Lookup for vulnerable packages by Package URL.

GET /api/packages/1062567?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/1062567?format=api",
    "purl": "pkg:apk/alpine/qt6-qtwebengine@6.11.0-r1?arch=riscv64&distroversion=edge&reponame=community",
    "type": "apk",
    "namespace": "alpine",
    "name": "qt6-qtwebengine",
    "version": "6.11.0-r1",
    "qualifiers": {
        "arch": "riscv64",
        "distroversion": "edge",
        "reponame": "community"
    },
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": null,
    "latest_non_vulnerable_version": null,
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63901?format=api",
            "vulnerability_id": "VCID-1gbt-xkej-k7aw",
            "summary": "chromium-browser: Heap buffer overflow in ANGLE",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-5275.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-5275.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-5275",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06907",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00066",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20714",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00066",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20655",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21982",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21954",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21897",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21898",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21904",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21851",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21927",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21994",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-5275"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5275",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5275"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453693",
                    "reference_id": "2453693",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453693"
                },
                {
                    "reference_url": "https://issues.chromium.org/issues/489494022",
                    "reference_id": "489494022",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-01T13:31:24Z/"
                        }
                    ],
                    "url": "https://issues.chromium.org/issues/489494022"
                },
                {
                    "reference_url": "https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html",
                    "reference_id": "stable-channel-update-for-desktop_31.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-01T13:31:24Z/"
                        }
                    ],
                    "url": "https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059689?format=api",
                    "purl": "pkg:apk/alpine/qt6-qtwebengine@6.10.2-r13?arch=riscv64&distroversion=edge&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.10.2-r13%3Farch=riscv64&distroversion=edge&reponame=community"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062567?format=api",
                    "purl": "pkg:apk/alpine/qt6-qtwebengine@6.11.0-r1?arch=riscv64&distroversion=edge&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.11.0-r1%3Farch=riscv64&distroversion=edge&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2026-5275"
            ],
            "risk_score": 4.3,
            "exploitability": "0.5",
            "weighted_severity": "8.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1gbt-xkej-k7aw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64243?format=api",
            "vulnerability_id": "VCID-2a4a-cy2w-1kcj",
            "summary": "chromium-browser: Use after free in Network",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4454.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4454.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-4454",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12838",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29355",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29279",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29226",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29253",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29228",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29404",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29217",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29282",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29322",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29325",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-4454"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4454",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4454"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2449414",
                    "reference_id": "2449414",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2449414"
                },
                {
                    "reference_url": "https://issues.chromium.org/issues/488585488",
                    "reference_id": "488585488",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-20T14:33:19Z/"
                        }
                    ],
                    "url": "https://issues.chromium.org/issues/488585488"
                },
                {
                    "reference_url": "https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_18.html",
                    "reference_id": "stable-channel-update-for-desktop_18.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-20T14:33:19Z/"
                        }
                    ],
                    "url": "https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_18.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/375520?format=api",
                    "purl": "pkg:apk/alpine/qt6-qtwebengine@6.10.2-r11?arch=riscv64&distroversion=edge&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.10.2-r11%3Farch=riscv64&distroversion=edge&reponame=community"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062567?format=api",
                    "purl": "pkg:apk/alpine/qt6-qtwebengine@6.11.0-r1?arch=riscv64&distroversion=edge&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.11.0-r1%3Farch=riscv64&distroversion=edge&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2026-4454"
            ],
            "risk_score": 4.3,
            "exploitability": "0.5",
            "weighted_severity": "8.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2a4a-cy2w-1kcj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/97125?format=api",
            "vulnerability_id": "VCID-2s6k-knqz-s7bv",
            "summary": "Use after free in Compositing in Google Chrome prior to 146.0.7680.178 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-5290",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06439",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19728",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19778",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20978",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20966",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20967",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20916",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20997",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21057",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21073",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2103",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-5290"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5290",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5290"
                },
                {
                    "reference_url": "https://issues.chromium.org/issues/496205576",
                    "reference_id": "496205576",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-01T13:54:13Z/"
                        }
                    ],
                    "url": "https://issues.chromium.org/issues/496205576"
                },
                {
                    "reference_url": "https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html",
