{"url":"http://public2.vulnerablecode.io/api/packages/84605?format=json","purl":"pkg:ebuild/net-libs/webkit-gtk@2.34.4","type":"ebuild","namespace":"net-libs","name":"webkit-gtk","version":"2.34.4","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"2.36.7","latest_non_vulnerable_version":"4.38.00","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59527?format=json","vulnerability_id":"VCID-1fqx-3rnb-13bh","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30953.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30953.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30953","reference_id":"","reference_type":"","scores":[{"value":"0.00482","scoring_system":"epss","scoring_elements":"0.6508","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00482","scoring_system":"epss","scoring_elements":"0.6513","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00482","scoring_system":"epss","scoring_elements":"0.65157","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00482","scoring_system":"epss","scoring_elements":"0.65123","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00482","scoring_system":"epss","scoring_elements":"0.65172","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00482","scoring_system":"epss","scoring_elements":"0.65186","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00482","scoring_system":"epss","scoring_elements":"0.65204","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00482","scoring_system":"epss","scoring_elements":"0.65191","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00482","scoring_system":"epss","scoring_elements":"0.65163","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00482","scoring_system":"epss","scoring_elements":"0.65198","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00482","scoring_system":"epss","scoring_elements":"0.65208","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00482","scoring_system":"epss","scoring_elements":"0.65192","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00482","scoring_system":"epss","scoring_elements":"0.65206","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00482","scoring_system":"epss","scoring_elements":"0.65219","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00524","scoring_system":"epss","scoring_elements":"0.67119","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00524","scoring_system":"epss","scoring_elements":"0.66995","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00524","scoring_system":"epss","scoring_elements":"0.66967","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00524","scoring_system":"epss","scoring_elements":"0.67009","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00524","scoring_system":"epss","scoring_elements":"0.67049","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00524","scoring_system":"epss","scoring_elements":"0.67021","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00524","scoring_system":"epss","scoring_elements":"0.67044","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00524","scoring_system":"epss","scoring_elements":"0.67129","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00524","scoring_system":"epss","scoring_elements":"0.67107","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30953"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2044542","reference_id":"2044542","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2044542"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1777","reference_id":"RHSA-2022:1777","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5255-1/","reference_id":"USN-5255-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5255-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84605?format=json","purl":"pkg:ebuild/net-libs/webkit-gtk@2.34.4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.34.4"}],"aliases":["CVE-2021-30953"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1fqx-3rnb-13bh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59483?format=json","vulnerability_id":"VCID-1kyj-dxw1-q7a6","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1817.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1817.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-1817","reference_id":"","reference_type":"","scores":[{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76569","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76818","published_at":"2026-05-16T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76795","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76809","published_at":"2026-05-15T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76573","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76602","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76583","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76615","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76627","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76653","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76633","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76624","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76665","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76669","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76658","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76689","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76695","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76708","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76726","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76743","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76731","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76748","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-1817"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13543","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13543"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13584","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13584"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9947","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9947"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9948","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9948"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9951","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9951"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9983","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9983"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1817","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1817"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1820","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1820"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1825","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1825"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1826","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1826"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30661","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30661"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986852","reference_id":"1986852","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986852"},{"reference_url":"https://security.archlinux.org/AVG-2208","reference_id":"AVG-2208","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2208"},{"reference_url":"https://security.archlinux.org/AVG-2209","reference_id":"AVG-2209","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2209"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1586","reference_id":"RHSA-2021:1586","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1586"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84605?format=json","purl":"pkg:ebuild/net-libs/webkit-gtk@2.34.4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.34.4"}],"aliases":["CVE-2021-1817"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1kyj-dxw1-q7a6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59520?format=json","vulnerability_id":"VCID-2umj-w8zs-m3em","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30889.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30889.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30889","reference_id":"","reference_type":"","scores":[{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71641","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71647","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71665","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71638","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71678","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71688","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71712","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71695","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71677","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.7172","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71726","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71708","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71757","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71762","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71768","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71752","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71785","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71819","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71784","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71813","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.7187","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71879","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71891","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30889"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2034386","reference_id":"2034386","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2034386"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1777","reference_id":"RHSA-2022:1777","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84605?format=json","purl":"pkg:ebuild/net-libs/webkit-gtk@2.34.4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.34.4"}],"aliases":["CVE-2021-30889"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2umj-w8zs-m3em"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59512?format=json","vulnerability_id":"VCID-37kv-4cp4-5fas","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30846.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30846.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30846","reference_id":"","reference_type":"","scores":[{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.62031","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61856","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61903","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61964","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61918","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61945","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.62","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.62015","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00503","scoring_system":"epss","scoring_elements":"0.66091","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00503","scoring_system":"epss","scoring_elements":"0.66123","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00503","scoring_system":"epss","scoring_elements":"0.6611","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00503","scoring_system":"epss","scoring_elements":"0.6608","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00503","scoring_system":"epss","scoring_elements":"0.66116","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00503","scoring_system":"epss","scoring_elements":"0.6613","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00503","scoring_system":"epss","scoring_elements":"0.66118","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00503","scoring_system":"epss","scoring_elements":"0.66139","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00503","scoring_system":"epss","scoring_elements":"0.66151","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00503","scoring_system":"epss","scoring_elements":"0.6615","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00503","scoring_system":"epss","scoring_elements":"0.66006","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00503","scoring_system":"epss","scoring_elements":"0.66076","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00503","scoring_system":"epss","scoring_elements":"0.66043","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00503","scoring_system":"epss","scoring_elements":"0.66104","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00503","scoring_system":"epss","scoring_elements":"0.66048","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30846"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2017898","reference_id":"2017898","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2017898"},{"reference_url":"https://security.archlinux.org/ASA-202110-10","reference_id":"ASA-202110-10","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202110-10"},{"reference_url":"https://security.archlinux.org/ASA-202110-9","reference_id":"ASA-202110-9","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202110-9"},{"reference_url":"https://security.archlinux.org/AVG-2483","reference_id":"AVG-2483","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2483"},{"reference_url":"https://security.archlinux.org/AVG-2484","reference_id":"AVG-2484","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2484"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1777","reference_id":"RHSA-2022:1777","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5127-1/","reference_id":"USN-5127-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5127-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84605?format=json","purl":"pkg:ebuild/net-libs/webkit-gtk@2.34.4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.34.4"}],"aliases":["CVE-2021-30846"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-37kv-4cp4-5fas"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59500?format=json","vulnerability_id":"VCID-3ghs-su4t-cqg7","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30744.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30744.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30744","reference_id":"","reference_type":"","scores":[{"value":"0.0061","scoring_system":"epss","scoring_elements":"0.69685","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0061","scoring_system":"epss","scoring_elements":"0.69961","published_at":"2026-05-16T12:55:00Z"},{"value":"0.0061","scoring_system":"epss","scoring_elements":"0.69938","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0061","scoring_system":"epss","scoring_elements":"0.69947","published_at":"2026-05-15T12:55:00Z"},{"value":"0.0061","scoring_system":"epss","scoring_elements":"0.69697","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0061","scoring_system":"epss","scoring_elements":"0.69713","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0061","scoring_system":"epss","scoring_elements":"0.6969","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0061","scoring_system":"epss","scoring_elements":"0.69738","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0061","scoring_system":"epss","scoring_elements":"0.69755","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0061","scoring_system":"epss","scoring_elements":"0.69776","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0061","scoring_system":"epss","scoring_elements":"0.69761","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0061","scoring_system":"epss","scoring_elements":"0.69747","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0061","scoring_system":"epss","scoring_elements":"0.69788","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0061","scoring_system":"epss","scoring_elements":"0.69798","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0061","scoring_system":"epss","scoring_elements":"0.69779","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0061","scoring_system":"epss","scoring_elements":"0.6983","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0061","scoring_system":"epss","scoring_elements":"0.69839","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0061","scoring_system":"epss","scoring_elements":"0.69843","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0061","scoring_system":"epss","scoring_elements":"0.69818","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0061","scoring_system":"epss","scoring_elements":"0.69862","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0061","scoring_system":"epss","scoring_elements":"0.69892","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0061","scoring_system":"epss","scoring_elements":"0.69861","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0061","scoring_system":"epss","scoring_elements":"0.69888","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986888","reference_id":"1986888","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986888"},{"reference_url":"https://security.archlinux.org/ASA-202107-67","reference_id":"ASA-202107-67","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-67"},{"reference_url":"https://security.archlinux.org/ASA-202107-68","reference_id":"ASA-202107-68","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-68"},{"reference_url":"https://security.archlinux.org/AVG-2220","reference_id":"AVG-2220","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2220"},{"reference_url":"https://security.archlinux.org/AVG-2221","reference_id":"AVG-2221","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2221"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4381","reference_id":"RHSA-2021:4381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5024-1/","reference_id":"USN-5024-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5024-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84605?format=json","purl":"pkg:ebuild/net-libs/webkit-gtk@2.34.4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.34.4"}],"aliases":["CVE-2021-30744"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3ghs-su4t-cqg7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59533?format=json","vulnerability_id":"VCID-4a1y-uhze-syfg","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45482.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45482.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-45482","reference_id":"","reference_type":"","scores":[{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07937","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.08036","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.08079","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.08042","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.08102","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.08124","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.08115","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.08095","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.08078","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07984","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07968","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.08126","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.08081","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.08045","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.08017","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07985","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.08117","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.08184","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.08168","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.08196","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.08249","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.08251","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.08262","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-45482"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30809","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30809"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30836","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30836"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30848","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30848"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30849","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30849"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30858","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45482","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45482"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2040329","reference_id":"2040329","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2040329"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1777","reference_id":"RHSA-2022:1777","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84605?format=json","purl":"pkg:ebuild/net-libs/webkit-gtk@2.34.4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.34.4"}],"aliases":["CVE-2021-45482"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4a1y-uhze-syfg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59505?format=json","vulnerability_id":"VCID-4dcz-sdeb-p7ar","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30795.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30795.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30795","reference_id":"","reference_type":"","scores":[{"value":"0.00914","scoring_system":"epss","scoring_elements":"0.75823","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00914","scoring_system":"epss","scoring_elements":"0.76101","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00914","scoring_system":"epss","scoring_elements":"0.76077","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00914","scoring_system":"epss","scoring_elements":"0.76092","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00914","scoring_system":"epss","scoring_elements":"0.75826","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00914","scoring_system":"epss","scoring_elements":"0.75859","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00914","scoring_system":"epss","scoring_elements":"0.75837","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00914","scoring_system":"epss","scoring_elements":"0.7587","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00914","scoring_system":"epss","scoring_elements":"0.75883","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00914","scoring_system":"epss","scoring_elements":"0.75906","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00914","scoring_system":"epss","scoring_elements":"0.75888","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00914","scoring_system":"epss","scoring_elements":"0.75881","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00914","scoring_system":"epss","scoring_elements":"0.75919","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00914","scoring_system":"epss","scoring_elements":"0.75922","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00914","scoring_system":"epss","scoring_elements":"0.75909","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00914","scoring_system":"epss","scoring_elements":"0.75946","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00914","scoring_system":"epss","scoring_elements":"0.75956","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00914","scoring_system":"epss","scoring_elements":"0.75966","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00914","scoring_system":"epss","scoring_elements":"0.75976","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00914","scoring_system":"epss","scoring_elements":"0.76005","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00914","scoring_system":"epss","scoring_elements":"0.76029","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00914","scoring_system":"epss","scoring_elements":"0.76013","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00914","scoring_system":"epss","scoring_elements":"0.76028","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30795"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986900","reference_id":"1986900","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986900"},{"reference_url":"https://security.archlinux.org/ASA-202107-67","reference_id":"ASA-202107-67","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-67"},{"reference_url":"https://security.archlinux.org/ASA-202107-68","reference_id":"ASA-202107-68","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-68"},{"reference_url":"https://security.archlinux.org/AVG-2220","reference_id":"AVG-2220","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2220"},{"reference_url":"https://security.archlinux.org/AVG-2221","reference_id":"AVG-2221","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2221"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4381","reference_id":"RHSA-2021:4381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5024-1/","reference_id":"USN-5024-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5024-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84605?format=json","purl":"pkg:ebuild/net-libs/webkit-gtk@2.34.4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.34.4"}],"aliases":["CVE-2021-30795"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4dcz-sdeb-p7ar"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59494?format=json","vulnerability_id":"VCID-4fv8-5wm3-byf9","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30665.