Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/qt6-qtwebengine@6.7.2-r2?arch=loongarch64&distroversion=v3.23&reponame=community
Typeapk
Namespacealpine
Nameqt6-qtwebengine
Version6.7.2-r2
Qualifiers
arch loongarch64
distroversion v3.23
reponame community
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version6.7.2-r3
Latest_non_vulnerable_version6.10.1-r14
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1wy7-bhfy-s3am
vulnerability_id VCID-1wy7-bhfy-s3am
summary
references
0
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6992
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6992
fixed_packages
0
url pkg:apk/alpine/qt6-qtwebengine@6.7.2-r2?arch=loongarch64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt6-qtwebengine@6.7.2-r2?arch=loongarch64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.7.2-r2%3Farch=loongarch64&distroversion=v3.23&reponame=community
aliases CVE-2024-6992
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1wy7-bhfy-s3am
1
url VCID-2pps-vuj1-quec
vulnerability_id VCID-2pps-vuj1-quec
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-6999
reference_id
reference_type
scores
0
value 0.00147
scoring_system epss
scoring_elements 0.35095
published_at 2026-04-18T12:55:00Z
1
value 0.00147
scoring_system epss
scoring_elements 0.35132
published_at 2026-04-11T12:55:00Z
2
value 0.00147
scoring_system epss
scoring_elements 0.35098
published_at 2026-04-12T12:55:00Z
3
value 0.00147
scoring_system epss
scoring_elements 0.35074
published_at 2026-04-13T12:55:00Z
4
value 0.00147
scoring_system epss
scoring_elements 0.35109
published_at 2026-04-16T12:55:00Z
5
value 0.00147
scoring_system epss
scoring_elements 0.3515
published_at 2026-04-02T12:55:00Z
6
value 0.00147
scoring_system epss
scoring_elements 0.35179
published_at 2026-04-04T12:55:00Z
7
value 0.00147
scoring_system epss
scoring_elements 0.35057
published_at 2026-04-07T12:55:00Z
8
value 0.00147
scoring_system epss
scoring_elements 0.35101
published_at 2026-04-08T12:55:00Z
9
value 0.00147
scoring_system epss
scoring_elements 0.35128
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-6999
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6999
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6999
2
reference_url https://issues.chromium.org/issues/340893685
reference_id 340893685
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-06T19:23:18Z/
url https://issues.chromium.org/issues/340893685
3
reference_url https://security.gentoo.org/glsa/202501-09
reference_id GLSA-202501-09
reference_type
scores
url https://security.gentoo.org/glsa/202501-09
4
reference_url https://chromereleases.googleblog.com/2024/07/stable-channel-update-for-desktop_23.html
reference_id stable-channel-update-for-desktop_23.html
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-06T19:23:18Z/
url https://chromereleases.googleblog.com/2024/07/stable-channel-update-for-desktop_23.html
fixed_packages
0
url pkg:apk/alpine/qt6-qtwebengine@6.7.2-r2?arch=loongarch64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt6-qtwebengine@6.7.2-r2?arch=loongarch64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.7.2-r2%3Farch=loongarch64&distroversion=v3.23&reponame=community
aliases CVE-2024-6999
risk_score 1.3
exploitability 0.5
weighted_severity 2.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2pps-vuj1-quec
2
url VCID-2s3f-gpnp-jbgx
vulnerability_id VCID-2s3f-gpnp-jbgx
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-7535
reference_id
reference_type
scores
0
value 0.00516
scoring_system epss
scoring_elements 0.66719
published_at 2026-04-18T12:55:00Z
1
value 0.00516
scoring_system epss
scoring_elements 0.66713
published_at 2026-04-11T12:55:00Z
2
value 0.00516
scoring_system epss
scoring_elements 0.66701
published_at 2026-04-12T12:55:00Z
3
value 0.00516
scoring_system epss
scoring_elements 0.66671
published_at 2026-04-13T12:55:00Z
4
value 0.00516
scoring_system epss
scoring_elements 0.66705
published_at 2026-04-16T12:55:00Z
5
value 0.00516
scoring_system epss
scoring_elements 0.6663
published_at 2026-04-07T12:55:00Z
6
value 0.00516
scoring_system epss
scoring_elements 0.66656
published_at 2026-04-04T12:55:00Z
7
value 0.00516
scoring_system epss
scoring_elements 0.66679
published_at 2026-04-08T12:55:00Z
8
value 0.00516
scoring_system epss
scoring_elements 0.66694