                    "reference_id": "stable-channel-update-for-desktop_31.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-01T13:54:13Z/"
                        }
                    ],
                    "url": "https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059689?format=api",
                    "purl": "pkg:apk/alpine/qt6-qtwebengine@6.10.2-r13?arch=riscv64&distroversion=edge&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.10.2-r13%3Farch=riscv64&distroversion=edge&reponame=community"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062567?format=api",
                    "purl": "pkg:apk/alpine/qt6-qtwebengine@6.11.0-r1?arch=riscv64&distroversion=edge&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.11.0-r1%3Farch=riscv64&distroversion=edge&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2026-5290"
            ],
            "risk_score": 2.9,
            "exploitability": "0.5",
            "weighted_severity": "5.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2s6k-knqz-s7bv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63903?format=api",
            "vulnerability_id": "VCID-32xu-tbuh-nfds",
            "summary": "chromium-browser: Insufficient policy enforcement in WebUSB",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-5276.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-5276.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-5276",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12779",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12733",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13741",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13815",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13766",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13676",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1367",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13761",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13843",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13893",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13851",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-5276"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5276",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5276"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453695",
                    "reference_id": "2453695",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453695"
                },
                {
                    "reference_url": "https://issues.chromium.org/issues/489711638",
                    "reference_id": "489711638",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-01T13:32:45Z/"
                        }
                    ],
                    "url": "https://issues.chromium.org/issues/489711638"
                },
                {
                    "reference_url": "https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html",
                    "reference_id": "stable-channel-update-for-desktop_31.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-01T13:32:45Z/"
                        }
                    ],
                    "url": "https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059689?format=api",
                    "purl": "pkg:apk/alpine/qt6-qtwebengine@6.10.2-r13?arch=riscv64&distroversion=edge&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.10.2-r13%3Farch=riscv64&distroversion=edge&reponame=community"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062567?format=api",
                    "purl": "pkg:apk/alpine/qt6-qtwebengine@6.11.0-r1?arch=riscv64&distroversion=edge&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.11.0-r1%3Farch=riscv64&distroversion=edge&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2026-5276"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-32xu-tbuh-nfds"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63894?format=api",
            "vulnerability_id": "VCID-5znj-k78s-suca",
            "summary": "chromium-browser: Use after free in PDF",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-5287.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-5287.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-5287",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00028",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07901",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22593",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2255",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23753",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23814",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2377",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23713",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23723",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23682",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.238",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-5287"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5287",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5287"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453683",
                    "reference_id": "2453683",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453683"
                },
                {
                    "reference_url": "https://issues.chromium.org/issues/494644471",
                    "reference_id": "494644471",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-01T13:47:47Z/"
                        }
                    ],
                    "url": "https://issues.chromium.org/issues/494644471"
                },
                {
                    "reference_url": "https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html",
                    "reference_id": "stable-channel-update-for-desktop_31.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-01T13:47:47Z/"
                        }
                    ],
                    "url": "https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059689?format=api",
                    "purl": "pkg:apk/alpine/qt6-qtwebengine@6.10.2-r13?arch=riscv64&distroversion=edge&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.10.2-r13%3Farch=riscv64&distroversion=edge&reponame=community"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062567?format=api",
                    "purl": "pkg:apk/alpine/qt6-qtwebengine@6.11.0-r1?arch=riscv64&distroversion=edge&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.11.0-r1%3Farch=riscv64&distroversion=edge&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2026-5287"
            ],
            "risk_score": 4.3,
            "exploitability": "0.5",
            "weighted_severity": "8.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5znj-k78s-suca"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/97124?format=api",
            "vulnerability_id": "VCID-6dub-gz8z-m3fk",
            "summary": "Use after free in Navigation in Google Chrome prior to 146.0.7680.178 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-5289",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06439",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19728",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19778",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20978",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20966",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20967",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20916",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20997",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21057",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21073",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2103",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-5289"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5289",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5289"
                },
                {
                    "reference_url": "https://issues.chromium.org/issues/495931147",
                    "reference_id": "495931147",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-01T13:49:21Z/"
                        }
                    ],
                    "url": "https://issues.chromium.org/issues/495931147"
                },
                {
                    "reference_url": "https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html",