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30665.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30665","reference_id":"","reference_type":"","scores":[{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68421","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.6824","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68251","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68231","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68273","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68281","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68286","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.6826","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68305","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68343","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68307","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68334","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68394","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00558","scoring_system":"epss","scoring_elements":"0.68407","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69643","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69622","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69673","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.6969","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69712","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69698","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69684","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69615","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69627","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30665"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986874","reference_id":"1986874","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986874"},{"reference_url":"https://security.archlinux.org/ASA-202107-67","reference_id":"ASA-202107-67","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-67"},{"reference_url":"https://security.archlinux.org/ASA-202107-68","reference_id":"ASA-202107-68","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-68"},{"reference_url":"https://security.archlinux.org/AVG-2220","reference_id":"AVG-2220","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2220"},{"reference_url":"https://security.archlinux.org/AVG-2221","reference_id":"AVG-2221","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2221"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://support.apple.com/en-us/HT212335","reference_id":"HT212335","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:26:21Z/"}],"url":"https://support.apple.com/en-us/HT212335"},{"reference_url":"https://support.apple.com/en-us/HT212336","reference_id":"HT212336","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:26:21Z/"}],"url":"https://support.apple.com/en-us/HT212336"},{"reference_url":"https://support.apple.com/en-us/HT212339","reference_id":"HT212339","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:26:21Z/"}],"url":"https://support.apple.com/en-us/HT212339"},{"reference_url":"https://support.apple.com/en-us/HT212341","reference_id":"HT212341","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:26:21Z/"}],"url":"https://support.apple.com/en-us/HT212341"},{"reference_url":"https://support.apple.com/en-us/HT212532","reference_id":"HT212532","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:26:21Z/"}],"url":"https://support.apple.com/en-us/HT212532"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4381","reference_id":"RHSA-2021:4381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5024-1/","reference_id":"USN-5024-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5024-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84605?format=json","purl":"pkg:ebuild/net-libs/webkit-gtk@2.34.4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.34.4"}],"aliases":["CVE-2021-30665"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4fv8-5wm3-byf9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59518?format=json","vulnerability_id":"VCID-4mbv-yf9n-puck","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30887.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30887.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30887","reference_id":"","reference_type":"","scores":[{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53579","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53603","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53631","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.536","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53652","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.5365","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53699","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53682","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53665","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53702","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53707","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53689","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53629","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0033","scoring_system":"epss","scoring_elements":"0.56021","published_at":"2026-05-15T12:55:00Z"},{"value":"0.0033","scoring_system":"epss","scoring_elements":"0.55867","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0033","scoring_system":"epss","scoring_elements":"0.55914","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0033","scoring_system":"epss","scoring_elements":"0.55974","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0033","scoring_system":"epss","scoring_elements":"0.55925","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0033","scoring_system":"epss","scoring_elements":"0.55948","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0033","scoring_system":"epss","scoring_elements":"0.56024","published_at":"2026-05-16T12:55:00Z"},{"value":"0.0033","scoring_system":"epss","scoring_elements":"0.56006","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30887"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30887","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30887"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30890","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30890"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2034381","reference_id":"2034381","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2034381"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1777","reference_id":"RHSA-2022:1777","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5213-1/","reference_id":"USN-5213-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5213-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84605?format=json","purl":"pkg:ebuild/net-libs/webkit-gtk@2.34.4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.34.4"}],"aliases":["CVE-2021-30887"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4mbv-yf9n-puck"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59515?format=json","vulnerability_id":"VCID-5cwk-td7w-3uem","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30851.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30851.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30851","reference_id":"","reference_type":"","scores":[{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.73683","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00769","scoring_system":"epss","scoring_elements":"0.73674","published_at":"2026-05-15T12:55:00Z"},{"value":"0.01034","scoring_system":"epss","scoring_elements":"0.77561","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01034","scoring_system":"epss","scoring_elements":"0.77308","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01034","scoring_system":"epss","scoring_elements":"0.77315","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01034","scoring_system":"epss","scoring_elements":"0.77343","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01034","scoring_system":"epss","scoring_elements":"0.77323","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01034","scoring_system":"epss","scoring_elements":"0.77354","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01034","scoring_system":"epss","scoring_elements":"0.77363","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01034","scoring_system":"epss","scoring_elements":"0.7739","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01034","scoring_system":"epss","scoring_elements":"0.77369","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01034","scoring_system":"epss","scoring_elements":"0.77366","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01034","scoring_system":"epss","scoring_elements":"0.77406","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01034","scoring_system":"epss","scoring_elements":"0.77405","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01034","scoring_system":"epss","scoring_elements":"0.77397","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01034","scoring_system":"epss","scoring_elements":"0.77431","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01034","scoring_system":"epss","scoring_elements":"0.77438","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01034","scoring_system":"epss","scoring_elements":"0.7745","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01034","scoring_system":"epss","scoring_elements":"0.77458","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01034","scoring_system":"epss","scoring_elements":"0.77485","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01034","scoring_system":"epss","scoring_elements":"0.77508","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01034","scoring_system":"epss","scoring_elements":"0.77497","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01034","scoring_system":"epss","scoring_elements":"0.77515","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30851"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2018573","reference_id":"2018573","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2018573"},{"reference_url":"https://security.archlinux.org/ASA-202110-10","reference_id":"ASA-202110-10","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202110-10"},{"reference_url":"https://security.archlinux.org/ASA-202110-9","reference_id":"ASA-202110-9","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202110-9"},{"reference_url":"https://security.archlinux.org/AVG-2483","reference_id":"AVG-2483","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2483"},{"reference_url":"https://security.archlinux.org/AVG-2484","reference_id":"AVG-2484","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2484"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1777","reference_id":"RHSA-2022:1777","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5127-1/","reference_id":"USN-5127-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5127-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84605?format=json","purl":"pkg:ebuild/net-libs/webkit-gtk@2.34.4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.34.4"}],"aliases":["CVE-2021-30851"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5cwk-td7w-3uem"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59507?format=json","vulnerability_id":"VCID-67td-2hu4-eqdp","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30799.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30799.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30799","reference_id":"","reference_type":"","scores":[{"value":"0.01008","scoring_system":"epss","scoring_elements":"0.77006","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01008","scoring_system":"epss","scoring_elements":"0.7711","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01008","scoring_system":"epss","scoring_elements":"0.77214","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01008","scoring_system":"epss","scoring_elements":"0.77202","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01008","scoring_system":"epss","scoring_elements":"0.77218","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01008","scoring_system":"epss","scoring_elements":"0.77266","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01008","scoring_system":"epss","scoring_elements":"0.77012","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01008","scoring_system":"epss","scoring_elements":"0.77041","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01008","scoring_system":"epss","scoring_elements":"0.77021","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01008","scoring_system":"epss","scoring_elements":"0.77053","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01008","scoring_system":"epss","scoring_elements":"0.77064","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01008","scoring_system":"epss","scoring_elements":"0.77092","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01008","scoring_system":"epss","scoring_elements":"0.77072","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01008","scoring_system":"epss","scoring_elements":"0.77067","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01008","scoring_system":"epss","scoring_elements":"0.77109","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01008","scoring_system":"epss","scoring_elements":"0.77101","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01008","scoring_system":"epss","scoring_elements":"0.77135","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01008","scoring_system":"epss","scoring_elements":"0.77142","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01008","scoring_system":"epss","scoring_elements":"0.77156","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01008","scoring_system":"epss","scoring_elements":"0.77164","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01008","scoring_system":"epss","scoring_elements":"0.77193","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.79163","published_at":"2026-05-15T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.7917","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30799"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986906","reference_id":"1986906","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986906"},{"reference_url":"https://security.archlinux.org/ASA-202107-67","reference_id":"ASA-202107-67","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-67"},{"reference_url":"https://security.archlinux.org/ASA-202107-68","reference_id":"ASA-202107-68","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-68"},{"reference_url":"https://security.archlinux.org/AVG-2220","reference_id":"AVG-2220","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2220"},{"reference_url":"https://security.archlinux.org/AVG-2221","reference_id":"AVG-2221","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2221"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4381","reference_id":"RHSA-2021:4381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5024-1/","reference_id":"USN-5024-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5024-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84605?format=json","purl":"pkg:ebuild/net-libs/webkit-gtk@2.34.4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.34.4"}],"aliases":["CVE-2021-30799"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-67td-2hu4-eqdp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59502?format=json","vulnerability_id":"VCID-7cef-namz-wkec","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30758.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30758.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30758","reference_id":"","reference_type":"","scores":[{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.5702","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.57188","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.57167","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.57183","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.57115","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.57137","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.57113","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.57164","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.57166","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.57178","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.57157","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.57165","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.57161","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.5714","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.57071","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.5709","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.57072","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.57022","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.57068","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.57131","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.57079","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.57104","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30758"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986892","reference_id":"1986892","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986892"},{"reference_url":"https://security.archlinux.org/AVG-2218","reference_id":"AVG-2218","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2218"},{"reference_url":"https://security.archlinux.org/AVG-2219","reference_id":"AVG-2219","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2219"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4381","reference_id":"RHSA-2021:4381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5024-1/","reference_id":"USN-5024-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5024-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84605?format=json","purl":"pkg:ebuild/net-libs/webkit-gtk@2.34.4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.34.4"}],"aliases":["CVE-2021-30758"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7cef-namz-wkec"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59490?format=json","vulnerability_id":"VCID-7gbc-786y-hyc8","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21779.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21779.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-21779","reference_id":"","reference_type":"","scores":[{"value":"0.00508","scoring_system":"epss","scoring_elements":"0.66233","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00508","scoring_system":"epss","scoring_elements":"0.6652","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00508","scoring_system":"epss","scoring_elements":"0.66439","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00508","scoring_system":"epss","scoring_elements":"0.66499","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00508","scoring_system":"epss","scoring_elements":"0.66508","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00508","scoring_system":"epss","scoring_elements":"0.66273","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00508","scoring_system":"epss","scoring_elements":"0.66299","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00508","scoring_system":"epss","scoring_elements":"0.66269","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00508","scoring_system":"epss","scoring_elements":"0.66317","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00508","scoring_system":"epss","scoring_elements":"0.6633","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00508","scoring_system":"epss","scoring_elements":"0.6635","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00508","scoring_system":"epss","scoring_elements":"0.66337","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00508","scoring_system":"epss","scoring_elements":"0.66306","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00508","scoring_system":"epss","scoring_elements":"0.66341","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00508","scoring_system":"epss","scoring_elements":"0.66357","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00508","scoring_system":"epss","scoring_elements":"0.66342","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00508","scoring_system":"epss","scoring_elements":"0.66365","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00508","scoring_system":"epss","scoring_elements":"0.66379","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00508","scoring_system":"epss","scoring_elements":"0.66356","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00508","scoring_system":"epss","scoring_elements":"0.664","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00508","scoring_system":"epss","scoring_elements":"0.66445","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00508","scoring_system":"epss","scoring_elements":"0.66417","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-21779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986866","reference_id":"1986866","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986866"},{"reference_url":"https://security.archlinux.org/ASA-202107-67","reference_id":"ASA-202107-67","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-67"},{"reference_url":"https://security.archlinux.org/ASA-202107-68","reference_id":"ASA-202107-68","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-68"},{"reference_url":"https://security.archlinux.org/AVG-2220","reference_id":"AVG-2220","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2220"},{"reference_url":"https://security.archlinux.org/AVG-2221","reference_id":"AVG-2221","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2221"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4381","reference_id":"RHSA-2021:4381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5024-1/","reference_id":"USN-5024-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5024-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84605?format=json","purl":"pkg:ebuild/net-libs/webkit-gtk@2.34.4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.34.4"}],"aliases":["CVE-2021-21779"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7gbc-786y-hyc8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59501?format=json","vulnerability_id":"VCID-835v-4yds-ebem","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30749.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30749.