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-7535
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7535
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7535
2
reference_url https://issues.chromium.org/issues/352690885
reference_id 352690885
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-08T19:09:02Z/
url https://issues.chromium.org/issues/352690885
3
reference_url https://security.gentoo.org/glsa/202501-09
reference_id GLSA-202501-09
reference_type
scores
url https://security.gentoo.org/glsa/202501-09
4
reference_url https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop.html
reference_id stable-channel-update-for-desktop.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-08T19:09:02Z/
url https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop.html
fixed_packages
0
url pkg:apk/alpine/qt6-qtwebengine@6.7.2-r2?arch=loongarch64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt6-qtwebengine@6.7.2-r2?arch=loongarch64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.7.2-r2%3Farch=loongarch64&distroversion=v3.23&reponame=community
aliases CVE-2024-7535
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2s3f-gpnp-jbgx
3
url VCID-5fgg-qq38-tbcp
vulnerability_id VCID-5fgg-qq38-tbcp
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-7532
reference_id
reference_type
scores
0
value 0.00212
scoring_system epss
scoring_elements 0.43806
published_at 2026-04-18T12:55:00Z
1
value 0.00212
scoring_system epss
scoring_elements 0.43781
published_at 2026-04-09T12:55:00Z
2
value 0.00212
scoring_system epss
scoring_elements 0.43801
published_at 2026-04-11T12:55:00Z
3
value 0.00212
scoring_system epss
scoring_elements 0.43752
published_at 2026-04-13T12:55:00Z
4
value 0.00212
scoring_system epss
scoring_elements 0.43814
published_at 2026-04-16T12:55:00Z
5
value 0.00212
scoring_system epss
scoring_elements 0.43769
published_at 2026-04-12T12:55:00Z
6
value 0.00212
scoring_system epss
scoring_elements 0.43794
published_at 2026-04-04T12:55:00Z
7
value 0.00212
scoring_system epss
scoring_elements 0.43726
published_at 2026-04-07T12:55:00Z
8
value 0.00212
scoring_system epss
scoring_elements 0.43778
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-7532
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7532
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7532
2
reference_url https://issues.chromium.org/issues/350528343
reference_id 350528343
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:59Z/
url https://issues.chromium.org/issues/350528343
3
reference_url https://security.gentoo.org/glsa/202501-09
reference_id GLSA-202501-09
reference_type
scores
url https://security.gentoo.org/glsa/202501-09
4
reference_url https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop.html
reference_id stable-channel-update-for-desktop.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T15:41:59Z/
url https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop.html
fixed_packages
0
url pkg:apk/alpine/qt6-qtwebengine@6.7.2-r2?arch=loongarch64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt6-qtwebengine@6.7.2-r2?arch=loongarch64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.7.2-r2%3Farch=loongarch64&distroversion=v3.23&reponame=community
aliases CVE-2024-7532
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5fgg-qq38-tbcp
4
url VCID-5hry-b8fp-qqet
vulnerability_id VCID-5hry-b8fp-qqet
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-6996
reference_id
reference_type
scores
0
value 0.00075
scoring_system epss
scoring_elements 0.22695
published_at 2026-04-18T12:55:00Z
1
value 0.00075
scoring_system epss
scoring_elements 0.22776
published_at 2026-04-11T12:55:00Z
2
value 0.00075
scoring_system epss
scoring_elements 0.22738
published_at 2026-04-12T12:55:00Z
3
value 0.00075
scoring_system epss
scoring_elements 0.22681
published_at 2026-04-13T12:55:00Z
4
value 0.00075
scoring_system epss
scoring_elements 0.22697
published_at 2026-04-16T12:55:00Z
5
value 0.00075
scoring_system epss
scoring_elements 0.22795
published_at 2026-04-02T12:55:00Z
6
value 0.00075
scoring_system epss
scoring_elements 0.22839
published_at 2026-04-04T12:55:00Z
7
value 0.00075
scoring_system epss
scoring_elements 0.22628
published_at 2026-04-07T12:55:00Z
8
value 0.00075
scoring_system epss
scoring_elements 0.22703
published_at 2026-04-08T12:55:00Z
9
value 0.00075
scoring_system epss