                    "reference_id": "stable-channel-update-for-desktop_31.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-01T13:49:21Z/"
                        }
                    ],
                    "url": "https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059689?format=api",
                    "purl": "pkg:apk/alpine/qt6-qtwebengine@6.10.2-r13?arch=riscv64&distroversion=edge&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.10.2-r13%3Farch=riscv64&distroversion=edge&reponame=community"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062567?format=api",
                    "purl": "pkg:apk/alpine/qt6-qtwebengine@6.11.0-r1?arch=riscv64&distroversion=edge&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.11.0-r1%3Farch=riscv64&distroversion=edge&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2026-5289"
            ],
            "risk_score": 2.9,
            "exploitability": "0.5",
            "weighted_severity": "5.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6dub-gz8z-m3fk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63902?format=api",
            "vulnerability_id": "VCID-7gex-zf7d-5ka4",
            "summary": "chromium-browser: Use after free in CSS",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-5273.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-5273.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-5273",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05569",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18975",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18922",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20213",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20192",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20134",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20126",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2013",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20074",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20155",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20238",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-5273"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5273",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5273"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453694",
                    "reference_id": "2453694",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453694"
                },
                {
                    "reference_url": "https://issues.chromium.org/issues/493952652",
                    "reference_id": "493952652",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-01T13:47:18Z/"
                        }
                    ],
                    "url": "https://issues.chromium.org/issues/493952652"
                },
                {
                    "reference_url": "https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html",
                    "reference_id": "stable-channel-update-for-desktop_31.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-01T13:47:18Z/"
                        }
                    ],
                    "url": "https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062567?format=api",
                    "purl": "pkg:apk/alpine/qt6-qtwebengine@6.11.0-r1?arch=riscv64&distroversion=edge&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.11.0-r1%3Farch=riscv64&distroversion=edge&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2026-5273"
            ],
            "risk_score": 4.3,
            "exploitability": "0.5",
            "weighted_severity": "8.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7gex-zf7d-5ka4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63895?format=api",
            "vulnerability_id": "VCID-88yy-dyf6-cue7",
            "summary": "chromium-browser: Use after free in Dawn",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-5284.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-5284.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-5284",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07481",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22593",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2255",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23753",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23814",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2377",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23713",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23723",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23682",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.238",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-5284"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5284",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5284"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453684",
                    "reference_id": "2453684",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453684"
                },
                {
                    "reference_url": "https://issues.chromium.org/issues/492139412",
                    "reference_id": "492139412",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-01T13:22:04Z/"
                        }
                    ],
                    "url": "https://issues.chromium.org/issues/492139412"
                },
                {
                    "reference_url": "https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html",
                    "reference_id": "stable-channel-update-for-desktop_31.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-01T13:22:04Z/"
                        }
                    ],
                    "url": "https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059689?format=api",
                    "purl": "pkg:apk/alpine/qt6-qtwebengine@6.10.2-r13?arch=riscv64&distroversion=edge&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.10.2-r13%3Farch=riscv64&distroversion=edge&reponame=community"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062567?format=api",
                    "purl": "pkg:apk/alpine/qt6-qtwebengine@6.11.0-r1?arch=riscv64&distroversion=edge&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.11.0-r1%3Farch=riscv64&distroversion=edge&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2026-5284"
            ],
            "risk_score": 4.3,
            "exploitability": "0.5",
            "weighted_severity": "8.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-88yy-dyf6-cue7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63897?format=api",
            "vulnerability_id": "VCID-8uaq-e8kp-87fs",
            "summary": "chromium-browser: Out of bounds read in WebCodecs",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-5282.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-5282.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-5282",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00058",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18323",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00058",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18378",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19477",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19556",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19608",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19612",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19564",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19506",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19471",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1948",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19491",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-5282"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5282",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5282"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453688",
                    "reference_id": "2453688",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453688"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059689?format=api",
                    "purl": "pkg:apk/alpine/qt6-qtwebengine@6.10.2-r13?arch=riscv64&distroversion=edge&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.10.2-r13%3Farch=riscv64&distroversion=edge&reponame=community"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062567?format=api",
