Google\n    Chrome, the worst of which could allow remote attackers to execute\n    arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30522","reference_id":"","reference_type":"","scores":[{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.77258","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.7721","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.76997","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.77003","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.77032","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.77013","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.77045","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.77055","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.77084","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.77063","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.77058","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.77099","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.77101","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.77091","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.77126","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.77133","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.77147","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.77155","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.77184","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.77205","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01007","scoring_system":"epss","scoring_elements":"0.77193","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30522"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30522","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30522"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079","reference_id":"990079","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079"},{"reference_url":"https://security.archlinux.org/ASA-202106-2","reference_id":"ASA-202106-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-2"},{"reference_url":"https://security.archlinux.org/AVG-1990","reference_id":"AVG-1990","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1990"},{"reference_url":"https://security.archlinux.org/AVG-1991","reference_id":"AVG-1991","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1991"},{"reference_url":"https://security.gentoo.org/glsa/202107-06","reference_id":"GLSA-202107-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-06"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77880?format=json","purl":"pkg:ebuild/www-client/google-chrome@91.0.4472.114","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/google-chrome@91.0.4472.114"}],"aliases":["CVE-2021-30522"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8bhz-3581-bkca"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49433?format=json","vulnerability_id":"VCID-9u4b-zjdu-n3b3","summary":"Multiple vulnerabillities have been found in Chromium and Google\n    Chrome, the worst of which could allow remote attackers to execute\n    arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30524","reference_id":"","reference_type":"","scores":[{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51586","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51478","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51428","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51479","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51506","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51466","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51519","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51517","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51561","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.5154","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51528","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51571","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.5158","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.5156","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51513","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.5148","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51424","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51474","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30524"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30524","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30524"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079","reference_id":"990079","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079"},{"reference_url":"https://security.archlinux.org/ASA-202106-2","reference_id":"ASA-202106-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-2"},{"reference_url":"https://security.archlinux.org/AVG-1990","reference_id":"AVG-1990","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1990"},{"reference_url":"https://security.archlinux.org/AVG-1991","reference_id":"AVG-1991","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1991"},{"reference_url":"https://security.gentoo.org/glsa/202107-06","reference_id":"GLSA-202107-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-06"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77880?format=json","purl":"pkg:ebuild/www-client/google-chrome@91.0.4472.114","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/google-chrome@91.0.4472.114"}],"aliases":["CVE-2021-30524"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9u4b-zjdu-n3b3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49417?format=json","vulnerability_id":"VCID-acej-edpb-hybv","summary":"Multiple vulnerabillities have been found in Chromium and Google\n    Chrome, the worst of which could allow remote attackers to execute\n    arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30508","reference_id":"","reference_type":"","scores":[{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.5417","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.541","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54017","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54035","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54061","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54038","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54089","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54087","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54133","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54115","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54098","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54137","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54141","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54121","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54072","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.5402","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54062","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54117","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54075","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30508"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30506","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30506"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30507","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30507"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30508","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30508"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30509","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30509"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30510","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30510"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30511","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30511"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30512","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30512"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30513","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30513"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30514","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30514"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30515","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30515"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30516","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30516"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30517","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30517"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30518","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30518"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30519","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30519"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30520","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30520"},{"reference_url":"https://security.archlinux.org/ASA-202105-7","reference_id":"ASA-202105-7","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202105-7"},{"reference_url":"https://security.archlinux.org/ASA-202105-8","reference_id":"ASA-202105-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202105-8"},{"reference_url":"https://security.archlinux.org/AVG-1936","reference_id":"AVG-1936","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1936"},{"reference_url":"https://security.archlinux.org/AVG-1937","reference_id":"AVG-1937","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1937"},{"reference_url":"https://security.gentoo.org/glsa/202107-06","reference_id":"GLSA-202107-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-06"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77880?format=json","purl":"pkg:ebuild/www-client/google-chrome@91.0.4472.114","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/google-chrome@91.0.4472.114"}],"aliases":["CVE-2021-30508"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-acej-edpb-hybv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49445?format=json","vulnerability_id":"VCID-amkk-esp8-53af","summary":"Multiple vulnerabillities have been found in Chromium and Google\n    Chrome, the worst of which could allow remote attackers to execute\n    arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30538","reference_id":"","reference_type":"","scores":[{"value":"0.00205","scoring_system":"epss","scoring_elements":"0.42412","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00205","scoring_system":"epss","scoring_elements":"0.42346","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00205","scoring_system":"epss","scoring_elements":"0.42544","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00205","scoring_system":"epss","scoring_elements":"0.42616","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00205","scoring_system":"epss","scoring_elements":"0.42644","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00205","scoring_system":"epss","scoring_elements":"0.42584","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00205","scoring_system":"epss","scoring_elements":"0.42636","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00205","scoring_system":"epss","scoring_elements":"0.42647","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00205","scoring_system":"epss","scoring_elements":"0.42671","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00205","scoring_system":"epss","scoring_elements":"0.42634","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00205","scoring_system":"epss","scoring_elements":"0.42606","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00205","scoring_system":"epss","scoring_elements":"0.42665","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00205","scoring_system":"epss","scoring_elements":"0.42652","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00205","scoring_system":"epss","scoring_elements":"0.42587","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00205","scoring_system":"epss","scoring_elements":"0.42525","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00205","scoring_system":"epss","scoring_elements":"0.42526","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00205","scoring_system":"epss","scoring_elements":"0.42442","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00205","scoring_system":"epss","scoring_elements":"0.423","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00205","scoring_system":"epss","scoring_elements":"0.42376","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00205","scoring_system":"epss","scoring_elements":"0.42393","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00205","scoring_system":"epss","scoring_elements":"0.42318","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30538"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30538","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30538"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079","reference_id":"990079","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079"},{"reference_url":"https://security.archlinux.org/ASA-202106-2","reference_id":"ASA-202106-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-2"},{"reference_url":"https://security.archlinux.org/AVG-1990","reference_id":"AVG-1990","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1990"},{"reference_url":"https://security.archlinux.org/AVG-1991","reference_id":"AVG-1991","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1991"},{"reference_url":"https://security.gentoo.org/glsa/202107-06","reference_id":"GLSA-202107-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-06"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77880?format=json","purl":"pkg:ebuild/www-client/google-chrome@91.0.4472.114","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/google-chrome@91.0.4472.114"}],"aliases":["CVE-2021-30538"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-amkk-esp8-53af"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49441?format=json","vulnerability_id":"VCID-aswr-a7yz-tbb3","summary":"Multiple vulnerabillities have been found in Chromium and Google\n    Chrome, the worst of which could allow remote attackers to execute\n    arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30533","reference_id":"","reference_type":"","scores":[{"value":"0.10532","scoring_system":"epss","scoring_elements":"0.93341","published_at":"2026-05-14T12:55:00Z"},{"value":"0.10532","scoring_system":"epss","scoring_elements":"0.9328","published_at":"2026-04-16T12:55:00Z"},{"value":"0.10532","scoring_system":"epss","scoring_elements":"0.93285","published_at":"2026-04-18T12:55:00Z"},{"value":"0.10532","scoring_system":"epss","scoring_elements":"0.93292","published_at":"2026-04-21T12:55:00Z"},{"value":"0.10532","scoring_system":"epss","scoring_elements":"0.93297","published_at":"2026-04-24T12:55:00Z"},{"value":"0.10532","scoring_system":"epss","scoring_elements":"0.93294","published_at":"2026-04-26T12:55:00Z"},{"value":"0.10532","scoring_system":"epss","scoring_elements":"0.9329","published_at":"2026-04-29T12:55:00Z"},{"value":"0.10532","scoring_system":"epss","scoring_elements":"0.93296","published_at":"2026-05-05T12:55:00Z"},{"value":"0.10532","scoring_system":"epss","scoring_elements":"0.9331","published_at":"2026-05-07T12:55:00Z"},{"value":"0.10532","scoring_system":"epss","scoring_elements":"0.93319","published_at":"2026-05-09T12:55:00Z"},{"value":"0.10532","scoring_system":"epss","scoring_elements":"0.9332","published_at":"2026-05-11T12:55:00Z"},{"value":"0.10532","scoring_system":"epss","scoring_elements":"0.93327","published_at":"2026-05-12T12:55:00Z"},{"value":"0.10532","scoring_system":"epss","scoring_elements":"0.93234","published_at":"2026-04-01T12:55:00Z"},{"value":"0.10532","scoring_system":"epss","scoring_elements":"0.93243","published_at":"2026-04-02T12:55:00Z"},{"value":"0.10532","scoring_system":"epss","scoring_elements":"0.93248","published_at":"2026-04-04T12:55:00Z"},{"value":"0.10532","scoring_system":"epss","scoring_elements":"0.93246","published_at":"2026-04-07T12:55:00Z"},{"value":"0.10532","scoring_system":"epss","scoring_elements":"0.93255","published_at":"2026-04-08T12:55:00Z"},{"value":"0.10532","scoring_system":"epss","scoring_elements":"0.93259","published_at":"2026-04-09T12:55:00Z"},{"value":"0.10532","scoring_system":"epss","scoring_elements":"0.93263","published_at":"2026-04-11T12:55:00Z"},{"value":"0.10532","scoring_system":"epss","scoring_elements":"0.93261","published_at":"2026-04-12T12:55:00Z"},{"value":"0.10532","scoring_system":"epss","scoring_elements":"0.93262","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30533"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30533","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30533"},{"reference_url":"https://crbug.com/1145553","reference_id":"1145553","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T15:04:01Z/"}],"url":"https://crbug.com/1145553"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079","reference_id":"990079","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079"},{"reference_url":"https://security.archlinux.org/ASA-202106-2","reference_id":"ASA-202106-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-2"},{"reference_url":"https://security.archlinux.org/AVG-1990","reference_id":"AVG-1990","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1990"},{"reference_url":"https://security.archlinux.org/AVG-1991","reference_id":"AVG-1991","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1991"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ETMZL6IHCTCTREEL434BQ4THQ7EOHJ43/","reference_id":"ETMZL6IHCTCTREEL434BQ4THQ7EOHJ43","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T15:04:01Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ETMZL6IHCTCTREEL434BQ4THQ7EOHJ43/"},{"reference_url":"https://security.gentoo.org/glsa/202107-06","reference_id":"GLSA-202107-06","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T15:04:01Z/"}],"url":"https://security.gentoo.org/glsa/202107-06"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAT6EOXVQFE6JFMFQF4IKAOUQSHMHL54/","reference_id":"PAT6EOXVQFE6JFMFQF4IKAOUQSHMHL54","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T15:04:01Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAT6EOXVQFE6JFMFQF4IKAOUQSHMHL54/"},{"reference_url":"https://chromereleases.googleblog.com/2021/05/stable-channel-update-for-desktop_25.html","reference_id":"stable-channel-update-for-desktop_25.