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30749","reference_id":"","reference_type":"","scores":[{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.79327","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.79576","published_at":"2026-05-16T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.79529","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.79565","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.79571","published_at":"2026-05-15T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.79333","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.79357","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.79343","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.79369","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.79378","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.79401","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.79386","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.79375","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.79407","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.79405","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.79408","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.79441","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.79446","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.79461","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.79476","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.79498","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.79516","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01256","scoring_system":"epss","scoring_elements":"0.79514","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986890","reference_id":"1986890","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986890"},{"reference_url":"https://security.archlinux.org/ASA-202107-67","reference_id":"ASA-202107-67","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-67"},{"reference_url":"https://security.archlinux.org/ASA-202107-68","reference_id":"ASA-202107-68","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-68"},{"reference_url":"https://security.archlinux.org/AVG-2220","reference_id":"AVG-2220","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2220"},{"reference_url":"https://security.archlinux.org/AVG-2221","reference_id":"AVG-2221","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2221"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4381","reference_id":"RHSA-2021:4381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5024-1/","reference_id":"USN-5024-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5024-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84605?format=json","purl":"pkg:ebuild/net-libs/webkit-gtk@2.34.4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.34.4"}],"aliases":["CVE-2021-30749"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-835v-4yds-ebem"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59485?format=json","vulnerability_id":"VCID-8dkk-sgdg-kfhy","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1825.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1825.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-1825","reference_id":"","reference_type":"","scores":[{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.62951","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63232","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63207","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63218","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63009","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63038","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63003","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63054","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63069","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63087","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63073","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63051","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63095","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63074","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63109","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63108","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63065","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63112","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63163","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63124","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00437","scoring_system":"epss","scoring_elements":"0.63152","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-1825"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13543","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13543"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13584","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13584"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9947","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9947"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9948","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9948"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9951","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9951"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9983","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9983"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1817","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1817"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1820","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1820"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1825","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1825"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1826","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1826"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30661","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30661"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986858","reference_id":"1986858","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986858"},{"reference_url":"https://security.archlinux.org/AVG-2208","reference_id":"AVG-2208","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2208"},{"reference_url":"https://security.archlinux.org/AVG-2209","reference_id":"AVG-2209","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2209"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1586","reference_id":"RHSA-2021:1586","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1586"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84605?format=json","purl":"pkg:ebuild/net-libs/webkit-gtk@2.34.4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.34.4"}],"aliases":["CVE-2021-1825"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8dkk-sgdg-kfhy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59498?format=json","vulnerability_id":"VCID-8y8h-r2c8-hudj","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30720.json","reference_id":"","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30720.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30720","reference_id":"","reference_type":"","scores":[{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59508","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59768","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59745","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59754","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59581","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59606","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59576","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59627","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59639","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59659","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59642","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59623","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59656","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59663","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59647","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59617","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59637","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59584","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59632","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59691","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59648","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00383","scoring_system":"epss","scoring_elements":"0.59676","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30720"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986883","reference_id":"1986883","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986883"},{"reference_url":"https://security.archlinux.org/ASA-202107-67","reference_id":"ASA-202107-67","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-67"},{"reference_url":"https://security.archlinux.org/ASA-202107-68","reference_id":"ASA-202107-68","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-68"},{"reference_url":"https://security.archlinux.org/AVG-2220","reference_id":"AVG-2220","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2220"},{"reference_url":"https://security.archlinux.org/AVG-2221","reference_id":"AVG-2221","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2221"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4381","reference_id":"RHSA-2021:4381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5024-1/","reference_id":"USN-5024-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5024-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84605?format=json","purl":"pkg:ebuild/net-libs/webkit-gtk@2.34.4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.34.4"}],"aliases":["CVE-2021-30720"],"risk_score":4.2,"exploitability":"0.5","weighted_severity":"8.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8y8h-r2c8-hudj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59513?format=json","vulnerability_id":"VCID-9jak-ycxb-bfgx","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30848.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30848.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30848","reference_id":"","reference_type":"","scores":[{"value":"0.00316","scoring_system":"epss","scoring_elements":"0.54628","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00316","scoring_system":"epss","scoring_elements":"0.54817","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00316","scoring_system":"epss","scoring_elements":"0.54734","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00316","scoring_system":"epss","scoring_elements":"0.54801","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00316","scoring_system":"epss","scoring_elements":"0.54813","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00316","scoring_system":"epss","scoring_elements":"0.54698","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00316","scoring_system":"epss","scoring_elements":"0.54721","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00316","scoring_system":"epss","scoring_elements":"0.54691","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00316","scoring_system":"epss","scoring_elements":"0.54743","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00316","scoring_system":"epss","scoring_elements":"0.54739","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00316","scoring_system":"epss","scoring_elements":"0.54751","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00316","scoring_system":"epss","scoring_elements":"0.54736","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00316","scoring_system":"epss","scoring_elements":"0.54714","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00316","scoring_system":"epss","scoring_elements":"0.54752","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00316","scoring_system":"epss","scoring_elements":"0.54754","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00316","scoring_system":"epss","scoring_elements":"0.54735","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00316","scoring_system":"epss","scoring_elements":"0.54707","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00316","scoring_system":"epss","scoring_elements":"0.54726","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00316","scoring_system":"epss","scoring_elements":"0.54703","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00316","scoring_system":"epss","scoring_elements":"0.54649","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00316","scoring_system":"epss","scoring_elements":"0.54692","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00316","scoring_system":"epss","scoring_elements":"0.54746","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00316","scoring_system":"epss","scoring_elements":"0.54706","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30848"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30809","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30809"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30836","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30836"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30848","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30848"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30849","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30849"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30858","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45482","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45482"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2017901","reference_id":"2017901","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2017901"},{"reference_url":"https://security.archlinux.org/AVG-2399","reference_id":"AVG-2399","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2399"},{"reference_url":"https://security.archlinux.org/AVG-2400","reference_id":"AVG-2400","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2400"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1777","reference_id":"RHSA-2022:1777","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84605?format=json","purl":"pkg:ebuild/net-libs/webkit-gtk@2.34.4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.34.4"}],"aliases":["CVE-2021-30848"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9jak-ycxb-bfgx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59491?format=json","vulnerability_id":"VCID-afqa-zafe-cqhn","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21806.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21806.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-21806","reference_id":"","reference_type":"","scores":[{"value":"0.02072","scoring_system":"epss","scoring_elements":"0.83883","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02072","scoring_system":"epss","scoring_elements":"0.84139","published_at":"2026-05-16T12:55:00Z"},{"value":"0.02072","scoring_system":"epss","scoring_elements":"0.84093","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02072","scoring_system":"epss","scoring_elements":"0.84126","published_at":"2026-05-14T12:55:00Z"},{"value":"0.02072","scoring_system":"epss","scoring_elements":"0.84137","published_at":"2026-05-15T12:55:00Z"},{"value":"0.02072","scoring_system":"epss","scoring_elements":"0.83897","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02072","scoring_system":"epss","scoring_elements":"0.83913","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02072","scoring_system":"epss","scoring_elements":"0.83916","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02072","scoring_system":"epss","scoring_elements":"0.8394","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02072","scoring_system":"epss","scoring_elements":"0.83946","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02072","scoring_system":"epss","scoring_elements":"0.83962","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02072","scoring_system":"epss","scoring_elements":"0.83956","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02072","scoring_system":"epss","scoring_elements":"0.83952","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02072","scoring_system":"epss","scoring_elements":"0.83976","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02072","scoring_system":"epss","scoring_elements":"0.83978","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02072","scoring_system":"epss","scoring_elements":"0.84004","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02072","scoring_system":"epss","scoring_elements":"0.84012","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02072","scoring_system":"epss","scoring_elements":"0.84017","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02072","scoring_system":"epss","scoring_elements":"0.84038","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02072","scoring_system":"epss","scoring_elements":"0.84061","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02072","scoring_system":"epss","scoring_elements":"0.84077","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02072","scoring_system":"epss","scoring_elements":"0.84076","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-21806"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27918","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27918"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29623","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1765","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1765"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1789","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1789"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1799","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1799"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1801","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1801"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1870","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1870"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21806"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1980441","reference_id":"1980441","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1980441"},{"reference_url":"https://security.archlinux.org/AVG-2214","reference_id":"AVG-2214","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2214"},{"reference_url":"https://security.archlinux.org/AVG-2215","reference_id":"AVG-2215","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2215"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4381","reference_id":"RHSA-2021:4381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84605?format=json","purl":"pkg:ebuild/net-libs/webkit-gtk@2.34.4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.34.4"}],"aliases":["CVE-2021-21806"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-afqa-zafe-cqhn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59523?format=json","vulnerability_id":"VCID-b3jh-p9hd-ebb7","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30934.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30934.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30934","reference_id":"","reference_type":"","scores":[{"value":"0.0169","scoring_system":"epss","scoring_elements":"0.82155","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0169","scoring_system":"epss","scoring_elements":"0.82168","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0169","scoring_system":"epss","scoring_elements":"0.82189","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0169","scoring_system":"epss","scoring_elements":"0.82185","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0169","scoring_system":"epss","scoring_elements":"0.82212","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0169","scoring_system":"epss","scoring_elements":"0.82219","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0169","scoring_system":"epss","scoring_elements":"0.82238","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0169","scoring_system":"epss","scoring_elements":"0.82231","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0169","scoring_system":"epss","scoring_elements":"0.82225","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0169","scoring_system":"epss","scoring_elements":"0.82261","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0169","scoring_system":"epss","scoring_elements":"0.82262","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0169","scoring_system":"epss","scoring_elements":"0.82263","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0169","scoring_system":"epss","scoring_elements":"0.82284","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0169","scoring_system":"epss","scoring_elements":"0.82295","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01832","scoring_system":"epss","scoring_elements":"0.83115","published_at":"2026-05-15T12:55:00Z"},{"value":"0.01832","scoring_system":"epss","scoring_elements":"0.82991","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01832","scoring_system":"epss","scoring_elements":"0.83013","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01832","scoring_system":"epss","scoring_elements":"0.83034","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01832","scoring_system":"epss","scoring_elements":"0.83054","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01832","scoring_system":"epss","scoring_elements":"0.83069","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01832","scoring_system":"epss","scoring_elements":"0.83117","published_at":"2026-05-16T12:55:00Z"},{"value":"0.01832","scoring_system":"epss","scoring_elements":"0.83105","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30934"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2044521","reference_id":"2044521","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2044521"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1777","reference_id":"RHSA-2022:1777","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5255-1/","reference_id":"USN-5255-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5255-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84605?format=json","purl":"pkg:ebuild/net-libs/webkit-gtk@2.34.4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.34.4"}],"aliases":["CVE-2021-30934"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b3jh-p9hd-ebb7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59508?format=json","vulnerability_id":"VCID-b9t6-k4u8-qqbt","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30809.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30809.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30809","reference_id":"","reference_type":"","scores":[{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.59731","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.59805","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.59829","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.59799","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.5985","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.59864","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.59885","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.59869","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.59851","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.59888","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.59894","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.5988","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.59856","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.59818","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.59922","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.59906","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.59971","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.59981","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.59995","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30809"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30809","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30809"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30836","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30836"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30848","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30848"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30849","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30849"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30858","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45482","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45482"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2034347","reference_id":"2034347","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2034347"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1777","reference_id":"RHSA-2022:1777","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84605?format=json","purl":"pkg:ebuild/net-libs/webkit-gtk@2.34.4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.34.4"}],"aliases":["CVE-2021-30809"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b9t6-k4u8-qqbt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59522?format=json","vulnerability_id":"VCID-bm12-ezac-rye8","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30897.