                    "purl": "pkg:apk/alpine/qt6-qtwebengine@6.11.0-r1?arch=riscv64&distroversion=edge&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.11.0-r1%3Farch=riscv64&distroversion=edge&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2026-5282"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8uaq-e8kp-87fs"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63905?format=api",
            "vulnerability_id": "VCID-9s6e-p69b-suep",
            "summary": "chromium-browser: Object corruption in V8",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-5279.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-5279.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-5279",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00028",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07901",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22593",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2255",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23753",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23814",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2377",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23713",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23723",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23682",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.238",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-5279"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5279",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5279"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453697",
                    "reference_id": "2453697",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453697"
                },
                {
                    "reference_url": "https://issues.chromium.org/issues/490642836",
                    "reference_id": "490642836",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-01T13:38:37Z/"
                        }
                    ],
                    "url": "https://issues.chromium.org/issues/490642836"
                },
                {
                    "reference_url": "https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html",
                    "reference_id": "stable-channel-update-for-desktop_31.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-01T13:38:37Z/"
                        }
                    ],
                    "url": "https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059689?format=api",
                    "purl": "pkg:apk/alpine/qt6-qtwebengine@6.10.2-r13?arch=riscv64&distroversion=edge&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.10.2-r13%3Farch=riscv64&distroversion=edge&reponame=community"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062567?format=api",
                    "purl": "pkg:apk/alpine/qt6-qtwebengine@6.11.0-r1?arch=riscv64&distroversion=edge&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.11.0-r1%3Farch=riscv64&distroversion=edge&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2026-5279"
            ],
            "risk_score": 4.3,
            "exploitability": "0.5",
            "weighted_severity": "8.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9s6e-p69b-suep"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63904?format=api",
            "vulnerability_id": "VCID-9sbp-bp4k-23cn",
            "summary": "chromium-browser: Integer overflow in ANGLE",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-5277.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-5277.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-5277",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00028",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08082",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19778",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19728",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24812",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24786",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24729",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24744",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24736",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24698",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24766",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24826",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-5277"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5277",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5277"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453696",
                    "reference_id": "2453696",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453696"
                },
                {
                    "reference_url": "https://issues.chromium.org/issues/489791424",
                    "reference_id": "489791424",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-01T13:26:26Z/"
                        }
                    ],
                    "url": "https://issues.chromium.org/issues/489791424"
                },
                {
                    "reference_url": "https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html",
                    "reference_id": "stable-channel-update-for-desktop_31.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-01T13:26:26Z/"
                        }
                    ],
                    "url": "https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059689?format=api",
                    "purl": "pkg:apk/alpine/qt6-qtwebengine@6.10.2-r13?arch=riscv64&distroversion=edge&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.10.2-r13%3Farch=riscv64&distroversion=edge&reponame=community"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062567?format=api",
                    "purl": "pkg:apk/alpine/qt6-qtwebengine@6.11.0-r1?arch=riscv64&distroversion=edge&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.11.0-r1%3Farch=riscv64&distroversion=edge&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2026-5277"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9sbp-bp4k-23cn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64126?format=api",
            "vulnerability_id": "VCID-ehkc-zgaa-23fy",
            "summary": "chromium-browser: Out of bounds read in CSS",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4674.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4674.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-4674",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08561",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25015",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24917",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24862",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24875",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24869",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25055",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24829",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24897",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24942",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24957",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-4674"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4674",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4674"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450567",
                    "reference_id": "2450567",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450567"
                },
                {
                    "reference_url": "https://issues.chromium.org/issues/488188166",
                    "reference_id": "488188166",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-24T00:47:38Z/"
                        }
                    ],
                    "url": "https://issues.chromium.org/issues/488188166"
                },
                {
                    "reference_url": "https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_23.html",
                    "reference_id": "stable-channel-update-for-desktop_23.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-24T00:47:38Z/"
                        }
                    ],