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T15:04:01Z/"}],"url":"https://chromereleases.googleblog.com/2021/05/stable-channel-update-for-desktop_25.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77880?format=json","purl":"pkg:ebuild/www-client/google-chrome@91.0.4472.114","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/google-chrome@91.0.4472.114"}],"aliases":["CVE-2021-30533"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-aswr-a7yz-tbb3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49436?format=json","vulnerability_id":"VCID-cntb-k34n-dbaq","summary":"Multiple vulnerabillities have been found in Chromium and Google\n    Chrome, the worst of which could allow remote attackers to execute\n    arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30527","reference_id":"","reference_type":"","scores":[{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55835","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55775","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55668","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.5578","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55802","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55782","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55833","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55836","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55844","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55825","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55806","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55843","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55848","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55823","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.5575","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55766","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55743","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55688","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55736","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55793","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55749","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30527"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30527","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30527"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079","reference_id":"990079","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079"},{"reference_url":"https://security.archlinux.org/ASA-202106-2","reference_id":"ASA-202106-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-2"},{"reference_url":"https://security.archlinux.org/AVG-1990","reference_id":"AVG-1990","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1990"},{"reference_url":"https://security.archlinux.org/AVG-1991","reference_id":"AVG-1991","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1991"},{"reference_url":"https://security.gentoo.org/glsa/202107-06","reference_id":"GLSA-202107-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-06"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77880?format=json","purl":"pkg:ebuild/www-client/google-chrome@91.0.4472.114","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/google-chrome@91.0.4472.114"}],"aliases":["CVE-2021-30527"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cntb-k34n-dbaq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49424?format=json","vulnerability_id":"VCID-dauy-gzcb-j3fp","summary":"Multiple vulnerabillities have been found in Chromium and Google\n    Chrome, the worst of which could allow remote attackers to execute\n    arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30515","reference_id":"","reference_type":"","scores":[{"value":"0.0049","scoring_system":"epss","scoring_elements":"0.65741","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0049","scoring_system":"epss","scoring_elements":"0.65685","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0049","scoring_system":"epss","scoring_elements":"0.65484","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0049","scoring_system":"epss","scoring_elements":"0.65533","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0049","scoring_system":"epss","scoring_elements":"0.65561","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0049","scoring_system":"epss","scoring_elements":"0.65527","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0049","scoring_system":"epss","scoring_elements":"0.65579","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0049","scoring_system":"epss","scoring_elements":"0.65591","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0049","scoring_system":"epss","scoring_elements":"0.6561","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0049","scoring_system":"epss","scoring_elements":"0.65597","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0049","scoring_system":"epss","scoring_elements":"0.65568","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0049","scoring_system":"epss","scoring_elements":"0.65604","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0049","scoring_system":"epss","scoring_elements":"0.65617","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0049","scoring_system":"epss","scoring_elements":"0.656","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0049","scoring_system":"epss","scoring_elements":"0.65616","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0049","scoring_system":"epss","scoring_elements":"0.65627","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0049","scoring_system":"epss","scoring_elements":"0.65626","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0049","scoring_system":"epss","scoring_elements":"0.65602","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0049","scoring_system":"epss","scoring_elements":"0.65649","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0049","scoring_system":"epss","scoring_elements":"0.65696","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0049","scoring_system":"epss","scoring_elements":"0.65666","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30515"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30506","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30506"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30507","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30507"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30508","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30508"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30509","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30509"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30510","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30510"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30511","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30511"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30512","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30512"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30513","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30513"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30514","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30514"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30515","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30515"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30516","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30516"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30517","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30517"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30518","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30518"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30519","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30519"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30520","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30520"},{"reference_url":"https://security.archlinux.org/ASA-202105-7","reference_id":"ASA-202105-7","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202105-7"},{"reference_url":"https://security.archlinux.org/ASA-202105-8","reference_id":"ASA-202105-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202105-8"},{"reference_url":"https://security.archlinux.org/AVG-1936","reference_id":"AVG-1936","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1936"},{"reference_url":"https://security.archlinux.org/AVG-1937","reference_id":"AVG-1937","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1937"},{"reference_url":"https://security.gentoo.org/glsa/202107-06","reference_id":"GLSA-202107-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-06"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77880?format=json","purl":"pkg:ebuild/www-client/google-chrome@91.0.4472.114","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/google-chrome@91.0.4472.114"}],"aliases":["CVE-2021-30515"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dauy-gzcb-j3fp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49429?format=json","vulnerability_id":"VCID-dsuc-we2q-wffm","summary":"Multiple vulnerabillities have been found in Chromium and Google\n    Chrome, the worst of which could allow remote attackers to execute\n    arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30520","reference_id":"","reference_type":"","scores":[{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55262","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55201","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55092","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55193","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55217","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55195","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55244","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55245","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55256","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55236","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55255","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55259","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55238","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55175","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55196","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55167","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55115","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55158","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55215","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30520"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30506","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30506"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30507","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30507"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30508","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30508"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30509","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30509"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30510","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30510"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30511","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30511"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30512","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30512"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30513","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30513"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30514","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30514"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30515","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30515"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30516","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30516"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30517","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30517"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30518","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30518"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30519","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30519"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30520","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30520"},{"reference_url":"https://security.archlinux.org/ASA-202105-7","reference_id":"ASA-202105-7","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202105-7"},{"reference_url":"https://security.archlinux.org/ASA-202105-8","reference_id":"ASA-202105-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202105-8"},{"reference_url":"https://security.archlinux.org/AVG-1936","reference_id":"AVG-1936","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1936"},{"reference_url":"https://security.archlinux.org/AVG-1937","reference_id":"AVG-1937","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1937"},{"reference_url":"https://security.gentoo.org/glsa/202107-06","reference_id":"GLSA-202107-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-06"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77880?format=json","purl":"pkg:ebuild/www-client/google-chrome@91.0.4472.114","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/google-chrome@91.0.4472.114"}],"aliases":["CVE-2021-30520"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dsuc-we2q-wffm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49443?format=json","vulnerability_id":"VCID-e5qg-urfz-37b6","summary":"Multiple vulnerabillities have been found in Chromium and Google\n    Chrome, the worst of which could allow remote attackers to execute\n    arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30536","reference_id":"","reference_type":"","scores":[{"value":"0.01023","scoring_system":"epss","scoring_elements":"0.77447","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01023","scoring_system":"epss","scoring_elements":"0.77401","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01023","scoring_system":"epss","scoring_elements":"0.77191","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01023","scoring_system":"epss","scoring_elements":"0.77197","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01023","scoring_system":"epss","scoring_elements":"0.77226","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01023","scoring_system":"epss","scoring_elements":"0.77208","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01023","scoring_system":"epss","scoring_elements":"0.7724","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01023","scoring_system":"epss","scoring_elements":"0.77248","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01023","scoring_system":"epss","scoring_elements":"0.77275","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01023","scoring_system":"epss","scoring_elements":"0.77254","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01023","scoring_system":"epss","scoring_elements":"0.77251","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01023","scoring_system":"epss","scoring_elements":"0.77291","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01023","scoring_system":"epss","scoring_elements":"0.77283","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01023","scoring_system":"epss","scoring_elements":"0.77318","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01023","scoring_system":"epss","scoring_elements":"0.77324","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01023","scoring_system":"epss","scoring_elements":"0.77338","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01023","scoring_system":"epss","scoring_elements":"0.77344","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01023","scoring_system":"epss","scoring_elements":"0.77372","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01023","scoring_system":"epss","scoring_elements":"0.77393","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01023","scoring_system":"epss","scoring_elements":"0.77382","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30536"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30536","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30536"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079","reference_id":"990079","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079"},{"reference_url":"https://security.archlinux.org/ASA-202106-2","reference_id":"ASA-202106-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-2"},{"reference_url":"https://security.archlinux.org/AVG-1990","reference_id":"AVG-1990","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1990"},{"reference_url":"https://security.archlinux.org/AVG-1991","reference_id":"AVG-1991","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1991"},{"reference_url":"https://security.gentoo.org/glsa/202107-06","reference_id":"GLSA-202107-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-06"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77880?format=json","purl":"pkg:ebuild/www-client/google-chrome@91.0.4472.114","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/google-chrome@91.0.4472.114"}],"aliases":["CVE-2021-30536"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e5qg-urfz-37b6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49421?format=json","vulnerability_id":"VCID-ebh1-78wm-mubs","summary":"Multiple vulnerabillities have been found in Chromium and Google\n    Chrome, the worst of which could allow remote attackers to execute\n    arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30512","reference_id":"","reference_type":"","scores":[{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.71411","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.71356","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.71163","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.71173","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.7119","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.71165","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.71207","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.7122","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.71243","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.71228","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.71212","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.71258","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.71265","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.71242","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.71296","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.71303","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.71307","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.71292","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.71329","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.71364","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.71328","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30512"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30506","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30506"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30507","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30507"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30508","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30508"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30509","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30509"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30510","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30510"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30511","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30511"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30512","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30512"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30513","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30513"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30514","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30514"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30515","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30515"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30516","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30516"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30517","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30517"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30518","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30518"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30519","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30519"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30520","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30520"},{"reference_url":"https://security.archlinux.org/ASA-202105-7","reference_id":"ASA-202105-7","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202105-7"},{"reference_url":"https://security.archlinux.org/ASA-202105-8","reference_id":"ASA-202105-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202105-8"},{"reference_url":"https://security.archlinux.org/AVG-1936","reference_id":"AVG-1936","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1936"},{"reference_url":"https://security.archlinux.org/AVG-1937","reference_id":"AVG-1937","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1937"},{"reference_url":"https://security.gentoo.org/glsa/202107-06","reference_id":"GLSA-202107-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-06"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77880?format=json","purl":"pkg:ebuild/www-client/google-chrome@91.0.4472.114","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/google-chrome@91.0.4472.114"}],"aliases":["CVE-2021-30512"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ebh1-78wm-mubs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49452?format=json","vulnerability_id":"VCID-ecm6-npvt-z7e4","summary":"Multiple vulnerabillities have been found in Chromium and Google\n    Chrome, the worst of which could allow remote attackers to execute\n    arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30549","reference_id":"","reference_type":"","scores":[{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55835","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55749","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55775","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55668","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.5578","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55802","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55782","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55833","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55836","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55844","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55825","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55806","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55843","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55848","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55823","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.5575","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55766","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55743","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55688","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55736","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55793","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30549"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30549","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30549"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079","reference_id":"990079","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079"},{"reference_url":"https://security.archlinux.org/ASA-202106-31","reference_id":"ASA-202106-31","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-31"},{"reference_url":"https://security.archlinux.org/ASA-202106-32","reference_id":"ASA-202106-32","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-32"},{"reference_url":"https://security.archlinux.org/AVG-2057","reference_id":"AVG-2057","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2057"},{"reference_url":"https://security.archlinux.org/AVG-2058","reference_id":"AVG-2058","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2058"},{"reference_url":"https://security.gentoo.org/glsa/202107-06","reference_id":"GLSA-202107-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-06"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77880?format=json","purl":"pkg:ebuild/www-client/google-chrome@91.0.4472.114","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/google-chrome@91.0.4472.114"}],"aliases":["CVE-2021-30549"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ecm6-npvt-z7e4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49446?format=json","vulnerability_id":"VCID-ej7g-qqsm-y7ch","summary":"Multiple vulnerabillities have been found in Chromium and Google\n    Chrome, the worst of which could allow remote attackers to execute\n    arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30539","reference_id":"","reference_type":"","scores":[{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.33581","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.33505","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.33832","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.3417","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.34204","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.34066","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.34109","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.34139","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.34137","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.34095","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.34071","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.34107","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.34094","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.34058","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.33685","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.33663","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.33578","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.33461","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.33532","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.33571","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.33481","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30539"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30539","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30539"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079","reference_id":"990079","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079"},{"reference_url":"https://security.archlinux.org/ASA-202106-2","reference_id":"ASA-202106-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-2"},{"reference_url":"https://security.archlinux.org/AVG-1990","reference_id":"AVG-1990","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1990"},{"reference_url":"https://security.archlinux.org/AVG-1991","reference_id":"AVG-1991","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1991"},{"reference_url":"https://security.gentoo.org/glsa/202107-06","reference_id":"GLSA-202107-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-06"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77880?format=json","purl":"pkg:ebuild/www-client/google-chrome@91.0.4472.114","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/google-chrome@91.0.4472.114"}],"aliases":["CVE-2021-30539"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ej7g-qqsm-y7ch"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49437?format=json","vulnerability_id":"VCID-fgt6-p8h5-wyf2","summary":"Multiple vulnerabillities have been found in Chromium and Google\n    Chrome, the worst of which could allow remote attackers to execute\n    arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30528","reference_id":"","reference_type":"","scores":[{"value":"0.01064","scoring_system":"epss","scoring_elements":"0.77869","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01064","scoring_system":"epss","scoring_elements":"0.77612","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01064","scoring_system":"epss","scoring_elements":"0.7762","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01064","scoring_system":"epss","scoring_elements":"0.77647","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01064","scoring_system":"epss","scoring_elements":"0.77629","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01064","scoring_system":"epss","scoring_elements":"0.77657","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01064","scoring_system":"epss","scoring_elements":"0.77663","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01064","scoring_system":"epss","scoring_elements":"0.77689","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01064","scoring_system":"epss","scoring_elements":"0.77673","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01064","scoring_system":"epss","scoring_elements":"0.77671","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01064","scoring_system":"epss","scoring_elements":"0.77708","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01064","scoring_system":"epss","scoring_elements":"0.77707","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01064","scoring_system":"epss","scoring_elements":"0.77701","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01064","scoring_system":"epss","scoring_elements":"0.77732","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01064","scoring_system":"epss","scoring_elements":"0.77741","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01064","scoring_system":"epss","scoring_elements":"0.77756","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01064","scoring_system":"epss","scoring_elements":"0.77769","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01064","scoring_system":"epss","scoring_elements":"0.77799","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01064","scoring_system":"epss","scoring_elements":"0.77818","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01064","scoring_system":"epss","scoring_elements":"0.77807","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01064","scoring_system":"epss","scoring_elements":"0.77824","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30528"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30528","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30528"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079","reference_id":"990079","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079"},{"reference_url":"https://security.archlinux.org/AVG-2044","reference_id":"AVG-2044","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2044"},{"reference_url":"https://security.gentoo.org/glsa/202107-06","reference_id":"GLSA-202107-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-06"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77880?format=json","purl":"pkg:ebuild/www-client/google-chrome@91.0.4472.114","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/google-chrome@91.0.4472.114"}],"aliases":["CVE-2021-30528"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fgt6-p8h5-wyf2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49459?format=json","vulnerability_id":"VCID-ftv6-ks2t-77b4","summary":"Multiple