scoring_elements 0.22754
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-6996
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6996
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6996
2
reference_url https://issues.chromium.org/issues/333708039
reference_id 333708039
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-08T18:06:30Z/
url https://issues.chromium.org/issues/333708039
3
reference_url https://security.gentoo.org/glsa/202501-09
reference_id GLSA-202501-09
reference_type
scores
url https://security.gentoo.org/glsa/202501-09
4
reference_url https://chromereleases.googleblog.com/2024/07/stable-channel-update-for-desktop_23.html
reference_id stable-channel-update-for-desktop_23.html
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-08T18:06:30Z/
url https://chromereleases.googleblog.com/2024/07/stable-channel-update-for-desktop_23.html
fixed_packages
0
url pkg:apk/alpine/qt6-qtwebengine@6.7.2-r2?arch=loongarch64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt6-qtwebengine@6.7.2-r2?arch=loongarch64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.7.2-r2%3Farch=loongarch64&distroversion=v3.23&reponame=community
aliases CVE-2024-6996
risk_score 0.9
exploitability 0.5
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5hry-b8fp-qqet
5
url VCID-6te6-9qty-f7fg
vulnerability_id VCID-6te6-9qty-f7fg
summary Use after free in Navigation in Google Chrome prior to 126.0.6478.182 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severity: High)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-6777
reference_id
reference_type
scores
0
value 0.0005
scoring_system epss
scoring_elements 0.15516
published_at 2026-04-18T12:55:00Z
1
value 0.0005
scoring_system epss
scoring_elements 0.15679
published_at 2026-04-11T12:55:00Z
2
value 0.0005
scoring_system epss
scoring_elements 0.15644
published_at 2026-04-12T12:55:00Z
3
value 0.0005
scoring_system epss
scoring_elements 0.15579
published_at 2026-04-13T12:55:00Z
4
value 0.0005
scoring_system epss
scoring_elements 0.15506
published_at 2026-04-16T12:55:00Z
5
value 0.0005
scoring_system epss
scoring_elements 0.15701
published_at 2026-04-02T12:55:00Z
6
value 0.0005
scoring_system epss
scoring_elements 0.15765
published_at 2026-04-04T12:55:00Z
7
value 0.0005
scoring_system epss
scoring_elements 0.15569
published_at 2026-04-07T12:55:00Z
8
value 0.0005
scoring_system epss
scoring_elements 0.15654
published_at 2026-04-08T12:55:00Z
9
value 0.0005
scoring_system epss
scoring_elements 0.15713
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-6777
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6777
2
reference_url https://issues.chromium.org/issues/345640549
reference_id 345640549
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-23T03:55:49Z/
url https://issues.chromium.org/issues/345640549
3
reference_url https://chromereleases.googleblog.com/2024/07/stable-channel-update-for-desktop.html
reference_id stable-channel-update-for-desktop.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-23T03:55:49Z/
url https://chromereleases.googleblog.com/2024/07/stable-channel-update-for-desktop.html
fixed_packages
0
url pkg:apk/alpine/qt6-qtwebengine@6.7.2-r2?arch=loongarch64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt6-qtwebengine@6.7.2-r2?arch=loongarch64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.7.2-r2%3Farch=loongarch64&distroversion=v3.23&reponame=community
aliases CVE-2024-6777
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6te6-9qty-f7fg
6
url VCID-bhvu-xcx2-67fm
vulnerability_id VCID-bhvu-xcx2-67fm
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-7000
reference_id
reference_type
scores
0
value 0.00256
scoring_system epss
scoring_elements 0.49065
published_at 2026-04-18T12:55:00Z
1
value 0.00256
scoring_system epss
scoring_elements 0.49028
published_at 2026-04-09T12:55:00Z
2
value 0.00256
scoring_system epss
scoring_elements 0.49045
published_at 2026-04-11T12:55:00Z
3
value 0.00256
scoring_system epss
scoring_elements 0.49018
published_at 2026-04-12T12:55:00Z
4
value 0.00256
scoring_system epss
scoring_elements 0.49068
published_at 2026-04-16T12:55:00Z
5
value 0.00256
scoring_system epss
scoring_elements 0.48996
published_at 2026-04-02T12:55:00Z
6
value 0.00256
scoring_system epss
scoring_elements 0.49024
published_at 2026-04-13T12:55:00Z
7
value 0.00256
scoring_system epss