                    "url": "https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_23.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/429968?format=api",
                    "purl": "pkg:apk/alpine/qt6-qtwebengine@6.10.2-r12?arch=riscv64&distroversion=edge&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.10.2-r12%3Farch=riscv64&distroversion=edge&reponame=community"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062567?format=api",
                    "purl": "pkg:apk/alpine/qt6-qtwebengine@6.11.0-r1?arch=riscv64&distroversion=edge&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.11.0-r1%3Farch=riscv64&distroversion=edge&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2026-4674"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ehkc-zgaa-23fy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63900?format=api",
            "vulnerability_id": "VCID-fene-srh1-b3gp",
            "summary": "chromium-browser: Integer overflow in Codecs",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-5274.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-5274.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-5274",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06439",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19778",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19728",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21057",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2103",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20978",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20967",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20966",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20916",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20997",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21073",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-5274"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5274",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5274"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453692",
                    "reference_id": "2453692",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453692"
                },
                {
                    "reference_url": "https://issues.chromium.org/issues/488596746",
                    "reference_id": "488596746",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-01T13:29:34Z/"
                        }
                    ],
                    "url": "https://issues.chromium.org/issues/488596746"
                },
                {
                    "reference_url": "https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html",
                    "reference_id": "stable-channel-update-for-desktop_31.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-01T13:29:34Z/"
                        }
                    ],
                    "url": "https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059689?format=api",
                    "purl": "pkg:apk/alpine/qt6-qtwebengine@6.10.2-r13?arch=riscv64&distroversion=edge&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.10.2-r13%3Farch=riscv64&distroversion=edge&reponame=community"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062567?format=api",
                    "purl": "pkg:apk/alpine/qt6-qtwebengine@6.11.0-r1?arch=riscv64&distroversion=edge&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.11.0-r1%3Farch=riscv64&distroversion=edge&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2026-5274"
            ],
            "risk_score": 4.3,
            "exploitability": "0.5",
            "weighted_severity": "8.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fene-srh1-b3gp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63892?format=api",
            "vulnerability_id": "VCID-jr1y-txur-ebgr",
            "summary": "chromium-browser: Heap buffer overflow in GPU",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-5272.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-5272.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-5272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06124",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06094",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06907",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06836",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06829",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06771",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06762",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06748",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06799",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06838",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06842",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-5272"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5272"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453680",
                    "reference_id": "2453680",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453680"
                },
                {
                    "reference_url": "https://issues.chromium.org/issues/491732188",
                    "reference_id": "491732188",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-01T13:59:59Z/"
                        }
                    ],
                    "url": "https://issues.chromium.org/issues/491732188"
                },
                {
                    "reference_url": "https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html",
                    "reference_id": "stable-channel-update-for-desktop_31.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-01T13:59:59Z/"
                        }
                    ],
                    "url": "https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059689?format=api",
                    "purl": "pkg:apk/alpine/qt6-qtwebengine@6.10.2-r13?arch=riscv64&distroversion=edge&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.10.2-r13%3Farch=riscv64&distroversion=edge&reponame=community"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062567?format=api",
                    "purl": "pkg:apk/alpine/qt6-qtwebengine@6.11.0-r1?arch=riscv64&distroversion=edge&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.11.0-r1%3Farch=riscv64&distroversion=edge&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2026-5272"
            ],
            "risk_score": 4.3,
            "exploitability": "0.5",
            "weighted_severity": "8.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jr1y-txur-ebgr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64129?format=api",
            "vulnerability_id": "VCID-pgw2-3qy2-5ban",
            "summary": "chromium-browser: Heap buffer overflow in WebGL",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4675.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4675.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-4675",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06296",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22227",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22214",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22173",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22113",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22106",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22275",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22058",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22139",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22194",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-4675"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4675",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4675"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450570",
                    "reference_id": "2450570",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450570"
                },
                {
                    "reference_url": "https://issues.chromium.org/issues/488270257",
                    "reference_id": "488270257",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-24T00:47:46Z/"
                        }
                    ],
                    "url": "https://issues.chromium.org/issues/488270257"
                },
                {