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30897.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30897","reference_id":"","reference_type":"","scores":[{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54287","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54307","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54337","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54312","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54364","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54359","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54408","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.5439","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54368","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54407","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54411","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54392","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54356","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.5437","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54346","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54297","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.5434","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54397","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54382","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54449","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54461","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00312","scoring_system":"epss","scoring_elements":"0.54465","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30897"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2038907","reference_id":"2038907","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2038907"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1777","reference_id":"RHSA-2022:1777","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84605?format=json","purl":"pkg:ebuild/net-libs/webkit-gtk@2.34.4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.34.4"}],"aliases":["CVE-2021-30897"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bm12-ezac-rye8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59519?format=json","vulnerability_id":"VCID-cjn2-p55e-bbbs","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30888.json","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30888.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30888","reference_id":"","reference_type":"","scores":[{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44074","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44138","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44162","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44093","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44144","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44147","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44163","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.4413","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44191","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44182","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44111","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44034","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44037","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.43952","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.43829","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.43903","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.43922","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.4386","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.4389","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.43958","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.43976","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44006","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30888"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2034383","reference_id":"2034383","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2034383"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1777","reference_id":"RHSA-2022:1777","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84605?format=json","purl":"pkg:ebuild/net-libs/webkit-gtk@2.34.4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.34.4"}],"aliases":["CVE-2021-30888"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cjn2-p55e-bbbs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59492?format=json","vulnerability_id":"VCID-cuwm-antx-6ye4","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30661.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30661.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30661","reference_id":"","reference_type":"","scores":[{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.29742","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30089","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30067","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30022","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.29954","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.29838","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.29771","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.29627","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.29691","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.29705","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.29633","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.29654","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.29733","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.29741","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35073","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35058","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35022","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34998","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34876","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35101","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.3498","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35025","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35054","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30661"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13543","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13543"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13584","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13584"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9947","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9947"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9948","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9948"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9951","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9951"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9983","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9983"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1817","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1817"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1820","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1820"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1825","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1825"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1826","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1826"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30661","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30661"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986870","reference_id":"1986870","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986870"},{"reference_url":"https://security.archlinux.org/AVG-2208","reference_id":"AVG-2208","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2208"},{"reference_url":"https://security.archlinux.org/AVG-2209","reference_id":"AVG-2209","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2209"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://support.apple.com/en-us/HT212317","reference_id":"HT212317","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:25:03Z/"}],"url":"https://support.apple.com/en-us/HT212317"},{"reference_url":"https://support.apple.com/en-us/HT212318","reference_id":"HT212318","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:25:03Z/"}],"url":"https://support.apple.com/en-us/HT212318"},{"reference_url":"https://support.apple.com/en-us/HT212323","reference_id":"HT212323","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:25:03Z/"}],"url":"https://support.apple.com/en-us/HT212323"},{"reference_url":"https://support.apple.com/en-us/HT212324","reference_id":"HT212324","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:25:03Z/"}],"url":"https://support.apple.com/en-us/HT212324"},{"reference_url":"https://support.apple.com/en-us/HT212325","reference_id":"HT212325","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:25:03Z/"}],"url":"https://support.apple.com/en-us/HT212325"},{"reference_url":"https://support.apple.com/en-us/HT212341","reference_id":"HT212341","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:25:03Z/"}],"url":"https://support.apple.com/en-us/HT212341"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1586","reference_id":"RHSA-2021:1586","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1586"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84605?format=json","purl":"pkg:ebuild/net-libs/webkit-gtk@2.34.4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.34.4"}],"aliases":["CVE-2021-30661"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cuwm-antx-6ye4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59530?format=json","vulnerability_id":"VCID-dz61-8f33-t7ej","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30984.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30984.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30984","reference_id":"","reference_type":"","scores":[{"value":"0.00688","scoring_system":"epss","scoring_elements":"0.71687","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00688","scoring_system":"epss","scoring_elements":"0.71693","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00688","scoring_system":"epss","scoring_elements":"0.71711","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00688","scoring_system":"epss","scoring_elements":"0.71685","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00688","scoring_system":"epss","scoring_elements":"0.71724","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00688","scoring_system":"epss","scoring_elements":"0.71735","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00688","scoring_system":"epss","scoring_elements":"0.71759","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00688","scoring_system":"epss","scoring_elements":"0.71743","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00688","scoring_system":"epss","scoring_elements":"0.71725","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00688","scoring_system":"epss","scoring_elements":"0.71769","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00688","scoring_system":"epss","scoring_elements":"0.71774","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00688","scoring_system":"epss","scoring_elements":"0.71756","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00688","scoring_system":"epss","scoring_elements":"0.71805","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00688","scoring_system":"epss","scoring_elements":"0.7181","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00747","scoring_system":"epss","scoring_elements":"0.73264","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00747","scoring_system":"epss","scoring_elements":"0.73175","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00747","scoring_system":"epss","scoring_elements":"0.7317","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00747","scoring_system":"epss","scoring_elements":"0.73196","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00747","scoring_system":"epss","scoring_elements":"0.73217","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00747","scoring_system":"epss","scoring_elements":"0.73178","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00747","scoring_system":"epss","scoring_elements":"0.73201","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00747","scoring_system":"epss","scoring_elements":"0.73272","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00747","scoring_system":"epss","scoring_elements":"0.73257","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30984"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2044553","reference_id":"2044553","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2044553"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1777","reference_id":"RHSA-2022:1777","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5255-1/","reference_id":"USN-5255-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5255-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84605?format=json","purl":"pkg:ebuild/net-libs/webkit-gtk@2.34.4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.34.4"}],"aliases":["CVE-2021-30984"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dz61-8f33-t7ej"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59506?format=json","vulnerability_id":"VCID-feqc-qs1m-ube7","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30797.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30797.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30797","reference_id":"","reference_type":"","scores":[{"value":"0.00672","scoring_system":"epss","scoring_elements":"0.7132","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00672","scoring_system":"epss","scoring_elements":"0.71591","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00672","scoring_system":"epss","scoring_elements":"0.7157","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00672","scoring_system":"epss","scoring_elements":"0.71579","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00672","scoring_system":"epss","scoring_elements":"0.71328","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00672","scoring_system":"epss","scoring_elements":"0.71346","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00672","scoring_system":"epss","scoring_elements":"0.71361","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00672","scoring_system":"epss","scoring_elements":"0.71374","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00672","scoring_system":"epss","scoring_elements":"0.71397","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00672","scoring_system":"epss","scoring_elements":"0.71381","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00672","scoring_system":"epss","scoring_elements":"0.71364","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00672","scoring_system":"epss","scoring_elements":"0.7141","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00672","scoring_system":"epss","scoring_elements":"0.71416","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00672","scoring_system":"epss","scoring_elements":"0.71396","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00672","scoring_system":"epss","scoring_elements":"0.71448","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00672","scoring_system":"epss","scoring_elements":"0.71456","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00672","scoring_system":"epss","scoring_elements":"0.7146","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00672","scoring_system":"epss","scoring_elements":"0.71447","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00672","scoring_system":"epss","scoring_elements":"0.71483","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00672","scoring_system":"epss","scoring_elements":"0.71518","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00672","scoring_system":"epss","scoring_elements":"0.71513","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986902","reference_id":"1986902","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986902"},{"reference_url":"https://security.archlinux.org/ASA-202107-67","reference_id":"ASA-202107-67","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-67"},{"reference_url":"https://security.archlinux.org/ASA-202107-68","reference_id":"ASA-202107-68","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-68"},{"reference_url":"https://security.archlinux.org/AVG-2220","reference_id":"AVG-2220","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2220"},{"reference_url":"https://security.archlinux.org/AVG-2221","reference_id":"AVG-2221","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2221"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4381","reference_id":"RHSA-2021:4381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5024-1/","reference_id":"USN-5024-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5024-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84605?format=json","purl":"pkg:ebuild/net-libs/webkit-gtk@2.34.4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.34.4"}],"aliases":["CVE-2021-30797"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-feqc-qs1m-ube7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59532?format=json","vulnerability_id":"VCID-gf1x-4snz-fbfv","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-42762.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-42762.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-42762","reference_id":"","reference_type":"","scores":[{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01038","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01046","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.0105","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01045","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01042","published_at":"2026-04-26T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00647","published_at":"2026-05-16T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.0065","published_at":"2026-05-15T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00741","published_at":"2026-05-12T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00748","published_at":"2026-05-14T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.0075","published_at":"2026-05-09T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00833","published_at":"2026-04-16T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00834","published_at":"2026-04-13T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00838","published_at":"2026-04-18T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00844","published_at":"2026-04-04T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00843","published_at":"2026-04-02T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00851","published_at":"2026-04-08T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00849","published_at":"2026-04-09T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00839","published_at":"2026-04-11T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00837","published_at":"2026-04-01T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00847","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-42762"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016673","reference_id":"2016673","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016673"},{"reference_url":"https://security.archlinux.org/ASA-202110-10","reference_id":"ASA-202110-10","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202110-10"},{"reference_url":"https://security.archlinux.org/ASA-202110-9","reference_id":"ASA-202110-9","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202110-9"},{"reference_url":"https://security.archlinux.org/AVG-2483","reference_id":"AVG-2483","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2483"},{"reference_url":"https://security.archlinux.org/AVG-2484","reference_id":"AVG-2484","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2484"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5127-1/","reference_id":"USN-5127-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5127-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84605?format=json","purl":"pkg:ebuild/net-libs/webkit-gtk@2.34.4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.34.4"}],"aliases":["CVE-2021-42762"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gf1x-4snz-fbfv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59521?format=json","vulnerability_id":"VCID-j8rg-9sya-8qbm","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30890.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30890.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30890","reference_id":"","reference_type":"","scores":[{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.41001","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.41083","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.41114","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.41041","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.4109","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.41097","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.41117","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.41066","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.41108","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.41079","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.41005","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.4091","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.40897","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.40813","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43034","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.42886","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.42962","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.42982","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.42922","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.42951","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43065","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43016","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30890"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30887","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30887"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30890","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30890"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2034389","reference_id":"2034389","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2034389"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1777","reference_id":"RHSA-2022:1777","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5213-1/","reference_id":"USN-5213-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5213-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84605?format=json","purl":"pkg:ebuild/net-libs/webkit-gtk@2.34.4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.34.4"}],"aliases":["CVE-2021-30890"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j8rg-9sya-8qbm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59514?format=json","vulnerability_id":"VCID-javw-gqjb-mfdt","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30849.