vulnerabillities have been found in Chromium and Google\n    Chrome, the worst of which could allow remote attackers to execute\n    arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30556","reference_id":"","reference_type":"","scores":[{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73803","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73744","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.7358","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73589","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73612","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73585","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73621","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73634","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73657","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73639","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.7363","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73674","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73683","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73707","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73717","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73718","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.7371","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73735","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73758","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73721","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30556"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30556","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30556"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079","reference_id":"990079","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079"},{"reference_url":"https://security.archlinux.org/ASA-202106-46","reference_id":"ASA-202106-46","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-46"},{"reference_url":"https://security.archlinux.org/ASA-202106-47","reference_id":"ASA-202106-47","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-47"},{"reference_url":"https://security.archlinux.org/AVG-2081","reference_id":"AVG-2081","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2081"},{"reference_url":"https://security.archlinux.org/AVG-2082","reference_id":"AVG-2082","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2082"},{"reference_url":"https://security.gentoo.org/glsa/202107-06","reference_id":"GLSA-202107-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-06"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77880?format=json","purl":"pkg:ebuild/www-client/google-chrome@91.0.4472.114","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/google-chrome@91.0.4472.114"}],"aliases":["CVE-2021-30556"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ftv6-ks2t-77b4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49449?format=json","vulnerability_id":"VCID-fu94-pehe-d7ax","summary":"Multiple vulnerabillities have been found in Chromium and Google\n    Chrome, the worst of which could allow remote attackers to execute\n    arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30545","reference_id":"","reference_type":"","scores":[{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.71411","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.71328","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.71356","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.71163","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.71173","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.7119","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.71165","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.71207","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.7122","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.71243","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.71228","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.71212","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.71258","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.71265","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.71242","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.71296","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.71303","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.71307","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.71292","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.71329","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00665","scoring_system":"epss","scoring_elements":"0.71364","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30545"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30545","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30545"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079","reference_id":"990079","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079"},{"reference_url":"https://security.archlinux.org/ASA-202106-31","reference_id":"ASA-202106-31","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-31"},{"reference_url":"https://security.archlinux.org/ASA-202106-32","reference_id":"ASA-202106-32","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-32"},{"reference_url":"https://security.archlinux.org/AVG-2057","reference_id":"AVG-2057","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2057"},{"reference_url":"https://security.archlinux.org/AVG-2058","reference_id":"AVG-2058","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2058"},{"reference_url":"https://security.gentoo.org/glsa/202107-06","reference_id":"GLSA-202107-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-06"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77880?format=json","purl":"pkg:ebuild/www-client/google-chrome@91.0.4472.114","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/google-chrome@91.0.4472.114"}],"aliases":["CVE-2021-30545"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fu94-pehe-d7ax"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49457?format=json","vulnerability_id":"VCID-gpac-77p4-6bfw","summary":"Multiple vulnerabillities have been found in Chromium and Google\n    Chrome, the worst of which could allow remote attackers to execute\n    arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30554","reference_id":"","reference_type":"","scores":[{"value":"0.0392","scoring_system":"epss","scoring_elements":"0.88418","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0392","scoring_system":"epss","scoring_elements":"0.8832","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0392","scoring_system":"epss","scoring_elements":"0.88317","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0392","scoring_system":"epss","scoring_elements":"0.88316","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0392","scoring_system":"epss","scoring_elements":"0.88334","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0392","scoring_system":"epss","scoring_elements":"0.88339","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0392","scoring_system":"epss","scoring_elements":"0.88341","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0392","scoring_system":"epss","scoring_elements":"0.88351","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0392","scoring_system":"epss","scoring_elements":"0.88367","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0392","scoring_system":"epss","scoring_elements":"0.88379","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0392","scoring_system":"epss","scoring_elements":"0.88378","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0392","scoring_system":"epss","scoring_elements":"0.8839","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0392","scoring_system":"epss","scoring_elements":"0.88251","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0392","scoring_system":"epss","scoring_elements":"0.88258","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0392","scoring_system":"epss","scoring_elements":"0.88274","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0392","scoring_system":"epss","scoring_elements":"0.88279","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0392","scoring_system":"epss","scoring_elements":"0.88298","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0392","scoring_system":"epss","scoring_elements":"0.88304","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0392","scoring_system":"epss","scoring_elements":"0.88315","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0392","scoring_system":"epss","scoring_elements":"0.88307","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0392","scoring_system":"epss","scoring_elements":"0.88306","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30554"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30554","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30554"},{"reference_url":"https://crbug.com/1219857","reference_id":"1219857","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T15:07:15Z/"}],"url":"https://crbug.com/1219857"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079","reference_id":"990079","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079"},{"reference_url":"https://security.archlinux.org/ASA-202106-46","reference_id":"ASA-202106-46","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-46"},{"reference_url":"https://security.archlinux.org/ASA-202106-47","reference_id":"ASA-202106-47","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-47"},{"reference_url":"https://security.archlinux.org/AVG-2081","reference_id":"AVG-2081","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2081"},{"reference_url":"https://security.archlinux.org/AVG-2082","reference_id":"AVG-2082","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2082"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ETMZL6IHCTCTREEL434BQ4THQ7EOHJ43/","reference_id":"ETMZL6IHCTCTREEL434BQ4THQ7EOHJ43","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T15:07:15Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ETMZL6IHCTCTREEL434BQ4THQ7EOHJ43/"},{"reference_url":"https://security.gentoo.org/glsa/202107-06","reference_id":"GLSA-202107-06","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T15:07:15Z/"}],"url":"https://security.gentoo.org/glsa/202107-06"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAT6EOXVQFE6JFMFQF4IKAOUQSHMHL54/","reference_id":"PAT6EOXVQFE6JFMFQF4IKAOUQSHMHL54","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T15:07:15Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAT6EOXVQFE6JFMFQF4IKAOUQSHMHL54/"},{"reference_url":"https://chromereleases.googleblog.com/2021/06/stable-channel-update-for-desktop_17.html","reference_id":"stable-channel-update-for-desktop_17.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T15:07:15Z/"}],"url":"https://chromereleases.googleblog.com/2021/06/stable-channel-update-for-desktop_17.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77880?format=json","purl":"pkg:ebuild/www-client/google-chrome@91.0.4472.114","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/google-chrome@91.0.4472.114"}],"aliases":["CVE-2021-30554"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gpac-77p4-6bfw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49455?format=json","vulnerability_id":"VCID-h77b-t3re-g3bm","summary":"Multiple vulnerabillities have been found in Chromium and Google\n    Chrome, the worst of which could allow remote attackers to execute\n    arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30552","reference_id":"","reference_type":"","scores":[{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55835","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55749","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55775","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55668","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.5578","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55802","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55782","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55833","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55836","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55844","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55825","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55806","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55843","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55848","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55823","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.5575","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55766","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55743","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55688","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55736","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55793","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30552"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30552","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30552"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079","reference_id":"990079","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079"},{"reference_url":"https://security.archlinux.org/ASA-202106-31","reference_id":"ASA-202106-31","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-31"},{"reference_url":"https://security.archlinux.org/ASA-202106-32","reference_id":"ASA-202106-32","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-32"},{"reference_url":"https://security.archlinux.org/AVG-2057","reference_id":"AVG-2057","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2057"},{"reference_url":"https://security.archlinux.org/AVG-2058","reference_id":"AVG-2058","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2058"},{"reference_url":"https://security.gentoo.org/glsa/202107-06","reference_id":"GLSA-202107-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-06"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77880?format=json","purl":"pkg:ebuild/www-client/google-chrome@91.0.4472.114","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/google-chrome@91.0.4472.114"}],"aliases":["CVE-2021-30552"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-h77b-t3re-g3bm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49423?format=json","vulnerability_id":"VCID-hudp-w9wy-4kb8","summary":"Multiple vulnerabillities have been found in Chromium and Google\n    Chrome, the worst of which could allow remote attackers to execute\n    arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30514","reference_id":"","reference_type":"","scores":[{"value":"0.00736","scoring_system":"epss","scoring_elements":"0.72993","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00736","scoring_system":"epss","scoring_elements":"0.72941","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00736","scoring_system":"epss","scoring_elements":"0.72759","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00736","scoring_system":"epss","scoring_elements":"0.72767","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00736","scoring_system":"epss","scoring_elements":"0.72787","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00736","scoring_system":"epss","scoring_elements":"0.72763","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00736","scoring_system":"epss","scoring_elements":"0.72801","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00736","scoring_system":"epss","scoring_elements":"0.72815","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00736","scoring_system":"epss","scoring_elements":"0.72839","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00736","scoring_system":"epss","scoring_elements":"0.72822","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00736","scoring_system":"epss","scoring_elements":"0.72814","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00736","scoring_system":"epss","scoring_elements":"0.72856","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00736","scoring_system":"epss","scoring_elements":"0.72866","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00736","scoring_system":"epss","scoring_elements":"0.72858","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00736","scoring_system":"epss","scoring_elements":"0.72899","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00736","scoring_system":"epss","scoring_elements":"0.72909","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00736","scoring_system":"epss","scoring_elements":"0.72908","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00736","scoring_system":"epss","scoring_elements":"0.72902","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00736","scoring_system":"epss","scoring_elements":"0.72928","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00736","scoring_system":"epss","scoring_elements":"0.72954","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00736","scoring_system":"epss","scoring_elements":"0.72917","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30514"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30506","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30506"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30507","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30507"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30508","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30508"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30509","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30509"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30510","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30510"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30511","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30511"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30512","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30512"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30513","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30513"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30514","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30514"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30515","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30515"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30516","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30516"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30517","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30517"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30518","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30518"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30519","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30519"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30520","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30520"},{"reference_url":"https://security.archlinux.org/ASA-202105-7","reference_id":"ASA-202105-7","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202105-7"},{"reference_url":"https://security.archlinux.org/ASA-202105-8","reference_id":"ASA-202105-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202105-8"},{"reference_url":"https://security.archlinux.org/AVG-1936","reference_id":"AVG-1936","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1936"},{"reference_url":"https://security.archlinux.org/AVG-1937","reference_id":"AVG-1937","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1937"},{"reference_url":"https://security.gentoo.org/glsa/202107-06","reference_id":"GLSA-202107-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-06"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77880?format=json","purl":"pkg:ebuild/www-client/google-chrome@91.0.4472.114","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/google-chrome@91.0.4472.114"}],"aliases":["CVE-2021-30514"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hudp-w9wy-4kb8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49438?format=json","vulnerability_id":"VCID-jm7s-knrf-vqcj","summary":"Multiple vulnerabillities have been found in Chromium and Google\n    Chrome, the worst of which could allow remote attackers to execute\n    arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30530","reference_id":"","reference_type":"","scores":[{"value":"0.00742","scoring_system":"epss","scoring_elements":"0.7314","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00742","scoring_system":"epss","scoring_elements":"0.73085","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00742","scoring_system":"epss","scoring_elements":"0.72911","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00742","scoring_system":"epss","scoring_elements":"0.72922","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00742","scoring_system":"epss","scoring_elements":"0.72942","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00742","scoring_system":"epss","scoring_elements":"0.72917","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00742","scoring_system":"epss","scoring_elements":"0.72955","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00742","scoring_system":"epss","scoring_elements":"0.72969","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00742","scoring_system":"epss","scoring_elements":"0.72994","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00742","scoring_system":"epss","scoring_elements":"0.72974","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00742","scoring_system":"epss","scoring_elements":"0.72967","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00742","scoring_system":"epss","scoring_elements":"0.73009","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00742","scoring_system":"epss","scoring_elements":"0.73018","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00742","scoring_system":"epss","scoring_elements":"0.73011","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00742","scoring_system":"epss","scoring_elements":"0.73051","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00742","scoring_system":"epss","scoring_elements":"0.73061","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00742","scoring_system":"epss","scoring_elements":"0.73058","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00742","scoring_system":"epss","scoring_elements":"0.7308","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00742","scoring_system":"epss","scoring_elements":"0.73101","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00742","scoring_system":"epss","scoring_elements":"0.73062","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30530"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30530","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30530"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079","reference_id":"990079","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079"},{"reference_url":"https://security.archlinux.org/ASA-202106-2","reference_id":"ASA-202106-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-2"},{"reference_url":"https://security.archlinux.org/AVG-1990","reference_id":"AVG-1990","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1990"},{"reference_url":"https://security.archlinux.org/AVG-1991","reference_id":"AVG-1991","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1991"},{"reference_url":"https://security.gentoo.org/glsa/202107-06","reference_id":"GLSA-202107-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-06"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77880?format=json","purl":"pkg:ebuild/www-client/google-chrome@91.0.4472.114","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/google-chrome@91.0.4472.114"}],"aliases":["CVE-2021-30530"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jm7s-knrf-vqcj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49430?format=json","vulnerability_id":"VCID-jzch-bp6c-mqgd","summary":"Multiple vulnerabillities have been found in Chromium and Google\n    Chrome, the worst of which could allow remote attackers to execute\n    arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30521","reference_id":"","reference_type":"","scores":[{"value":"0.0082","scoring_system":"epss","scoring_elements":"0.74557","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0082","scoring_system":"epss","scoring_elements":"0.7434","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0082","scoring_system":"epss","scoring_elements":"0.74344","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0082","scoring_system":"epss","scoring_elements":"0.74371","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0082","scoring_system":"epss","scoring_elements":"0.74345","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0082","scoring_system":"epss","scoring_elements":"0.74378","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0082","scoring_system":"epss","scoring_elements":"0.74393","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0082","scoring_system":"epss","scoring_elements":"0.74414","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0082","scoring_system":"epss","scoring_elements":"0.74394","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0082","scoring_system":"epss","scoring_elements":"0.74386","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0082","scoring_system":"epss","scoring_elements":"0.74423","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0082","scoring_system":"epss","scoring_elements":"0.74432","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0082","scoring_system":"epss","scoring_elements":"0.74421","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0082","scoring_system":"epss","scoring_elements":"0.74456","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0082","scoring_system":"epss","scoring_elements":"0.74463","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0082","scoring_system":"epss","scoring_elements":"0.74462","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0082","scoring_system":"epss","scoring_elements":"0.7446","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0082","scoring_system":"epss","scoring_elements":"0.74489","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0082","scoring_system":"epss","scoring_elements":"0.74514","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0082","scoring_system":"epss","scoring_elements":"0.7448","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0082","scoring_system":"epss","scoring_elements":"0.74502","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30521"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30521","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30521"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079","reference_id":"990079","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079"},{"reference_url":"https://security.archlinux.org/AVG-2044","reference_id":"AVG-2044","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2044"},{"reference_url":"https://security.gentoo.org/glsa/202107-06","reference_id":"GLSA-202107-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-06"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77880?format=json","purl":"pkg:ebuild/www-client/google-chrome@91.0.4472.114","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/google-chrome@91.0.4472.114"}],"aliases":["CVE-2021-30521"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jzch-bp6c-mqgd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49451?format=json","vulnerability_id":"VCID-kt2w-ydf8-quh9","summary":"Multiple vulnerabillities have been found in Chromium and Google\n    Chrome, the worst of which could allow remote attackers to execute\n    arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30548","reference_id":"","reference_type":"","scores":[{"value":"0.00774","scoring_system":"epss","scoring_elements":"0.73764","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00774","scoring_system":"epss","scoring_elements":"0.73683","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00774","scoring_system":"epss","scoring_elements":"0.73705","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00774","scoring_system":"epss","scoring_elements":"0.73541","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00774","scoring_system":"epss","scoring_elements":"0.73549","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00774","scoring_system":"epss","scoring_elements":"0.73572","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00774","scoring_system":"epss","scoring_elements":"0.73544","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00774","scoring_system":"epss","scoring_elements":"0.7358","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00774","scoring_system":"epss","scoring_elements":"0.73594","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00774","scoring_system":"epss","scoring_elements":"0.73616","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00774","scoring_system":"epss","scoring_elements":"0.73598","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00774","scoring_system":"epss","scoring_elements":"0.73591","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00774","scoring_system":"epss","scoring_elements":"0.73635","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00774","scoring_system":"epss","scoring_elements":"0.73644","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00774","scoring_system":"epss","scoring_elements":"0.73636","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00774","scoring_system":"epss","scoring_elements":"0.73669","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00774","scoring_system":"epss","scoring_elements":"0.73678","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00774","scoring_system":"epss","scoring_elements":"0.73677","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00774","scoring_system":"epss","scoring_elements":"0.73672","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00774","scoring_system":"epss","scoring_elements":"0.73697","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00774","scoring_system":"epss","scoring_elements":"0.73721","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30548"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30548","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30548"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079","reference_id":"990079","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079"},{"reference_url":"https://security.archlinux.org/ASA-202106-31","reference_id":"ASA-202106-31","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-31"},{"reference_url":"https://security.archlinux.org/ASA-202106-32","reference_id":"ASA-202106-32","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-32"},{"reference_url":"https://security.archlinux.org/AVG-2057","reference_id":"AVG-2057","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2057"},{"reference_url":"https://security.archlinux.org/AVG-2058","reference_id":"AVG-2058","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2058"},{"reference_url":"https://security.gentoo.org/glsa/202107-06","reference_id":"GLSA-202107-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-06"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77880?format=json","purl":"pkg:ebuild/www-client/google-chrome@91.0.4472.114","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/google-chrome@91.0.4472.114"}],"aliases":["CVE-2021-30548"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kt2w-ydf8-quh9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49419?format=json","vulnerability_id":"VCID-mxkm-p9t4-cbdw","summary":"Multiple vulnerabillities have been found in Chromium and Google\n    Chrome, the worst of which could allow remote attackers to execute\n    arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30510","reference_id":"","reference_type":"","scores":[{"value":"0.00901","scoring_system":"epss","scoring_elements":"0.75881","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00901","scoring_system":"epss","scoring_elements":"0.75813","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00901","scoring_system":"epss","scoring_elements":"0.75624","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00901","scoring_system":"epss","scoring_elements":"0.75626","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00901","scoring_system":"epss","scoring_elements":"0.75657","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00901","scoring_system":"epss","scoring_elements":"0.75637","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00901","scoring_system":"epss","scoring_elements":"0.75671","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00901","scoring_system":"epss","scoring_elements":"0.75682","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00901","scoring_system":"epss","scoring_elements":"0.75707","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00901","scoring_system":"epss","scoring_elements":"0.75688","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00901","scoring_system":"epss","scoring_elements":"0.7572","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00901","scoring_system":"epss","scoring_elements":"0.75723","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00901","scoring_system":"epss","scoring_elements":"0.7571","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00901","scoring_system":"epss","scoring_elements":"0.75749","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00901","scoring_system":"epss","scoring_elements":"0.75756","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00901","scoring_system":"epss","scoring_elements":"0.75767","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00901","scoring_system":"epss","scoring_elements":"0.75775","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00901","scoring_system":"epss","scoring_elements":"0.75804","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00901","scoring_system":"epss","scoring_elements":"0.75828","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30510"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30506","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30506"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30507","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30507"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30508","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30508"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30509","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30509"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30510","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30510"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30511","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30511"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30512","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30512"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30513","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30513"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30514","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30514"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30515","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30515"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30516","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30516"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30517","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30517"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30518","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30518"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30519","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30519"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30520","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30520"},{"reference_url":"https://security.archlinux.org/ASA-202105-7","reference_id":"ASA-202105-7","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202105-7"},{"reference_url":"https://security.archlinux.org/ASA-202105-8","reference_id":"ASA-202105-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202105-8"},{"reference_url":"https://security.archlinux.org/AVG-1936","reference_id":"AVG-1936","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1936"},{"reference_url":"https://security.archlinux.org/AVG-1937","reference_id":"AVG-1937","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1937"},{"reference_url":"https://security.gentoo.org/glsa/202107-06","reference_id":"GLSA-202107-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-06"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77880?format=json","purl":"pkg:ebuild/www-client/google-chrome@91.0.4472.114","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/google-chrome@91.0.4472.114"}],"aliases":["CVE-2021-30510"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mxkm-p9t4-cbdw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49434?format=json","vulnerability_id":"VCID-n1ux-5z1c-9ban","summary":"Multiple vulnerabillities have been found in Chromium and Google\n    Chrome, the worst of which could allow remote attackers to execute\n    arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30525","reference_id":"","reference_type":"","scores":[{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.5773","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57663","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.5755","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57635","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57656","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57632","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57686","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57689","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57704","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57683","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57664","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57693","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57668","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57626","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57645","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57624","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.5758","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57625","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57687","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30525"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30525","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30525"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079","reference_id":"990079","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079"},{"reference_url":"https://security.archlinux.org/ASA-202106-2","reference_id":"ASA-202106-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-2"},{"reference_url":"https://security.archlinux.org/AVG-1990","reference_id":"AVG-1990","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1990"},{"reference_url":"https://security.archlinux.org/AVG-1991","reference_id":"AVG-1991","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1991"},{"reference_url":"https://security.gentoo.org/glsa/202107-06","reference_id":"GLSA-202107-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-06"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77880?format=json","purl":"pkg:ebuild/www-client/google-chrome@91.0.4472.114","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/google-chrome@91.0.4472.114"}],"aliases":["CVE-2021-30525"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n1ux-5z1c-9ban"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49420?format=json","vulnerability_id":"VCID-n7t8-tqr4-hqgm","summary":"Multiple vulnerabillities have been found in Chromium and Google\n    Chrome, the worst of which could allow remote attackers to execute\n    arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30511","reference_id":"","reference_type":"","scores":[{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55262","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55201","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55092","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55193","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55217","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55195","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55244","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55245","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55256","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55236","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55255","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55259","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55238","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55175","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55196","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55167","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55115","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55158","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00322","scoring_system":"epss","scoring_elements":"0.55215","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30511"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30506","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30506"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30507","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30507"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30508","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30508"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30509","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30509"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30510","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30510"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30511","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30511"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30512","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30512"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30513","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30513"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30514","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30514"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30515","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30515"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30516","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30516"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30517","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30517"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30518","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30518"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30519","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30519"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30520","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30520"},{"reference_url":"https://security.archlinux.org/ASA-202105-7","reference_id":"ASA-202105-7","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202105-7"},{"reference_url":"https://security.archlinux.org/ASA-202105-8","reference_id":"ASA-202105-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202105-8"},{"reference_url":"https://security.archlinux.org/AVG-1936","reference_id":"AVG-1936","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1936"},{"reference_url":"https://security.archlinux.org/AVG-1937","reference_id":"AVG-1937","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1937"},{"reference_url":"https://security.gentoo.org/glsa/202107-06","reference_id":"GLSA-202107-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-06"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77880?format=json","purl":"pkg:ebuild/www-client/google-chrome@91.0.4472.114","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/google-chrome@91.0.4472.114"}],"aliases":["CVE-2021-30511"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n7t8-tqr4-hqgm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49435?format=json","vulnerability_id":"VCID-qdw1-rhx2-e3fu","summary":"Multiple vulnerabillities have been found in Chromium and Google\n    Chrome, the worst of which could allow remote attackers to execute\n    arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30526","reference_id":"","reference_type":"","scores":[{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55835","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55775","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55668","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.5578","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55802","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55782","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55833","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55836","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55844","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55825","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55806","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55843","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55848","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55823","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.5575","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55766","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55743","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55688","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55736","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55793","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55749","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30526"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30526","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30526"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079","reference_id":"990079","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079"},{"reference_url":"https://security.archlinux.org/ASA-202106-2","reference_id":"ASA-202106-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-2"},{"reference_url":"https://security.archlinux.org/AVG-1990","reference_id":"AVG-1990","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1990"},{"reference_url":"https://security.archlinux.org/AVG-1991","reference_id":"AVG-1991","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1991"},{"reference_url":"https://security.gentoo.org/glsa/202107-06","reference_id":"GLSA-202107-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-06"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77880?format=json","purl":"pkg:ebuild/www-client/google-chrome@91.0.4472.114","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/google-chrome@91.0.4472.114"}],"aliases":["CVE-2021-30526"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qdw1-rhx2-e3fu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49415?format=json","vulnerability_id":"VCID-qx5p-gc8v-h3cp","summary":"Multiple vulnerabillities have been found in Chromium and Google\n    Chrome, the worst of which could allow remote attackers to execute\n    arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30506","reference_id":"","reference_type":"","scores":[{"value":"0.00306","scoring_system":"epss","scoring_elements":"0.53905","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00306","scoring_system":"epss","scoring_elements":"0.53835","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00306","scoring_system":"epss","scoring_elements":"0.53744","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00306","scoring_system":"epss","scoring_elements":"0.53764","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00306","scoring_system":"epss","scoring_elements":"0.53791","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00306","scoring_system":"epss","scoring_elements":"0.53765","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00306","scoring_system":"epss","scoring_elements":"0.53817","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00306","scoring_system":"epss","scoring_elements":"0.53815","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00306","scoring_system":"epss","scoring_elements":"0.53863","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00306","scoring_system":"epss","scoring_elements":"0.53846","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00306","scoring_system":"epss","scoring_elements":"0.5383","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00306","scoring_system":"epss","scoring_elements":"0.53867","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00306","scoring_system":"epss","scoring_elements":"0.53871","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00306","scoring_system":"epss","scoring_elements":"0.53852","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00306","scoring_system":"epss","scoring_elements":"0.53819","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00306","scoring_system":"epss","scoring_elements":"0.53831","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00306","scoring_system":"epss","scoring_elements":"0.53798","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00306","scoring_system":"epss","scoring_elements":"0.53749","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00306","scoring_system":"epss","scoring_elements":"0.53794","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00306","scoring_system":"epss","scoring_elements":"0.53847","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00306","scoring_system":"epss","scoring_elements":"0.5381","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30506"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30506","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30506"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30507","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30507"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30508","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30508"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30509","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30509"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30510","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30510"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30511","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30511"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30512","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30512"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30513","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30513"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30514","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30514"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30515","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30515"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30516","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30516"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30517","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30517"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30518","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30518"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30519","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30519"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30520","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30520"},{"reference_url":"https://security.archlinux.org/ASA-202105-7","reference_id":"ASA-202105-7","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202105-7"},{"reference_url":"https://security.archlinux.org/ASA-202105-8","reference_id":"ASA-202105-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202105-8"},{"reference_url":"https://security.archlinux.org/AVG-1936","reference_id":"AVG-1936","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1936"},{"reference_url":"https://security.archlinux.org/AVG-1937","reference_id":"AVG-1937","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1937"},{"reference_url":"https://security.gentoo.org/glsa/202107-06","reference_id":"GLSA-202107-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-06"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77880?format=json","purl":"pkg:ebuild/www-client/google-chrome@91.0.4472.114","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/google-chrome@91.0.4472.114"}],"aliases":["CVE-2021-30506"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qx5p-gc8v-h3cp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49444?format=json","vulnerability_id":"VCID-rfg6-a1b3-2qa4","summary":"Multiple vulnerabillities have been found in Chromium and Google\n    Chrome, the worst of which could allow remote attackers to execute\n    arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30537","reference_id":"","reference_type":"","scores":[{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30164","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30094","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.306","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30736","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30784","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30658","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.3069","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30695","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30651","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30606","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30631","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30613","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30579","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.304","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30286","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30206","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30065","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30135","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30144","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30074","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30537"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30537","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30537"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079","reference_id":"990079","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079"},{"reference_url":"https://security.archlinux.org/ASA-202106-2","reference_id":"ASA-202106-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-2"},{"reference_url":"https://security.archlinux.org/AVG-1990","reference_id":"AVG-1990","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1990"},{"reference_url":"https://security.archlinux.org/AVG-1991","reference_id":"AVG-1991","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1991"},{"reference_url":"https://security.gentoo.org/glsa/202107-06","reference_id":"GLSA-202107-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-06"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77880?format=json","purl":"pkg:ebuild/www-client/google-chrome@91.0.4472.114","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/google-chrome@91.0.4472.114"}],"aliases":["CVE-2021-30537"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rfg6-a1b3-2qa4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49439?format=json","vulnerability_id":"VCID-rx6k-fvxg-ruh7","summary":"Multiple vulnerabillities have been found in Chromium and Google\n    Chrome, the worst of which could allow remote attackers to execute\n    arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30531","reference_id":"","reference_type":"","scores":[{"value":"0.00374","scoring_system":"epss","scoring_elements":"0.59205","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00374","scoring_system":"epss","scoring_elements":"0.59134","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00374","scoring_system":"epss","scoring_elements":"0.58981","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00374","scoring_system":"epss","scoring_elements":"0.59056","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00374","scoring_system":"epss","scoring_elements":"0.59079","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00374","scoring_system":"epss","scoring_elements":"0.59044","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00374","scoring_system":"epss","scoring_elements":"0.59094","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00374","scoring_system":"epss","scoring_elements":"0.59099","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00374","scoring_system":"epss","scoring_elements":"0.59118","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00374","scoring_system":"epss","scoring_elements":"0.5908","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00374","scoring_system":"epss","scoring_elements":"0.59117","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00374","scoring_system":"epss","scoring_elements":"0.59121","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00374","scoring_system":"epss","scoring_elements":"0.59101","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00374","scoring_system":"epss","scoring_elements":"0.59081","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00374","scoring_system":"epss","scoring_elements":"0.59086","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00374","scoring_system":"epss","scoring_elements":"0.59045","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00374","scoring_system":"epss","scoring_elements":"0.59151","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00374","scoring_system":"epss","scoring_elements":"0.59107","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30531"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30531","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30531"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079","reference_id":"990079","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079"},{"reference_url":"https://security.archlinux.org/ASA-202106-2","reference_id":"ASA-202106-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-2"},{"reference_url":"https://security.archlinux.org/AVG-1990","reference_id":"AVG-1990","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1990"},{"reference_url":"https://security.archlinux.org/AVG-1991","reference_id":"AVG-1991","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1991"},{"reference_url":"https://security.gentoo.org/glsa/202107-06","reference_id":"GLSA-202107-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-06"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77880?format=json","purl":"pkg:ebuild/www-client/google-chrome@91.0.4472.114","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/google-chrome@91.0.4472.114"}],"aliases":["CVE-2021-30531"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rx6k-fvxg-ruh7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49440?format=json","vulnerability_id":"VCID-s575-newv-r3h9","summary":"Multiple vulnerabillities have been found in Chromium and Google\n    Chrome, the worst of which could allow remote attackers to execute\n    arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30532","reference_id":"","reference_type":"","scores":[{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68395","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68336","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.6814","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68163","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.6818","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68158","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68209","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68224","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.6825","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68236","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68203","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68242","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68252","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68232","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68274","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68282","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68287","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68262","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68307","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68344","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68308","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30532"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30532","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30532"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079","reference_id":"990079","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079"},{"reference_url":"https://security.archlinux.org/ASA-202106-2","reference_id":"ASA-202106-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-2"},{"reference_url":"https://security.archlinux.org/AVG-1990","reference_id":"AVG-1990","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1990"},{"reference_url":"https://security.archlinux.org/AVG-1991","reference_id":"AVG-1991","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1991"},{"reference_url":"https://security.gentoo.org/glsa/202107-06","reference_id":"GLSA-202107-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-06"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77880?format=json","purl":"pkg:ebuild/www-client/google-chrome@91.0.4472.114","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/google-chrome@91.0.4472.114"}],"aliases":["CVE-2021-30532"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s575-newv-r3h9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49447?format=json","vulnerability_id":"VCID-u4hw-r55c-mqg9","summary":"Multiple vulnerabillities have been found in Chromium and Google\n    Chrome, the worst of which could allow remote attackers to execute\n    arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30540","reference_id":"","reference_type":"","scores":[{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67535","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.6729","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67327","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.6735","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67378","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67391","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67412","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.674","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67365","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67399","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67411","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67389","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67408","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67419","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67394","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67439","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67477","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67449","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67474","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30540"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30540","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30540"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079","reference_id":"990079","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079"},{"reference_url":"https://security.archlinux.org/AVG-2044","reference_id":"AVG-2044","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2044"},{"reference_url":"https://security.gentoo.org/glsa/202107-06","reference_id":"GLSA-202107-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-06"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77880?format=json","purl":"pkg:ebuild/www-client/google-chrome@91.0.4472.114","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/google-chrome@91.0.4472.114"}],"aliases":["CVE-2021-30540"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-u4hw-r55c-mqg9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49418?format=json","vulnerability_id":"VCID-vzwy-bfud-1yeg","summary":"Multiple vulnerabillities have been found in Chromium and Google\n    Chrome, the worst of which could allow remote attackers to execute\n    arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30509","reference_id":"","reference_type":"","scores":[{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.50758","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.50681","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.50663","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.50717","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.50742","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.50698","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.50754","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.5075","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.50794","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.5077","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.508","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.50779","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.50728","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.50737","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.5069","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.50611","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.50664","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.50695","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.5065","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30509"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30506","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30506"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30507","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30507"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30508","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30508"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30509","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30509"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30510","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30510"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30511","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30511"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30512","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30512"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30513","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30513"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30514","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30514"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30515","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30515"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30516","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30516"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30517","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30517"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30518","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30518"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30519","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30519"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30520","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30520"},{"reference_url":"https://security.archlinux.org/ASA-202105-7","reference_id":"ASA-202105-7","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202105-7"},{"reference_url":"https://security.archlinux.org/ASA-202105-8","reference_id":"ASA-202105-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202105-8"},{"reference_url":"https://security.archlinux.org/AVG-1936","reference_id":"AVG-1936","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1936"},{"reference_url":"https://security.archlinux.org/AVG-1937","reference_id":"AVG-1937","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1937"},{"reference_url":"https://security.gentoo.org/glsa/202107-06","reference_id":"GLSA-202107-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-06"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77880?format=json","purl":"pkg:ebuild/www-client/google-chrome@91.0.4472.114","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/google-chrome@91.0.4472.114"}],"aliases":["CVE-2021-30509"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vzwy-bfud-1yeg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49454?format=json","vulnerability_id":"VCID-w43e-g6rb-4bgf","summary":"Multiple vulnerabillities have been found in Chromium and Google\n    Chrome, the worst of which could allow remote attackers to execute\n    arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30551","reference_id":"","reference_type":"","scores":[{"value":"0.75302","scoring_system":"epss","scoring_elements":"0.98874","published_at":"2026-04-02T12:55:00Z"},{"value":"0.75302","scoring_system":"epss","scoring_elements":"0.98872","published_at":"2026-04-01T12:55:00Z"},{"value":"0.75302","scoring_system":"epss","scoring_elements":"0.98876","published_at":"2026-04-04T12:55:00Z"},{"value":"0.77157","scoring_system":"epss","scoring_elements":"0.98967","published_at":"2026-04-07T12:55:00Z"},{"value":"0.77157","scoring_system":"epss","scoring_elements":"0.98973","published_at":"2026-04-18T12:55:00Z"},{"value":"0.77157","scoring_system":"epss","scoring_elements":"0.98971","published_at":"2026-04-13T12:55:00Z"},{"value":"0.77157","scoring_system":"epss","scoring_elements":"0.9897","published_at":"2026-04-11T12:55:00Z"},{"value":"0.77157","scoring_system":"epss","scoring_elements":"0.98969","published_at":"2026-04-09T12:55:00Z"},{"value":"0.78104","scoring_system":"epss","scoring_elements":"0.99024","published_at":"2026-04-26T12:55:00Z"},{"value":"0.78104","scoring_system":"epss","scoring_elements":"0.99022","published_at":"2026-04-24T12:55:00Z"},{"value":"0.78104","scoring_system":"epss","scoring_elements":"0.9902","published_at":"2026-04-21T12:55:00Z"},{"value":"0.78104","scoring_system":"epss","scoring_elements":"0.99026","published_at":"2026-04-29T12:55:00Z"},{"value":"0.78361","scoring_system":"epss","scoring_elements":"0.99043","published_at":"2026-05-09T12:55:00Z"},{"value":"0.78361","scoring_system":"epss","scoring_elements":"0.99042","published_at":"2026-05-07T12:55:00Z"},{"value":"0.78361","scoring_system":"epss","scoring_elements":"0.99044","published_at":"2026-05-12T12:55:00Z"},{"value":"0.79249","scoring_system":"epss","scoring_elements":"0.99079","published_at":"2026-05-05T12:55:00Z"},{"value":"0.8222","scoring_system":"epss","scoring_elements":"0.99233","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30551"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30551","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30551"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://crbug.com/1216437","reference_id":"1216437","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:53:02Z/"}],"url":"https://crbug.com/1216437"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079","reference_id":"990079","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079"},{"reference_url":"https://security.archlinux.org/ASA-202106-31","reference_id":"ASA-202106-31","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-31"},{"reference_url":"https://security.archlinux.org/ASA-202106-32","reference_id":"ASA-202106-32","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-32"},{"reference_url":"https://security.archlinux.org/AVG-2057","reference_id":"AVG-2057","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2057"},{"reference_url":"https://security.archlinux.org/AVG-2058","reference_id":"AVG-2058","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2058"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ETMZL6IHCTCTREEL434BQ4THQ7EOHJ43/","reference_id":"ETMZL6IHCTCTREEL434BQ4THQ7EOHJ43","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:53:02Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ETMZL6IHCTCTREEL434BQ4THQ7EOHJ43/"},{"reference_url":"https://security.gentoo.org/glsa/202107-06","reference_id":"GLSA-202107-06","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:53:02Z/"}],"url":"https://security.gentoo.org/glsa/202107-06"},{"reference_url":"https://security.gentoo.org/glsa/202208-25","reference_id":"GLSA-202208-25","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:53:02Z/"}],"url":"https://security.gentoo.org/glsa/202208-25"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAT6EOXVQFE6JFMFQF4IKAOUQSHMHL54/","reference_id":"PAT6EOXVQFE6JFMFQF4IKAOUQSHMHL54","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:53:02Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAT6EOXVQFE6JFMFQF4IKAOUQSHMHL54/"},{"reference_url":"https://chromereleases.googleblog.com/2021/06/stable-channel-update-for-desktop.html","reference_id":"stable-channel-update-for-desktop.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:53:02Z/"}],"url":"https://chromereleases.googleblog.com/2021/06/stable-channel-update-for-desktop.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84306?format=json","purl":"pkg:ebuild/www-client/google-chrome@5.15.5_p20220618","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/google-chrome@5.15.5_p20220618"},{"url":"http://public2.vulnerablecode.io/api/packages/77880?format=json","purl":"pkg:ebuild/www-client/google-chrome@91.0.4472.114","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/google-chrome@91.0.4472.114"},{"url":"http://public2.vulnerablecode.io/api/packages/84307?format=json","purl":"pkg:ebuild/www-client/google-chrome@103.0.5060.53","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/google-chrome@103.0.5060.53"}],"aliases":["CVE-2021-30551"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w43e-g6rb-4bgf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49416?format=json","vulnerability_id":"VCID-yp49-cubg-pkdj","summary":"Multiple vulnerabillities have been found in Chromium and Google\n    Chrome, the worst of which could allow remote attackers to execute\n    arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30507","reference_id":"","reference_type":"","scores":[{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60307","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60245","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60064","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60142","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60167","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60137","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60187","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.602","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60222","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60208","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60191","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.6023","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60238","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60225","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60196","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60213","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60199","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60155","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60203","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60261","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00392","scoring_system":"epss","scoring_elements":"0.60219","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30507"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30506","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30506"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30507","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30507"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30508","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30508"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30509","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30509"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30510","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30510"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30511","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30511"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30512","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30512"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30513","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30513"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30514","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30514"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30515","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30515"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30516","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30516"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30517","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30517"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30518","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30518"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30519","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30519"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30520","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30520"},{"reference_url":"https://security.archlinux.org/ASA-202105-7","reference_id":"ASA-202105-7","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202105-7"},{"reference_url":"https://security.archlinux.org/ASA-202105-8","reference_id":"ASA-202105-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202105-8"},{"reference_url":"https://security.archlinux.org/AVG-1936","reference_id":"AVG-1936","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1936"},{"reference_url":"https://security.archlinux.org/AVG-1937","reference_id":"AVG-1937","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1937"},{"reference_url":"https://security.gentoo.org/glsa/202107-06","reference_id":"GLSA-202107-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-06"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77880?format=json","purl":"pkg:ebuild/www-client/google-chrome@91.0.4472.114","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/google-chrome@91.0.4472.114"}],"aliases":["CVE-2021-30507"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yp49-cubg-pkdj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49453?format=json","vulnerability_id":"VCID-zvgk-sfcq-aycp","summary":"Multiple vulnerabillities have been found in Chromium and Google\n    Chrome, the worst of which could allow remote attackers to execute\n    arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30550","reference_id":"","reference_type":"","scores":[{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55835","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55749","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55775","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55668","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.5578","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55802","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55782","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55833","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55836","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55844","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55825","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55806","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55843","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55848","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55823","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.5575","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55766","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55743","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55688","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55736","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00328","scoring_system":"epss","scoring_elements":"0.55793","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30550"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079","reference_id":"990079","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079"},{"reference_url":"https://security.archlinux.org/ASA-202106-31","reference_id":"ASA-202106-31","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-31"},{"reference_url":"https://security.archlinux.org/ASA-202106-32","reference_id":"ASA-202106-32","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-32"},{"reference_url":"https://security.archlinux.org/AVG-2057","reference_id":"AVG-2057","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2057"},{"reference_url":"https://security.archlinux.org/AVG-2058","reference_id":"AVG-2058","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2058"},{"reference_url":"https://security.gentoo.org/glsa/202107-06","reference_id":"GLSA-202107-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-06"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77880?format=json","purl":"pkg:ebuild/www-client/google-chrome@91.0.4472.114","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/google-chrome@91.0.4472.114"}],"aliases":["CVE-2021-30550"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zvgk-sfcq-aycp"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/google-chrome@91.0.4472.114"}