                    "reference_url": "https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_23.html",
                    "reference_id": "stable-channel-update-for-desktop_23.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-24T00:47:46Z/"
                        }
                    ],
                    "url": "https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_23.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/429968?format=api",
                    "purl": "pkg:apk/alpine/qt6-qtwebengine@6.10.2-r12?arch=riscv64&distroversion=edge&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.10.2-r12%3Farch=riscv64&distroversion=edge&reponame=community"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062567?format=api",
                    "purl": "pkg:apk/alpine/qt6-qtwebengine@6.11.0-r1?arch=riscv64&distroversion=edge&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.11.0-r1%3Farch=riscv64&distroversion=edge&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2026-4675"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pgw2-3qy2-5ban"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64132?format=api",
            "vulnerability_id": "VCID-pmwr-4j1v-s7gu",
            "summary": "chromium-browser: Out of bounds read in WebAudio",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4677.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4677.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-4677",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07005",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23683",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23596",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2354",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23552",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23545",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23725",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23505",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23576",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23622",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23639",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-4677"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4677",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4677"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450573",
                    "reference_id": "2450573",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450573"
                },
                {
                    "reference_url": "https://issues.chromium.org/issues/490533968",
                    "reference_id": "490533968",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-24T00:48:00Z/"
                        }
                    ],
                    "url": "https://issues.chromium.org/issues/490533968"
                },
                {
                    "reference_url": "https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_23.html",
                    "reference_id": "stable-channel-update-for-desktop_23.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-24T00:48:00Z/"
                        }
                    ],
                    "url": "https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_23.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/429968?format=api",
                    "purl": "pkg:apk/alpine/qt6-qtwebengine@6.10.2-r12?arch=riscv64&distroversion=edge&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.10.2-r12%3Farch=riscv64&distroversion=edge&reponame=community"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062567?format=api",
                    "purl": "pkg:apk/alpine/qt6-qtwebengine@6.11.0-r1?arch=riscv64&distroversion=edge&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.11.0-r1%3Farch=riscv64&distroversion=edge&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2026-4677"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pmwr-4j1v-s7gu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63899?format=api",
            "vulnerability_id": "VCID-q45n-pmfj-f7ae",
            "summary": "chromium-browser: Use after free in WebGL",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-5285.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-5285.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-5285",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06169",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00066",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20555",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00066",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20496",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2178",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21848",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21808",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2175",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21757",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21702",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21837",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-5285"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5285",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5285"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453691",
                    "reference_id": "2453691",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453691"
                },
                {
                    "reference_url": "https://issues.chromium.org/issues/492228019",
                    "reference_id": "492228019",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-01T13:44:59Z/"
                        }
                    ],
                    "url": "https://issues.chromium.org/issues/492228019"
                },
                {
                    "reference_url": "https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html",
                    "reference_id": "stable-channel-update-for-desktop_31.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-01T13:44:59Z/"
                        }
                    ],
                    "url": "https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059689?format=api",
                    "purl": "pkg:apk/alpine/qt6-qtwebengine@6.10.2-r13?arch=riscv64&distroversion=edge&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.10.2-r13%3Farch=riscv64&distroversion=edge&reponame=community"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062567?format=api",
                    "purl": "pkg:apk/alpine/qt6-qtwebengine@6.11.0-r1?arch=riscv64&distroversion=edge&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.11.0-r1%3Farch=riscv64&distroversion=edge&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2026-5285"
            ],
            "risk_score": 4.3,
            "exploitability": "0.5",
            "weighted_severity": "8.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q45n-pmfj-f7ae"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63893?format=api",
            "vulnerability_id": "VCID-r2b4-pdwz-ybae",
            "summary": "chromium-browser: Inappropriate implementation in ANGLE",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-5283.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-5283.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-5283",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02079",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02073",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02612",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02516",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02515",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02501",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02506",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02521",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02526",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02547",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02527",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-5283"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5283",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5283"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453681",
                    "reference_id": "2453681",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453681"