scoring_elements 0.48978
published_at 2026-04-07T12:55:00Z
8
value 0.00256
scoring_system epss
scoring_elements 0.49031
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-7000
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7000
2
reference_url https://issues.chromium.org/issues/339877158
reference_id 339877158
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-08-06T17:56:12Z/
url https://issues.chromium.org/issues/339877158
3
reference_url https://security.gentoo.org/glsa/202501-09
reference_id GLSA-202501-09
reference_type
scores
url https://security.gentoo.org/glsa/202501-09
4
reference_url https://chromereleases.googleblog.com/2024/07/stable-channel-update-for-desktop_23.html
reference_id stable-channel-update-for-desktop_23.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-08-06T17:56:12Z/
url https://chromereleases.googleblog.com/2024/07/stable-channel-update-for-desktop_23.html
fixed_packages
0
url pkg:apk/alpine/qt6-qtwebengine@6.7.2-r2?arch=loongarch64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt6-qtwebengine@6.7.2-r2?arch=loongarch64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.7.2-r2%3Farch=loongarch64&distroversion=v3.23&reponame=community
aliases CVE-2024-7000
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bhvu-xcx2-67fm
7
url VCID-ck56-wn1x-xyeq
vulnerability_id VCID-ck56-wn1x-xyeq
summary Inappropriate implementation in V8 in Google Chrome prior to 126.0.6478.114 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-6101
reference_id
reference_type
scores
0
value 0.00346
scoring_system epss
scoring_elements 0.57162
published_at 2026-04-07T12:55:00Z
1
value 0.00346
scoring_system epss
scoring_elements 0.57208
published_at 2026-04-12T12:55:00Z
2
value 0.00346
scoring_system epss
scoring_elements 0.57227
published_at 2026-04-11T12:55:00Z
3
value 0.00346
scoring_system epss
scoring_elements 0.57215
published_at 2026-04-09T12:55:00Z
4
value 0.00346
scoring_system epss
scoring_elements 0.57213
published_at 2026-04-08T12:55:00Z
5
value 0.00346
scoring_system epss
scoring_elements 0.57185
published_at 2026-04-04T12:55:00Z
6
value 0.00475
scoring_system epss
scoring_elements 0.64845
published_at 2026-04-18T12:55:00Z
7
value 0.00475
scoring_system epss
scoring_elements 0.64796
published_at 2026-04-13T12:55:00Z
8
value 0.00475
scoring_system epss
scoring_elements 0.64834
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-6101
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6101
2
reference_url https://issues.chromium.org/issues/343748812
reference_id 343748812
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-21T03:55:53Z/
url https://issues.chromium.org/issues/343748812
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6HYUEHZ35ZPY2EONVZCGO6LPT3AMLZCP/
reference_id 6HYUEHZ35ZPY2EONVZCGO6LPT3AMLZCP
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-21T03:55:53Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6HYUEHZ35ZPY2EONVZCGO6LPT3AMLZCP/
4
reference_url https://chromereleases.googleblog.com/2024/06/stable-channel-update-for-desktop_18.html
reference_id stable-channel-update-for-desktop_18.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-21T03:55:53Z/
url https://chromereleases.googleblog.com/2024/06/stable-channel-update-for-desktop_18.html
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U5NRNCEYS246CYGOR32MF7OGKWOWER22/
reference_id U5NRNCEYS246CYGOR32MF7OGKWOWER22
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-21T03:55:53Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U5NRNCEYS246CYGOR32MF7OGKWOWER22/
fixed_packages
0
url pkg:apk/alpine/qt6-qtwebengine@6.7.2-r2?arch=loongarch64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt6-qtwebengine@6.7.2-r2?arch=loongarch64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.7.2-r2%3Farch=loongarch64&distroversion=v3.23&reponame=community
aliases CVE-2024-6101
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ck56-wn1x-xyeq
8
url VCID-ck94-13us-pbhd
vulnerability_id VCID-ck94-13us-pbhd
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-6991
reference_id
reference_type
scores
0
value 0.0048
scoring_system epss
scoring_elements 0.65123
published_at 2026-04-18T12:55:00Z
1
value 0.0048
scoring_system epss
scoring_elements 0.65117
published_at 2026-04-11T12:55:00Z
2
value 0.0048
scoring_system epss
scoring_elements 0.65106