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30849.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30849","reference_id":"","reference_type":"","scores":[{"value":"0.00257","scoring_system":"epss","scoring_elements":"0.4898","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00257","scoring_system":"epss","scoring_elements":"0.4909","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00257","scoring_system":"epss","scoring_elements":"0.4899","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00257","scoring_system":"epss","scoring_elements":"0.49064","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00257","scoring_system":"epss","scoring_elements":"0.49083","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00257","scoring_system":"epss","scoring_elements":"0.49016","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00257","scoring_system":"epss","scoring_elements":"0.49044","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00257","scoring_system":"epss","scoring_elements":"0.48997","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00257","scoring_system":"epss","scoring_elements":"0.49051","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00257","scoring_system":"epss","scoring_elements":"0.49048","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00257","scoring_system":"epss","scoring_elements":"0.49065","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00257","scoring_system":"epss","scoring_elements":"0.49038","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00257","scoring_system":"epss","scoring_elements":"0.49089","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00257","scoring_system":"epss","scoring_elements":"0.49086","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00257","scoring_system":"epss","scoring_elements":"0.49055","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00257","scoring_system":"epss","scoring_elements":"0.4904","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00257","scoring_system":"epss","scoring_elements":"0.49049","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00257","scoring_system":"epss","scoring_elements":"0.49005","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00257","scoring_system":"epss","scoring_elements":"0.48924","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00257","scoring_system":"epss","scoring_elements":"0.48988","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00257","scoring_system":"epss","scoring_elements":"0.48961","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30849"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30809","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30809"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30836","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30836"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30848","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30848"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30849","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30849"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30858","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45482","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45482"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2017904","reference_id":"2017904","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2017904"},{"reference_url":"https://security.archlinux.org/AVG-2399","reference_id":"AVG-2399","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2399"},{"reference_url":"https://security.archlinux.org/AVG-2400","reference_id":"AVG-2400","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2400"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1777","reference_id":"RHSA-2022:1777","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84605?format=json","purl":"pkg:ebuild/net-libs/webkit-gtk@2.34.4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.34.4"}],"aliases":["CVE-2021-30849"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-javw-gqjb-mfdt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59524?format=json","vulnerability_id":"VCID-jrd5-1g2p-gyg7","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30936.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30936.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30936","reference_id":"","reference_type":"","scores":[{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75403","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75407","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75438","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75419","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75462","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75471","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75491","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75469","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75459","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75501","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75506","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75495","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75528","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75533","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00963","scoring_system":"epss","scoring_elements":"0.76717","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00963","scoring_system":"epss","scoring_elements":"0.76615","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00963","scoring_system":"epss","scoring_elements":"0.76603","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00963","scoring_system":"epss","scoring_elements":"0.76633","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00963","scoring_system":"epss","scoring_elements":"0.7665","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00963","scoring_system":"epss","scoring_elements":"0.76637","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00963","scoring_system":"epss","scoring_elements":"0.76655","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00963","scoring_system":"epss","scoring_elements":"0.76726","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00963","scoring_system":"epss","scoring_elements":"0.76703","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30936"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2044528","reference_id":"2044528","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2044528"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1777","reference_id":"RHSA-2022:1777","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5255-1/","reference_id":"USN-5255-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5255-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84605?format=json","purl":"pkg:ebuild/net-libs/webkit-gtk@2.34.4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.34.4"}],"aliases":["CVE-2021-30936"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jrd5-1g2p-gyg7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59489?format=json","vulnerability_id":"VCID-jw1q-qa6v-kqct","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21775.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21775.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-21775","reference_id":"","reference_type":"","scores":[{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70241","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70512","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70436","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70487","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70499","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70254","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70271","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70248","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70294","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70309","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70331","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70316","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70304","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70346","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70356","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70338","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70389","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70398","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70396","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70368","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.7041","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70441","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70409","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-21775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986863","reference_id":"1986863","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986863"},{"reference_url":"https://security.archlinux.org/ASA-202107-67","reference_id":"ASA-202107-67","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-67"},{"reference_url":"https://security.archlinux.org/ASA-202107-68","reference_id":"ASA-202107-68","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-68"},{"reference_url":"https://security.archlinux.org/AVG-2220","reference_id":"AVG-2220","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2220"},{"reference_url":"https://security.archlinux.org/AVG-2221","reference_id":"AVG-2221","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2221"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4381","reference_id":"RHSA-2021:4381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5024-1/","reference_id":"USN-5024-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5024-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84605?format=json","purl":"pkg:ebuild/net-libs/webkit-gtk@2.34.4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.34.4"}],"aliases":["CVE-2021-21775"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jw1q-qa6v-kqct"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59487?format=json","vulnerability_id":"VCID-kshe-e6w9-37ez","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1844.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1844.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-1844","reference_id":"","reference_type":"","scores":[{"value":"0.014","scoring_system":"epss","scoring_elements":"0.80368","published_at":"2026-04-01T12:55:00Z"},{"value":"0.014","scoring_system":"epss","scoring_elements":"0.80621","published_at":"2026-05-16T12:55:00Z"},{"value":"0.014","scoring_system":"epss","scoring_elements":"0.80572","published_at":"2026-05-12T12:55:00Z"},{"value":"0.014","scoring_system":"epss","scoring_elements":"0.80613","published_at":"2026-05-14T12:55:00Z"},{"value":"0.014","scoring_system":"epss","scoring_elements":"0.80617","published_at":"2026-05-15T12:55:00Z"},{"value":"0.014","scoring_system":"epss","scoring_elements":"0.80374","published_at":"2026-04-02T12:55:00Z"},{"value":"0.014","scoring_system":"epss","scoring_elements":"0.80394","published_at":"2026-04-04T12:55:00Z"},{"value":"0.014","scoring_system":"epss","scoring_elements":"0.80383","published_at":"2026-04-07T12:55:00Z"},{"value":"0.014","scoring_system":"epss","scoring_elements":"0.80412","published_at":"2026-04-08T12:55:00Z"},{"value":"0.014","scoring_system":"epss","scoring_elements":"0.80422","published_at":"2026-04-09T12:55:00Z"},{"value":"0.014","scoring_system":"epss","scoring_elements":"0.80441","published_at":"2026-04-11T12:55:00Z"},{"value":"0.014","scoring_system":"epss","scoring_elements":"0.80426","published_at":"2026-04-12T12:55:00Z"},{"value":"0.014","scoring_system":"epss","scoring_elements":"0.80419","published_at":"2026-04-13T12:55:00Z"},{"value":"0.014","scoring_system":"epss","scoring_elements":"0.80449","published_at":"2026-04-16T12:55:00Z"},{"value":"0.014","scoring_system":"epss","scoring_elements":"0.8045","published_at":"2026-04-18T12:55:00Z"},{"value":"0.014","scoring_system":"epss","scoring_elements":"0.80453","published_at":"2026-04-21T12:55:00Z"},{"value":"0.014","scoring_system":"epss","scoring_elements":"0.80479","published_at":"2026-04-24T12:55:00Z"},{"value":"0.014","scoring_system":"epss","scoring_elements":"0.80485","published_at":"2026-04-26T12:55:00Z"},{"value":"0.014","scoring_system":"epss","scoring_elements":"0.80502","published_at":"2026-04-29T12:55:00Z"},{"value":"0.014","scoring_system":"epss","scoring_elements":"0.80519","published_at":"2026-05-05T12:55:00Z"},{"value":"0.014","scoring_system":"epss","scoring_elements":"0.80541","published_at":"2026-05-07T12:55:00Z"},{"value":"0.014","scoring_system":"epss","scoring_elements":"0.80561","published_at":"2026-05-09T12:55:00Z"},{"value":"0.014","scoring_system":"epss","scoring_elements":"0.80555","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-1844"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1788","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1788"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1844","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1844"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1871","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1871"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30682","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30682"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1944862","reference_id":"1944862","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1944862"},{"reference_url":"https://security.archlinux.org/AVG-1744","reference_id":"AVG-1744","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1744"},{"reference_url":"https://security.archlinux.org/AVG-1745","reference_id":"AVG-1745","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1745"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4381","reference_id":"RHSA-2021:4381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/4939-1/","reference_id":"USN-4939-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4939-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84605?format=json","purl":"pkg:ebuild/net-libs/webkit-gtk@2.34.4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.34.4"}],"aliases":["CVE-2021-1844"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kshe-e6w9-37ez"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59511?format=json","vulnerability_id":"VCID-m1q1-ma7s-63bd","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30836.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30836.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30836","reference_id":"","reference_type":"","scores":[{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31445","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.3158","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31623","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31444","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31496","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31525","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.3153","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31488","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31451","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31485","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31463","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31432","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31263","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31138","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31058","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.30909","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.30976","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.30982","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.30894","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.30917","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.30988","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31001","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00123","scoring_system":"epss","scoring_elements":"0.31002","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30836"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30809","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30809"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30836","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30836"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30848","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30848"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30849","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30849"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30858","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45482","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45482"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2034376","reference_id":"2034376","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2034376"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1777","reference_id":"RHSA-2022:1777","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84605?format=json","purl":"pkg:ebuild/net-libs/webkit-gtk@2.34.4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.34.4"}],"aliases":["CVE-2021-30836"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-m1q1-ma7s-63bd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59486?format=json","vulnerability_id":"VCID-mz2q-gbdt-n3e2","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1826.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1826.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-1826","reference_id":"","reference_type":"","scores":[{"value":"0.00741","scoring_system":"epss","scoring_elements":"0.72863","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00741","scoring_system":"epss","scoring_elements":"0.73108","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00741","scoring_system":"epss","scoring_elements":"0.73093","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00741","scoring_system":"epss","scoring_elements":"0.73101","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00741","scoring_system":"epss","scoring_elements":"0.72871","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00741","scoring_system":"epss","scoring_elements":"0.72891","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00741","scoring_system":"epss","scoring_elements":"0.72866","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00741","scoring_system":"epss","scoring_elements":"0.72904","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00741","scoring_system":"epss","scoring_elements":"0.72918","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00741","scoring_system":"epss","scoring_elements":"0.72942","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00741","scoring_system":"epss","scoring_elements":"0.72925","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00741","scoring_system":"epss","scoring_elements":"0.72919","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00741","scoring_system":"epss","scoring_elements":"0.7296","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00741","scoring_system":"epss","scoring_elements":"0.72969","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00741","scoring_system":"epss","scoring_elements":"0.72963","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00741","scoring_system":"epss","scoring_elements":"0.73003","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00741","scoring_system":"epss","scoring_elements":"0.73013","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00741","scoring_system":"epss","scoring_elements":"0.7301","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00741","scoring_system":"epss","scoring_elements":"0.73004","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00741","scoring_system":"epss","scoring_elements":"0.7303","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00741","scoring_system":"epss","scoring_elements":"0.73055","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00741","scoring_system":"epss","scoring_elements":"0.73017","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00741","scoring_system":"epss","scoring_elements":"0.7304","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-1826"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13543","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13543"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13584","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13584"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9947","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9947"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9948","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9948"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9951","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9951"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9983","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9983"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1817","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1817"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1820","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1820"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1825","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1825"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1826","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1826"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30661","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30661"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986860","reference_id":"1986860","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986860"},{"reference_url":"https://security.archlinux.org/AVG-2208","reference_id":"AVG-2208","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2208"},{"reference_url":"https://security.archlinux.org/AVG-2209","reference_id":"AVG-2209","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2209"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1586","reference_id":"RHSA-2021:1586","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1586"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84605?format=json","purl":"pkg:ebuild/net-libs/webkit-gtk@2.34.4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.34.4"}],"aliases":["CVE-2021-1826"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mz2q-gbdt-n3e2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59504?format=json","vulnerability_id":"VCID-n28u-18fr-13hs","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30762.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30762.