                },
                {
                    "reference_url": "https://issues.chromium.org/issues/492131521",
                    "reference_id": "492131521",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-01T13:56:03Z/"
                        }
                    ],
                    "url": "https://issues.chromium.org/issues/492131521"
                },
                {
                    "reference_url": "https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html",
                    "reference_id": "stable-channel-update-for-desktop_31.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-01T13:56:03Z/"
                        }
                    ],
                    "url": "https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059689?format=api",
                    "purl": "pkg:apk/alpine/qt6-qtwebengine@6.10.2-r13?arch=riscv64&distroversion=edge&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.10.2-r13%3Farch=riscv64&distroversion=edge&reponame=community"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062567?format=api",
                    "purl": "pkg:apk/alpine/qt6-qtwebengine@6.11.0-r1?arch=riscv64&distroversion=edge&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.11.0-r1%3Farch=riscv64&distroversion=edge&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2026-5283"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r2b4-pdwz-ybae"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63908?format=api",
            "vulnerability_id": "VCID-v2gf-rqxb-57ae",
            "summary": "chromium-browser: Use after free in Dawn",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-5281.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-5281.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-5281",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00763",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73448",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0303",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86598",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86631",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03278",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87173",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03278",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8718",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03278",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87176",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03278",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87191",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03278",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87196",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.03278",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87145",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03278",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87165",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03278",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87186",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-5281"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5281",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5281"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453700",
                    "reference_id": "2453700",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453700"
                },
                {
                    "reference_url": "https://issues.chromium.org/issues/491518608",
                    "reference_id": "491518608",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-04-01T16:16:11Z/"
                        }
                    ],
                    "url": "https://issues.chromium.org/issues/491518608"
                },
                {
                    "reference_url": "https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html",
                    "reference_id": "stable-channel-update-for-desktop_31.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-04-01T16:16:11Z/"
                        }
                    ],
                    "url": "https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059689?format=api",
                    "purl": "pkg:apk/alpine/qt6-qtwebengine@6.10.2-r13?arch=riscv64&distroversion=edge&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.10.2-r13%3Farch=riscv64&distroversion=edge&reponame=community"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062567?format=api",
                    "purl": "pkg:apk/alpine/qt6-qtwebengine@6.11.0-r1?arch=riscv64&distroversion=edge&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.11.0-r1%3Farch=riscv64&distroversion=edge&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2026-5281"
            ],
            "risk_score": 10.0,
            "exploitability": "2.0",
            "weighted_severity": "8.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v2gf-rqxb-57ae"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63907?format=api",
            "vulnerability_id": "VCID-vscd-6s2t-bucr",
            "summary": "chromium-browser: Inappropriate implementation in WebGL",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-5291.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-5291.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-5291",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06343",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0631",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07179",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07138",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0713",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07065",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07048",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07066",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0712",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07151",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07149",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-5291"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5291",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5291"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453699",
                    "reference_id": "2453699",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453699"
                },
                {
                    "reference_url": "https://issues.chromium.org/issues/490118036",
                    "reference_id": "490118036",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-01T13:48:55Z/"
                        }
                    ],
                    "url": "https://issues.chromium.org/issues/490118036"
                },
                {
                    "reference_url": "https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html",
                    "reference_id": "stable-channel-update-for-desktop_31.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-01T13:48:55Z/"
                        }
                    ],
                    "url": "https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059689?format=api",
                    "purl": "pkg:apk/alpine/qt6-qtwebengine@6.10.2-r13?arch=riscv64&distroversion=edge&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.10.2-r13%3Farch=riscv64&distroversion=edge&reponame=community"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062567?format=api",
                    "purl": "pkg:apk/alpine/qt6-qtwebengine@6.11.0-r1?arch=riscv64&distroversion=edge&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.11.0-r1%3Farch=riscv64&distroversion=edge&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2026-5291"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vscd-6s2t-bucr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/97126?format=api",
            "vulnerability_id": "VCID-xfz2-cwzt-tqhz",
