[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-DEBIAN-CVE-2021-1871":6},{"stargazers_count":4,"fetched_at":5},5,"2026-04-07T21:11:43.830Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":11,"aliases":12,"duplicate_of":9,"upstream":13,"downstream":16,"duplicates":19,"related":20,"reserved_at":9,"published_at":21,"modified_at":22,"state":9,"summary":23,"references_raw":25,"kevs":32,"epss":9,"epss_history":33,"metrics":34,"affected":40},"DEBIAN-CVE-2021-1871","A logic issue was addressed with improved restrictions. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, iOS 14.4 and iPadOS 14.4. A remote attacker may be able to cause arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..",null,[],[],[],[14],{"_key":15},"CVE-2021-1871",[17],{"_key":18},"DSA-4923-1",[],[],"2021-04-02T19:15:20.663Z","2025-11-19T01:12:37.216172Z",{"cisa_kev":24,"cisa_ransomware":24,"cisa_vendor":9,"epss_severity":9,"epss_score":9,"severity":9,"severity_score":9,"severity_version":9,"severity_source":9,"severity_vector":9,"severity_status":9},false,[26],{"url":27,"sources":28,"tags":30},"https://security-tracker.debian.org/tracker/CVE-2021-1871",[29],"osv_debian",[31],"Advisory",[],[],[35],{"source":29,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":36,"cvss_v4_0":9},{"baseScore":37,"baseSeverity":9,"vectorString":38,"impactScore":37,"exploitabilityScore":39},9.8,"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",10,[41,56],{"ecosystem":42,"name":43,"vendor":44,"product":43,"cpe_part":9,"purl_type":45,"purl_namespace":44,"purl_name":43,"source":9,"versions":46},"Debian","webkit2gtk","debian","deb",[47,53,54,55],{"version":48,"is_range":49,"range_type":50,"version_start":9,"version_start_type":9,"version_end":51,"version_end_type":52,"fixed_in":9},"lt2_32_0_2",true,"ecosystem","2.32.0-2","excluding",{"version":48,"is_range":49,"range_type":50,"version_start":9,"version_start_type":9,"version_end":51,"version_end_type":52,"fixed_in":9},{"version":48,"is_range":49,"range_type":50,"version_start":9,"version_start_type":9,"version_end":51,"version_end_type":52,"fixed_in":9},{"version":48,"is_range":49,"range_type":50,"version_start":9,"version_start_type":9,"version_end":51,"version_end_type":52,"fixed_in":9},{"ecosystem":42,"name":57,"vendor":44,"product":57,"cpe_part":9,"purl_type":45,"purl_namespace":44,"purl_name":57,"source":9,"versions":58},"wpewebkit",[59,60,61,62],{"version":48,"is_range":49,"range_type":50,"version_start":9,"version_start_type":9,"version_end":51,"version_end_type":52,"fixed_in":9},{"version":48,"is_range":49,"range_type":50,"version_start":9,"version_start_type":9,"version_end":51,"version_end_type":52,"fixed_in":9},{"version":48,"is_range":49,"range_type":50,"version_start":9,"version_start_type":9,"version_end":51,"version_end_type":52,"fixed_in":9},{"version":48,"is_range":49,"range_type":50,"version_start":9,"version_start_type":9,"version_end":51,"version_end_type":52,"fixed_in":9}]