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30762","reference_id":"","reference_type":"","scores":[{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12844","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12511","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12645","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12714","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12716","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12745","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12808","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12813","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15012","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.1515","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15118","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.1508","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.1502","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14915","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14924","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14977","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15014","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15016","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14957","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15099","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15139","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15207","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.151","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30762"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3885","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3885"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3894","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3894"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3895","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3895"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3897","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3897"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3899","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3899"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3900","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3900"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3901","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3901"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3902","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3902"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30762","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30762"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986898","reference_id":"1986898","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986898"},{"reference_url":"https://security.archlinux.org/AVG-2212","reference_id":"AVG-2212","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2212"},{"reference_url":"https://security.archlinux.org/AVG-2213","reference_id":"AVG-2213","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2213"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://support.apple.com/en-us/HT212548","reference_id":"HT212548","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:27:21Z/"}],"url":"https://support.apple.com/en-us/HT212548"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4035","reference_id":"RHSA-2020:4035","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4035"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4451","reference_id":"RHSA-2020:4451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84605?format=json","purl":"pkg:ebuild/net-libs/webkit-gtk@2.34.4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.34.4"}],"aliases":["CVE-2021-30762"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n28u-18fr-13hs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59497?format=json","vulnerability_id":"VCID-na3e-x43h-7kgr","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30689.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30689.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30689","reference_id":"","reference_type":"","scores":[{"value":"0.01123","scoring_system":"epss","scoring_elements":"0.78204","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01123","scoring_system":"epss","scoring_elements":"0.78467","published_at":"2026-05-16T12:55:00Z"},{"value":"0.01123","scoring_system":"epss","scoring_elements":"0.78445","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01123","scoring_system":"epss","scoring_elements":"0.78459","published_at":"2026-05-15T12:55:00Z"},{"value":"0.01123","scoring_system":"epss","scoring_elements":"0.78213","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01123","scoring_system":"epss","scoring_elements":"0.78243","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01123","scoring_system":"epss","scoring_elements":"0.78225","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01123","scoring_system":"epss","scoring_elements":"0.78251","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01123","scoring_system":"epss","scoring_elements":"0.78257","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01123","scoring_system":"epss","scoring_elements":"0.78282","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01123","scoring_system":"epss","scoring_elements":"0.78265","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01123","scoring_system":"epss","scoring_elements":"0.7826","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01123","scoring_system":"epss","scoring_elements":"0.78291","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01123","scoring_system":"epss","scoring_elements":"0.78289","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01123","scoring_system":"epss","scoring_elements":"0.78285","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01123","scoring_system":"epss","scoring_elements":"0.78317","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01123","scoring_system":"epss","scoring_elements":"0.78324","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01123","scoring_system":"epss","scoring_elements":"0.7834","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01123","scoring_system":"epss","scoring_elements":"0.78353","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01123","scoring_system":"epss","scoring_elements":"0.78379","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01123","scoring_system":"epss","scoring_elements":"0.78395","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01123","scoring_system":"epss","scoring_elements":"0.7839","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01123","scoring_system":"epss","scoring_elements":"0.78406","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30689"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986881","reference_id":"1986881","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986881"},{"reference_url":"https://security.archlinux.org/ASA-202107-67","reference_id":"ASA-202107-67","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-67"},{"reference_url":"https://security.archlinux.org/ASA-202107-68","reference_id":"ASA-202107-68","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-68"},{"reference_url":"https://security.archlinux.org/AVG-2220","reference_id":"AVG-2220","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2220"},{"reference_url":"https://security.archlinux.org/AVG-2221","reference_id":"AVG-2221","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2221"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4381","reference_id":"RHSA-2021:4381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5024-1/","reference_id":"USN-5024-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5024-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84605?format=json","purl":"pkg:ebuild/net-libs/webkit-gtk@2.34.4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.34.4"}],"aliases":["CVE-2021-30689"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-na3e-x43h-7kgr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59493?format=json","vulnerability_id":"VCID-nkp9-pvqf-ebcv","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30663.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30663.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30663","reference_id":"","reference_type":"","scores":[{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71517","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71465","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71505","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.7154","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71525","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71506","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71553","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71557","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71536","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71587","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71594","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71598","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71584","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71619","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71653","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01198","scoring_system":"epss","scoring_elements":"0.79037","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01198","scoring_system":"epss","scoring_elements":"0.79075","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01198","scoring_system":"epss","scoring_elements":"0.78848","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01198","scoring_system":"epss","scoring_elements":"0.79084","published_at":"2026-05-15T12:55:00Z"},{"value":"0.01198","scoring_system":"epss","scoring_elements":"0.79091","published_at":"2026-05-16T12:55:00Z"},{"value":"0.01198","scoring_system":"epss","scoring_elements":"0.7902","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01198","scoring_system":"epss","scoring_elements":"0.78854","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01198","scoring_system":"epss","scoring_elements":"0.78883","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986872","reference_id":"1986872","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986872"},{"reference_url":"https://security.archlinux.org/ASA-202107-67","reference_id":"ASA-202107-67","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-67"},{"reference_url":"https://security.archlinux.org/ASA-202107-68","reference_id":"ASA-202107-68","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-68"},{"reference_url":"https://security.archlinux.org/AVG-2220","reference_id":"AVG-2220","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2220"},{"reference_url":"https://security.archlinux.org/AVG-2221","reference_id":"AVG-2221","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2221"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://support.apple.com/en-us/HT212335","reference_id":"HT212335","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T16:23:07Z/"}],"url":"https://support.apple.com/en-us/HT212335"},{"reference_url":"https://support.apple.com/en-us/HT212336","reference_id":"HT212336","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T16:23:07Z/"}],"url":"https://support.apple.com/en-us/HT212336"},{"reference_url":"https://support.apple.com/en-us/HT212341","reference_id":"HT212341","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T16:23:07Z/"}],"url":"https://support.apple.com/en-us/HT212341"},{"reference_url":"https://support.apple.com/en-us/HT212532","reference_id":"HT212532","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T16:23:07Z/"}],"url":"https://support.apple.com/en-us/HT212532"},{"reference_url":"https://support.apple.com/en-us/HT212534","reference_id":"HT212534","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T16:23:07Z/"}],"url":"https://support.apple.com/en-us/HT212534"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4381","reference_id":"RHSA-2021:4381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5024-1/","reference_id":"USN-5024-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5024-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84605?format=json","purl":"pkg:ebuild/net-libs/webkit-gtk@2.34.4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.34.4"}],"aliases":["CVE-2021-30663"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nkp9-pvqf-ebcv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59482?format=json","vulnerability_id":"VCID-q834-6aag-f3dx","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1788.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1788.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-1788","reference_id":"","reference_type":"","scores":[{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61031","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61308","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61223","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.6128","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61295","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61108","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61136","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61103","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61151","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61166","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61186","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61173","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61154","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61194","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.612","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61181","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.6117","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61185","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61178","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61126","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61175","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61235","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61196","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-1788"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1788","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1788"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1844","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1844"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1871","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1871"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30682","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30682"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1944859","reference_id":"1944859","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1944859"},{"reference_url":"https://security.archlinux.org/AVG-1744","reference_id":"AVG-1744","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1744"},{"reference_url":"https://security.archlinux.org/AVG-1745","reference_id":"AVG-1745","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1745"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4381","reference_id":"RHSA-2021:4381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/4939-1/","reference_id":"USN-4939-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4939-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84605?format=json","purl":"pkg:ebuild/net-libs/webkit-gtk@2.34.4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.34.4"}],"aliases":["CVE-2021-1788"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-q834-6aag-f3dx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59529?format=json","vulnerability_id":"VCID-qf9z-ascr-cuf6","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30954.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30954.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30954","reference_id":"","reference_type":"","scores":[{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.55039","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.5514","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.55164","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.55139","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.55188","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.55199","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.5518","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.55162","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.55201","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.55204","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.55184","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.55119","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00334","scoring_system":"epss","scoring_elements":"0.56289","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00334","scoring_system":"epss","scoring_elements":"0.56173","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00334","scoring_system":"epss","scoring_elements":"0.56127","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00334","scoring_system":"epss","scoring_elements":"0.56176","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00334","scoring_system":"epss","scoring_elements":"0.56239","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00334","scoring_system":"epss","scoring_elements":"0.56188","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00334","scoring_system":"epss","scoring_elements":"0.56212","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00334","scoring_system":"epss","scoring_elements":"0.56273","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00334","scoring_system":"epss","scoring_elements":"0.56294","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30954"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2044551","reference_id":"2044551","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2044551"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1777","reference_id":"RHSA-2022:1777","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5255-1/","reference_id":"USN-5255-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5255-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84605?format=json","purl":"pkg:ebuild/net-libs/webkit-gtk@2.34.4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.34.4"}],"aliases":["CVE-2021-30954"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qf9z-ascr-cuf6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59503?format=json","vulnerability_id":"VCID-rhrs-vpu4-4qeb","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30761.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30761.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30761","reference_id":"","reference_type":"","scores":[{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54722","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54824","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54791","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54842","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54831","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54814","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54834","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54783","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63175","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63183","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63163","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63185","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.632","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63199","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00509","scoring_system":"epss","scoring_elements":"0.66459","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00509","scoring_system":"epss","scoring_elements":"0.66481","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00509","scoring_system":"epss","scoring_elements":"0.66541","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00509","scoring_system":"epss","scoring_elements":"0.66551","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00509","scoring_system":"epss","scoring_elements":"0.66563","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00509","scoring_system":"epss","scoring_elements":"0.664","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00509","scoring_system":"epss","scoring_elements":"0.66444","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00509","scoring_system":"epss","scoring_elements":"0.66487","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00511","scoring_system":"epss","scoring_elements":"0.66427","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30761"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8625","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8625"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8710","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8710"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8720","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8720"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8743","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8743"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8764","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8764"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8766","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8766"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8769","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8769"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8771","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8771"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8782","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8782"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8783","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8783"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8808","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8808"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8811","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8811"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8813","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8813"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8815","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8815"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8816","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8816"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8819","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8819"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8820","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8820"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8823","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8823"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30666","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30666"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30761","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30761"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986894","reference_id":"1986894","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986894"},{"reference_url":"https://security.archlinux.org/AVG-2210","reference_id":"AVG-2210","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2210"},{"reference_url":"https://security.archlinux.org/AVG-2211","reference_id":"AVG-2211","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2211"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://support.apple.com/en-us/HT212548","reference_id":"HT212548","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:27:48Z/"}],"url":"https://support.apple.com/en-us/HT212548"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4035","reference_id":"RHSA-2020:4035","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4035"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4451","reference_id":"RHSA-2020:4451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84605?format=json","purl":"pkg:ebuild/net-libs/webkit-gtk@2.34.4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.34.4"}],"aliases":["CVE-2021-30761"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rhrs-vpu4-4qeb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59488?format=json","vulnerability_id":"VCID-s51n-1ms6-xydk","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1871.json","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1871.