            "summary": "Out of bounds read in WebCodecs in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: Medium)",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-5292",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05417",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00058",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18323",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00058",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18378",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19506",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1948",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19471",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19477",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19556",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19608",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19612",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19564",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-5292"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5292",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5292"
                },
                {
                    "reference_url": "https://issues.chromium.org/issues/492213293",
                    "reference_id": "492213293",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-01T13:54:54Z/"
                        }
                    ],
                    "url": "https://issues.chromium.org/issues/492213293"
                },
                {
                    "reference_url": "https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html",
                    "reference_id": "stable-channel-update-for-desktop_31.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-01T13:54:54Z/"
                        }
                    ],
                    "url": "https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059689?format=api",
                    "purl": "pkg:apk/alpine/qt6-qtwebengine@6.10.2-r13?arch=riscv64&distroversion=edge&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.10.2-r13%3Farch=riscv64&distroversion=edge&reponame=community"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062567?format=api",
                    "purl": "pkg:apk/alpine/qt6-qtwebengine@6.11.0-r1?arch=riscv64&distroversion=edge&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.11.0-r1%3Farch=riscv64&distroversion=edge&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2026-5292"
            ],
            "risk_score": 2.6,
            "exploitability": "0.5",
            "weighted_severity": "5.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xfz2-cwzt-tqhz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64131?format=api",
            "vulnerability_id": "VCID-y17q-5gas-jke9",
            "summary": "chromium-browser: Integer overflow in Fonts",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4679.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4679.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-4679",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11213",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29276",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29248",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2915",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29177",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29154",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29326",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29138",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29203",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29243",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-4679"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4679",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4679"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450572",
                    "reference_id": "2450572",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450572"
                },
                {
                    "reference_url": "https://issues.chromium.org/issues/491516670",
                    "reference_id": "491516670",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-24T00:49:08Z/"
                        }
                    ],
                    "url": "https://issues.chromium.org/issues/491516670"
                },
                {
                    "reference_url": "https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_23.html",
                    "reference_id": "stable-channel-update-for-desktop_23.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-24T00:49:08Z/"
                        }
                    ],
                    "url": "https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_23.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/429968?format=api",
                    "purl": "pkg:apk/alpine/qt6-qtwebengine@6.10.2-r12?arch=riscv64&distroversion=edge&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.10.2-r12%3Farch=riscv64&distroversion=edge&reponame=community"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062567?format=api",
                    "purl": "pkg:apk/alpine/qt6-qtwebengine@6.11.0-r1?arch=riscv64&distroversion=edge&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.11.0-r1%3Farch=riscv64&distroversion=edge&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2026-4679"
            ],
            "risk_score": 4.3,
            "exploitability": "0.5",
            "weighted_severity": "8.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y17q-5gas-jke9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63906?format=api",
            "vulnerability_id": "VCID-zrnp-ujpt-tbee",
            "summary": "chromium-browser: Use after free in WebCodecs",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-5280.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-5280.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-5280",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06169",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00066",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20555",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00066",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20496",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2178",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21848",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21808",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2175",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21757",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21702",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21837",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-5280"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5280",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5280"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453698",
                    "reference_id": "2453698",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453698"
                },
                {
                    "reference_url": "https://issues.chromium.org/issues/491515787",
                    "reference_id": "491515787",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-01T13:23:51Z/"
                        }
                    ],
                    "url": "https://issues.chromium.org/issues/491515787"
                },
                {
                    "reference_url": "https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html",
                    "reference_id": "stable-channel-update-for-desktop_31.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-01T13:23:51Z/"
                        }
                    ],
                    "url": "https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059689?format=api",
                    "purl": "pkg:apk/alpine/qt6-qtwebengine@6.10.2-r13?arch=riscv64&distroversion=edge&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.10.2-r13%3Farch=riscv64&distroversion=edge&reponame=community"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062567?format=api",
                    "purl": "pkg:apk/alpine/qt6-qtwebengine@6.11.0-r1?arch=riscv64&distroversion=edge&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.11.0-r1%3Farch=riscv64&distroversion=edge&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2026-5280"
            ],
            "risk_score": 4.3,
            "exploitability": "0.5",
            "weighted_severity": "8.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zrnp-ujpt-tbee"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.11.0-r1%3Farch=riscv64&distroversion=edge&reponame=community"
}