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-1871","reference_id":"","reference_type":"","scores":[{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.739","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.73953","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.7391","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.73934","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.73905","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.73939","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.73976","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.73958","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.73949","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00938","scoring_system":"epss","scoring_elements":"0.76265","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00938","scoring_system":"epss","scoring_elements":"0.76325","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00938","scoring_system":"epss","scoring_elements":"0.76274","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00938","scoring_system":"epss","scoring_elements":"0.76297","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00938","scoring_system":"epss","scoring_elements":"0.76346","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00938","scoring_system":"epss","scoring_elements":"0.76332","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00938","scoring_system":"epss","scoring_elements":"0.76348","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00938","scoring_system":"epss","scoring_elements":"0.76287","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00938","scoring_system":"epss","scoring_elements":"0.76398","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00938","scoring_system":"epss","scoring_elements":"0.76411","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00938","scoring_system":"epss","scoring_elements":"0.76419","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00938","scoring_system":"epss","scoring_elements":"0.7624","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00938","scoring_system":"epss","scoring_elements":"0.76245","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00938","scoring_system":"epss","scoring_elements":"0.76227","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-1871"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1788","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1788"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1844","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1844"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1871","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1871"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30682","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30682"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1944867","reference_id":"1944867","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1944867"},{"reference_url":"https://security.archlinux.org/AVG-1744","reference_id":"AVG-1744","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1744"},{"reference_url":"https://security.archlinux.org/AVG-1745","reference_id":"AVG-1745","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1745"},{"reference_url":"https://www.debian.org/security/2021/dsa-4923","reference_id":"dsa-4923","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-01-29T17:33:21Z/"}],"url":"https://www.debian.org/security/2021/dsa-4923"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://support.apple.com/en-us/HT212146","reference_id":"HT212146","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-01-29T17:33:21Z/"}],"url":"https://support.apple.com/en-us/HT212146"},{"reference_url":"https://support.apple.com/en-us/HT212147","reference_id":"HT212147","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-01-29T17:33:21Z/"}],"url":"https://support.apple.com/en-us/HT212147"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3L6ZZOU5JS7E3RFYGLP7UFLXCG7TNLU/","reference_id":"L3L6ZZOU5JS7E3RFYGLP7UFLXCG7TNLU","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-01-29T17:33:21Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3L6ZZOU5JS7E3RFYGLP7UFLXCG7TNLU/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4381","reference_id":"RHSA-2021:4381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/4939-1/","reference_id":"USN-4939-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4939-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84605?format=json","purl":"pkg:ebuild/net-libs/webkit-gtk@2.34.4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.34.4"}],"aliases":["CVE-2021-1871"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s51n-1ms6-xydk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59525?format=json","vulnerability_id":"VCID-sxja-mn3n-hkgt","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30951.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30951.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30951","reference_id":"","reference_type":"","scores":[{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75403","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75407","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75438","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75419","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75462","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75471","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75491","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75469","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75459","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75501","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75506","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75495","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75528","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00887","scoring_system":"epss","scoring_elements":"0.75533","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00963","scoring_system":"epss","scoring_elements":"0.76717","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00963","scoring_system":"epss","scoring_elements":"0.76615","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00963","scoring_system":"epss","scoring_elements":"0.76603","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00963","scoring_system":"epss","scoring_elements":"0.76633","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00963","scoring_system":"epss","scoring_elements":"0.7665","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00963","scoring_system":"epss","scoring_elements":"0.76637","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00963","scoring_system":"epss","scoring_elements":"0.76655","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00963","scoring_system":"epss","scoring_elements":"0.76726","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00963","scoring_system":"epss","scoring_elements":"0.76703","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30951"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2044534","reference_id":"2044534","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2044534"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1777","reference_id":"RHSA-2022:1777","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5255-1/","reference_id":"USN-5255-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5255-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84605?format=json","purl":"pkg:ebuild/net-libs/webkit-gtk@2.34.4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.34.4"}],"aliases":["CVE-2021-30951"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sxja-mn3n-hkgt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59509?format=json","vulnerability_id":"VCID-tc8n-sk6n-z7f3","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30818.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30818.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30818","reference_id":"","reference_type":"","scores":[{"value":"0.00433","scoring_system":"epss","scoring_elements":"0.62605","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00433","scoring_system":"epss","scoring_elements":"0.62663","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00433","scoring_system":"epss","scoring_elements":"0.62695","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00433","scoring_system":"epss","scoring_elements":"0.6266","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00433","scoring_system":"epss","scoring_elements":"0.62712","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00433","scoring_system":"epss","scoring_elements":"0.62728","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00433","scoring_system":"epss","scoring_elements":"0.62747","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00433","scoring_system":"epss","scoring_elements":"0.62736","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00433","scoring_system":"epss","scoring_elements":"0.62713","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00433","scoring_system":"epss","scoring_elements":"0.62752","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00433","scoring_system":"epss","scoring_elements":"0.6276","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00433","scoring_system":"epss","scoring_elements":"0.62779","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00433","scoring_system":"epss","scoring_elements":"0.62805","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00433","scoring_system":"epss","scoring_elements":"0.62862","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00433","scoring_system":"epss","scoring_elements":"0.62741","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00433","scoring_system":"epss","scoring_elements":"0.62753","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00433","scoring_system":"epss","scoring_elements":"0.62769","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00433","scoring_system":"epss","scoring_elements":"0.62768","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00433","scoring_system":"epss","scoring_elements":"0.6272","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00433","scoring_system":"epss","scoring_elements":"0.62821","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00485","scoring_system":"epss","scoring_elements":"0.65535","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00485","scoring_system":"epss","scoring_elements":"0.65524","published_at":"2026-05-15T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30818"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2034368","reference_id":"2034368","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2034368"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1777","reference_id":"RHSA-2022:1777","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84605?format=json","purl":"pkg:ebuild/net-libs/webkit-gtk@2.34.4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.34.4"}],"aliases":["CVE-2021-30818"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tc8n-sk6n-z7f3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59510?format=json","vulnerability_id":"VCID-tyra-54yq-4ff6","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30823.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30823.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30823","reference_id":"","reference_type":"","scores":[{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38602","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38731","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38753","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38682","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38733","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38743","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38754","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38717","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.3869","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38738","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38638","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38482","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38457","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38367","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.3825","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.3832","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38331","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38241","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38267","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38341","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38348","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38371","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30823"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2034373","reference_id":"2034373","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2034373"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1777","reference_id":"RHSA-2022:1777","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84605?format=json","purl":"pkg:ebuild/net-libs/webkit-gtk@2.34.4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.34.4"}],"aliases":["CVE-2021-30823"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tyra-54yq-4ff6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59499?format=json","vulnerability_id":"VCID-v6kn-1ygj-8kfe","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30734.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30734.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30734","reference_id":"","reference_type":"","scores":[{"value":"0.01081","scoring_system":"epss","scoring_elements":"0.77787","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01081","scoring_system":"epss","scoring_elements":"0.78063","published_at":"2026-05-16T12:55:00Z"},{"value":"0.01081","scoring_system":"epss","scoring_elements":"0.78042","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01081","scoring_system":"epss","scoring_elements":"0.78056","published_at":"2026-05-15T12:55:00Z"},{"value":"0.01081","scoring_system":"epss","scoring_elements":"0.77793","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01081","scoring_system":"epss","scoring_elements":"0.77821","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01081","scoring_system":"epss","scoring_elements":"0.77804","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01081","scoring_system":"epss","scoring_elements":"0.77832","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01081","scoring_system":"epss","scoring_elements":"0.77837","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01081","scoring_system":"epss","scoring_elements":"0.77863","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01081","scoring_system":"epss","scoring_elements":"0.77847","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01081","scoring_system":"epss","scoring_elements":"0.77884","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01081","scoring_system":"epss","scoring_elements":"0.77882","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01081","scoring_system":"epss","scoring_elements":"0.77876","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01081","scoring_system":"epss","scoring_elements":"0.77908","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01081","scoring_system":"epss","scoring_elements":"0.77916","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01081","scoring_system":"epss","scoring_elements":"0.7793","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01081","scoring_system":"epss","scoring_elements":"0.77941","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01081","scoring_system":"epss","scoring_elements":"0.77971","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01081","scoring_system":"epss","scoring_elements":"0.77988","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01081","scoring_system":"epss","scoring_elements":"0.77978","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01081","scoring_system":"epss","scoring_elements":"0.77996","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986886","reference_id":"1986886","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986886"},{"reference_url":"https://security.archlinux.org/ASA-202107-67","reference_id":"ASA-202107-67","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-67"},{"reference_url":"https://security.archlinux.org/ASA-202107-68","reference_id":"ASA-202107-68","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-68"},{"reference_url":"https://security.archlinux.org/AVG-2220","reference_id":"AVG-2220","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2220"},{"reference_url":"https://security.archlinux.org/AVG-2221","reference_id":"AVG-2221","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2221"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4381","reference_id":"RHSA-2021:4381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5024-1/","reference_id":"USN-5024-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5024-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84605?format=json","purl":"pkg:ebuild/net-libs/webkit-gtk@2.34.4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.34.4"}],"aliases":["CVE-2021-30734"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v6kn-1ygj-8kfe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59484?format=json","vulnerability_id":"VCID-wc2v-987f-mqhn","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1820.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1820.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-1820","reference_id":"","reference_type":"","scores":[{"value":"0.0077","scoring_system":"epss","scoring_elements":"0.73469","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0077","scoring_system":"epss","scoring_elements":"0.73706","published_at":"2026-05-16T12:55:00Z"},{"value":"0.0077","scoring_system":"epss","scoring_elements":"0.7369","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0077","scoring_system":"epss","scoring_elements":"0.73697","published_at":"2026-05-15T12:55:00Z"},{"value":"0.0077","scoring_system":"epss","scoring_elements":"0.73478","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0077","scoring_system":"epss","scoring_elements":"0.73501","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0077","scoring_system":"epss","scoring_elements":"0.73472","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0077","scoring_system":"epss","scoring_elements":"0.73508","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0077","scoring_system":"epss","scoring_elements":"0.73522","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0077","scoring_system":"epss","scoring_elements":"0.73546","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0077","scoring_system":"epss","scoring_elements":"0.73527","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0077","scoring_system":"epss","scoring_elements":"0.73519","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0077","scoring_system":"epss","scoring_elements":"0.73563","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0077","scoring_system":"epss","scoring_elements":"0.73572","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0077","scoring_system":"epss","scoring_elements":"0.73566","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0077","scoring_system":"epss","scoring_elements":"0.73598","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0077","scoring_system":"epss","scoring_elements":"0.73609","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0077","scoring_system":"epss","scoring_elements":"0.73608","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0077","scoring_system":"epss","scoring_elements":"0.736","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0077","scoring_system":"epss","scoring_elements":"0.73626","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0077","scoring_system":"epss","scoring_elements":"0.73649","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0077","scoring_system":"epss","scoring_elements":"0.7361","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0077","scoring_system":"epss","scoring_elements":"0.73633","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-1820"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13543","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13543"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13584","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13584"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9947","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9947"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9948","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9948"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9951","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9951"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9983","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9983"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1817","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1817"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1820","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1820"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1825","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1825"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1826","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1826"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30661","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30661"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986856","reference_id":"1986856","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986856"},{"reference_url":"https://security.archlinux.org/AVG-2208","reference_id":"AVG-2208","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2208"},{"reference_url":"https://security.archlinux.org/AVG-2209","reference_id":"AVG-2209","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2209"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1586","reference_id":"RHSA-2021:1586","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1586"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84605?format=json","purl":"pkg:ebuild/net-libs/webkit-gtk@2.34.4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.34.4"}],"aliases":["CVE-2021-1820"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wc2v-987f-mqhn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59517?format=json","vulnerability_id":"VCID-wpw7-2u4z-muey","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30884.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30884.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30884","reference_id":"","reference_type":"","scores":[{"value":"0.00165","scoring_system":"epss","scoring_elements":"0.37518","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00165","scoring_system":"epss","scoring_elements":"0.377","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00165","scoring_system":"epss","scoring_elements":"0.37725","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00165","scoring_system":"epss","scoring_elements":"0.37603","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00165","scoring_system":"epss","scoring_elements":"0.37654","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00165","scoring_system":"epss","scoring_elements":"0.37668","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00165","scoring_system":"epss","scoring_elements":"0.37682","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00165","scoring_system":"epss","scoring_elements":"0.37647","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00165","scoring_system":"epss","scoring_elements":"0.3762","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00165","scoring_system":"epss","scoring_elements":"0.37666","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00165","scoring_system":"epss","scoring_elements":"0.37649","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00165","scoring_system":"epss","scoring_elements":"0.37585","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00342","scoring_system":"epss","scoring_elements":"0.56927","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00342","scoring_system":"epss","scoring_elements":"0.56806","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00342","scoring_system":"epss","scoring_elements":"0.56823","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00342","scoring_system":"epss","scoring_elements":"0.56807","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00342","scoring_system":"epss","scoring_elements":"0.56761","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00342","scoring_system":"epss","scoring_elements":"0.5687","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00342","scoring_system":"epss","scoring_elements":"0.5682","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00342","scoring_system":"epss","scoring_elements":"0.56844","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00342","scoring_system":"epss","scoring_elements":"0.56908","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00342","scoring_system":"epss","scoring_elements":"0.56924","published_at":"2026-05-15T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30884"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2034378","reference_id":"2034378","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2034378"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1777","reference_id":"RHSA-2022:1777","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84605?format=json","purl":"pkg:ebuild/net-libs/webkit-gtk@2.34.4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.34.4"}],"aliases":["CVE-2021-30884"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wpw7-2u4z-muey"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59495?format=json","vulnerability_id":"VCID-x5us-y2sc-mkg5","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30666.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30666.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30666","reference_id":"","reference_type":"","scores":[{"value":"0.01471","scoring_system":"epss","scoring_elements":"0.81128","published_at":"2026-05-16T12:55:00Z"},{"value":"0.01471","scoring_system":"epss","scoring_elements":"0.80964","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01471","scoring_system":"epss","scoring_elements":"0.80966","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01471","scoring_system":"epss","scoring_elements":"0.80967","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01471","scoring_system":"epss","scoring_elements":"0.80988","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01471","scoring_system":"epss","scoring_elements":"0.80996","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01471","scoring_system":"epss","scoring_elements":"0.81008","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01471","scoring_system":"epss","scoring_elements":"0.81021","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01471","scoring_system":"epss","scoring_elements":"0.81044","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01471","scoring_system":"epss","scoring_elements":"0.81065","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01471","scoring_system":"epss","scoring_elements":"0.8106","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01471","scoring_system":"epss","scoring_elements":"0.81079","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01471","scoring_system":"epss","scoring_elements":"0.8112","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01471","scoring_system":"epss","scoring_elements":"0.81125","published_at":"2026-05-15T12:55:00Z"},{"value":"0.01691","scoring_system":"epss","scoring_elements":"0.82159","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01691","scoring_system":"epss","scoring_elements":"0.82224","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01691","scoring_system":"epss","scoring_elements":"0.82243","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01691","scoring_system":"epss","scoring_elements":"0.82235","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01691","scoring_system":"epss","scoring_elements":"0.8223","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01691","scoring_system":"epss","scoring_elements":"0.82173","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01691","scoring_system":"epss","scoring_elements":"0.82194","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01691","scoring_system":"epss","scoring_elements":"0.8219","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01691","scoring_system":"epss","scoring_elements":"0.82217","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30666"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8625","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8625"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8710","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8710"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8720","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8720"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8743","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8743"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8764","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8764"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8766","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8766"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8769","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8769"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8771","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8771"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8782","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8782"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8783","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8783"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8808","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8808"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8811","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8811"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8813","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8813"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8815","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8815"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8816","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8816"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8819","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8819"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8820","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8820"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8823","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8823"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30666","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30666"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30761","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30761"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986877","reference_id":"1986877","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986877"},{"reference_url":"https://security.archlinux.org/AVG-2210","reference_id":"AVG-2210","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2210"},{"reference_url":"https://security.archlinux.org/AVG-2211","reference_id":"AVG-2211","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2211"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://support.apple.com/en-us/HT212341","reference_id":"HT212341","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:25:57Z/"}],"url":"https://support.apple.com/en-us/HT212341"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4035","reference_id":"RHSA-2020:4035","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4035"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4451","reference_id":"RHSA-2020:4451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84605?format=json","purl":"pkg:ebuild/net-libs/webkit-gtk@2.34.4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.34.4"}],"aliases":["CVE-2021-30666"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-x5us-y2sc-mkg5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59526?format=json","vulnerability_id":"VCID-xq1c-h5v5-77bs","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30952.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30952.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30952","reference_id":"","reference_type":"","scores":[{"value":"0.00693","scoring_system":"epss","scoring_elements":"0.71864","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00805","scoring_system":"epss","scoring_elements":"0.74215","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00805","scoring_system":"epss","scoring_elements":"0.74224","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00886","scoring_system":"epss","scoring_elements":"0.7558","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00886","scoring_system":"epss","scoring_elements":"0.75581","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00886","scoring_system":"epss","scoring_elements":"0.75556","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00886","scoring_system":"epss","scoring_elements":"0.75526","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00886","scoring_system":"epss","scoring_elements":"0.75563","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00886","scoring_system":"epss","scoring_elements":"0.75656","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00886","scoring_system":"epss","scoring_elements":"0.75648","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00886","scoring_system":"epss","scoring_elements":"0.75635","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0091","scoring_system":"epss","scoring_elements":"0.75899","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01244","scoring_system":"epss","scoring_elements":"0.79305","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01244","scoring_system":"epss","scoring_elements":"0.79278","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01244","scoring_system":"epss","scoring_elements":"0.79301","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01244","scoring_system":"epss","scoring_elements":"0.79289","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01279","scoring_system":"epss","scoring_elements":"0.79547","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01279","scoring_system":"epss","scoring_elements":"0.79519","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01279","scoring_system":"epss","scoring_elements":"0.79525","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01279","scoring_system":"epss","scoring_elements":"0.79563","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01279","scoring_system":"epss","scoring_elements":"0.79535","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01279","scoring_system":"epss","scoring_elements":"0.7957","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30952"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2022/01/21/2","reference_id":"2","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-05T19:17:22Z/"}],"url":"http://www.openwall.com/lists/oss-security/2022/01/21/2"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2044538","reference_id":"2044538","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2044538"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7EQVZ3CEMTINLBZ7PBC7WRXVEVCRHNSM/","reference_id":"7EQVZ3CEMTINLBZ7PBC7WRXVEVCRHNSM","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-05T19:17:22Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7EQVZ3CEMTINLBZ7PBC7WRXVEVCRHNSM/"},{"reference_url":"https://www.debian.org/security/2022/dsa-5060","reference_id":"dsa-5060","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-05T19:17:22Z/"}],"url":"https://www.debian.org/security/2022/dsa-5060"},{"reference_url":"https://www.debian.org/security/2022/dsa-5061","reference_id":"dsa-5061","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-05T19:17:22Z/"}],"url":"https://www.debian.org/security/2022/dsa-5061"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HQKWD4BXRDD2YGR5AVU7H5J5PIQIEU6V/","reference_id":"HQKWD4BXRDD2YGR5AVU7H5J5PIQIEU6V","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-05T19:17:22Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HQKWD4BXRDD2YGR5AVU7H5J5PIQIEU6V/"},{"reference_url":"https://support.apple.com/en-us/HT212975","reference_id":"HT212975","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-05T19:17:22Z/"}],"url":"https://support.apple.com/en-us/HT212975"},{"reference_url":"https://support.apple.com/en-us/HT212976","reference_id":"HT212976","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-05T19:17:22Z/"}],"url":"https://support.apple.com/en-us/HT212976"},{"reference_url":"https://support.apple.com/en-us/HT212978","reference_id":"HT212978","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-05T19:17:22Z/"}],"url":"https://support.apple.com/en-us/HT212978"},{"reference_url":"https://support.apple.com/en-us/HT212980","reference_id":"HT212980","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-05T19:17:22Z/"}],"url":"https://support.apple.com/en-us/HT212980"},{"reference_url":"https://support.apple.com/en-us/HT212982","reference_id":"HT212982","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-05T19:17:22Z/"}],"url":"https://support.apple.com/en-us/HT212982"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1777","reference_id":"RHSA-2022:1777","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5255-1/","reference_id":"USN-5255-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5255-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84605?format=json","purl":"pkg:ebuild/net-libs/webkit-gtk@2.34.4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.34.4"}],"aliases":["CVE-2021-30952"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xq1c-h5v5-77bs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59496?format=json","vulnerability_id":"VCID-yjt8-b6qu-m7ag","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30682.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30682.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30682","reference_id":"","reference_type":"","scores":[{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58714","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.5896","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58937","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58946","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58788","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58809","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58778","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.5883","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58836","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58854","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58818","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.5885","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58831","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58815","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58829","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58779","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58824","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58883","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58839","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58866","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30682"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1788","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1788"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1844","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1844"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1871","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1871"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30682","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30682"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986879","reference_id":"1986879","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1986879"},{"reference_url":"https://security.archlinux.org/AVG-2216","reference_id":"AVG-2216","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2216"},{"reference_url":"https://security.archlinux.org/AVG-2217","reference_id":"AVG-2217","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2217"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4381","reference_id":"RHSA-2021:4381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84605?format=json","purl":"pkg:ebuild/net-libs/webkit-gtk@2.34.4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.34.4"}],"aliases":["CVE-2021-30682"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yjt8-b6qu-m7ag"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59516?format=json","vulnerability_id":"VCID-zrgu-ez13-tqeq","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of\n\t  which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30858.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30858.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30858","reference_id":"","reference_type":"","scores":[{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.73907","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.74134","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.74125","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.74121","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.73917","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.74065","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.74041","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.7408","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.74057","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.73941","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.73982","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.73959","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.73946","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.73912","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.74038","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.7404","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.74031","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.73998","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.74006","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.73997","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.73956","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.73964","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-30858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30809","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30809"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30836","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30836"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30848","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30848"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30849","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30849"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30858","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45482","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45482"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2021/09/20/1","reference_id":"1","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:31:17Z/"}],"url":"http://www.openwall.com/lists/oss-security/2021/09/20/1"},{"reference_url":"http://www.openwall.com/lists/oss-security/2021/10/27/1","reference_id":"1","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:31:17Z/"}],"url":"http://www.openwall.com/lists/oss-security/2021/10/27/1"},{"reference_url":"http://www.openwall.com/lists/oss-security/2021/10/27/2","reference_id":"2","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:31:17Z/"}],"url":"http://www.openwall.com/lists/oss-security/2021/10/27/2"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2006099","reference_id":"2006099","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2006099"},{"reference_url":"http://seclists.org/fulldisclosure/2021/Sep/25","reference_id":"25","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:31:17Z/"}],"url":"http://seclists.org/fulldisclosure/2021/Sep/25"},{"reference_url":"http://seclists.org/fulldisclosure/2021/Sep/27","reference_id":"27","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:31:17Z/"}],"url":"http://seclists.org/fulldisclosure/2021/Sep/27"},{"reference_url":"http://seclists.org/fulldisclosure/2021/Sep/29","reference_id":"29","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:31:17Z/"}],"url":"http://seclists.org/fulldisclosure/2021/Sep/29"},{"reference_url":"http://seclists.org/fulldisclosure/2021/Sep/38","reference_id":"38","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:31:17Z/"}],"url":"http://seclists.org/fulldisclosure/2021/Sep/38"},{"reference_url":"http://seclists.org/fulldisclosure/2021/Sep/39","reference_id":"39","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:31:17Z/"}],"url":"http://seclists.org/fulldisclosure/2021/Sep/39"},{"reference_url":"http://www.openwall.com/lists/oss-security/2021/10/27/4","reference_id":"4","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:31:17Z/"}],"url":"http://www.openwall.com/lists/oss-security/2021/10/27/4"},{"reference_url":"http://seclists.org/fulldisclosure/2021/Sep/50","reference_id":"50","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:31:17Z/"}],"url":"http://seclists.org/fulldisclosure/2021/Sep/50"},{"reference_url":"http://www.openwall.com/lists/oss-security/2021/10/26/9","reference_id":"9","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:31:17Z/"}],"url":"http://www.openwall.com/lists/oss-security/2021/10/26/9"},{"reference_url":"https://security.archlinux.org/AVG-2399","reference_id":"AVG-2399","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2399"},{"reference_url":"https://security.archlinux.org/AVG-2400","reference_id":"AVG-2400","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2400"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BO6DMTHZR57JDBOXPSNR2MKDMCRWV265/","reference_id":"BO6DMTHZR57JDBOXPSNR2MKDMCRWV265","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:31:17Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BO6DMTHZR57JDBOXPSNR2MKDMCRWV265/"},{"reference_url":"https://www.debian.org/security/2021/dsa-4975","reference_id":"dsa-4975","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:31:17Z/"}],"url":"https://www.debian.org/security/2021/dsa-4975"},{"reference_url":"https://www.debian.org/security/2021/dsa-4976","reference_id":"dsa-4976","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:31:17Z/"}],"url":"https://www.debian.org/security/2021/dsa-4976"},{"reference_url":"https://security.gentoo.org/glsa/202202-01","reference_id":"GLSA-202202-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202202-01"},{"reference_url":"https://support.apple.com/en-us/HT212804","reference_id":"HT212804","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:31:17Z/"}],"url":"https://support.apple.com/en-us/HT212804"},{"reference_url":"https://support.apple.com/en-us/HT212807","reference_id":"HT212807","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:31:17Z/"}],"url":"https://support.apple.com/en-us/HT212807"},{"reference_url":"https://support.apple.com/kb/HT212824","reference_id":"HT212824","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:31:17Z/"}],"url":"https://support.apple.com/kb/HT212824"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4097","reference_id":"RHSA-2021:4097","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4097"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4686","reference_id":"RHSA-2021:4686","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4686"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0059","reference_id":"RHSA-2022:0059","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0059"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0075","reference_id":"RHSA-2022:0075","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0075"},{"reference_url":"https://usn.ubuntu.com/5087-1/","reference_id":"USN-5087-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5087-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XYNV7ASK4LQVAUMJXNXBS3Z7RVDQ2N3W/","reference_id":"XYNV7ASK4LQVAUMJXNXBS3Z7RVDQ2N3W","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:31:17Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XYNV7ASK4LQVAUMJXNXBS3Z7RVDQ2N3W/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84605?format=json","purl":"pkg:ebuild/net-libs/webkit-gtk@2.34.4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.34.4"}],"aliases":["CVE-2021-30858"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zrgu-ez13-tqeq"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.34.4"}