published_at 2026-04-12T12:55:00Z
3
value 0.0048
scoring_system epss
scoring_elements 0.65078
published_at 2026-04-13T12:55:00Z
4
value 0.0048
scoring_system epss
scoring_elements 0.65114
published_at 2026-04-16T12:55:00Z
5
value 0.0048
scoring_system epss
scoring_elements 0.65046
published_at 2026-04-02T12:55:00Z
6
value 0.0048
scoring_system epss
scoring_elements 0.65072
published_at 2026-04-04T12:55:00Z
7
value 0.0048
scoring_system epss
scoring_elements 0.65035
published_at 2026-04-07T12:55:00Z
8
value 0.0048
scoring_system epss
scoring_elements 0.65084
published_at 2026-04-08T12:55:00Z
9
value 0.0048
scoring_system epss
scoring_elements 0.65098
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-6991
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6991
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6991
2
reference_url https://issues.chromium.org/issues/346618785
reference_id 346618785
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-08-06T17:57:06Z/
url https://issues.chromium.org/issues/346618785
3
reference_url https://security.gentoo.org/glsa/202501-09
reference_id GLSA-202501-09
reference_type
scores
url https://security.gentoo.org/glsa/202501-09
4
reference_url https://chromereleases.googleblog.com/2024/07/stable-channel-update-for-desktop_23.html
reference_id stable-channel-update-for-desktop_23.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-08-06T17:57:06Z/
url https://chromereleases.googleblog.com/2024/07/stable-channel-update-for-desktop_23.html
fixed_packages
0
url pkg:apk/alpine/qt6-qtwebengine@6.7.2-r2?arch=loongarch64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt6-qtwebengine@6.7.2-r2?arch=loongarch64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.7.2-r2%3Farch=loongarch64&distroversion=v3.23&reponame=community
aliases CVE-2024-6991
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ck94-13us-pbhd
9
url VCID-czw8-8fdh-eka1
vulnerability_id VCID-czw8-8fdh-eka1
summary Out of bounds memory access in V8 in Google Chrome prior to 126.0.6478.182 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-6779
reference_id
reference_type
scores
0
value 0.00585
scoring_system epss
scoring_elements 0.69113
published_at 2026-04-18T12:55:00Z
1
value 0.00585
scoring_system epss
scoring_elements 0.69109
published_at 2026-04-11T12:55:00Z
2
value 0.00585
scoring_system epss
scoring_elements 0.69094
published_at 2026-04-12T12:55:00Z
3
value 0.00585
scoring_system epss
scoring_elements 0.69065
published_at 2026-04-13T12:55:00Z
4
value 0.00585
scoring_system epss
scoring_elements 0.69104
published_at 2026-04-16T12:55:00Z
5
value 0.00585
scoring_system epss
scoring_elements 0.69016
published_at 2026-04-02T12:55:00Z
6
value 0.00585
scoring_system epss
scoring_elements 0.69036
published_at 2026-04-04T12:55:00Z
7
value 0.00585
scoring_system epss
scoring_elements 0.69017
published_at 2026-04-07T12:55:00Z
8
value 0.00585
scoring_system epss
scoring_elements 0.69067
published_at 2026-04-08T12:55:00Z
9
value 0.00585
scoring_system epss
scoring_elements 0.69086
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-6779
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6779
2
reference_url https://issues.chromium.org/issues/351327767
reference_id 351327767
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-23T03:55:51Z/
url https://issues.chromium.org/issues/351327767
3
reference_url https://chromereleases.googleblog.com/2024/07/stable-channel-update-for-desktop.html
reference_id stable-channel-update-for-desktop.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-23T03:55:51Z/
url https://chromereleases.googleblog.com/2024/07/stable-channel-update-for-desktop.html
fixed_packages
0
url pkg:apk/alpine/qt6-qtwebengine@6.7.2-r2?arch=loongarch64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt6-qtwebengine@6.7.2-r2?arch=loongarch64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.7.2-r2%3Farch=loongarch64&distroversion=v3.23&reponame=community
aliases CVE-2024-6779
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-czw8-8fdh-eka1
10
url VCID-dnjz-ad9c-tye8
vulnerability_id VCID-dnjz-ad9c-tye8
summary Use after free in Screen Capture in Google Chrome prior to 126.0.6478.182 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-6774
reference_id
reference_type
scores
0
value 0.00375
scoring_system epss
scoring_elements 0.59204
published_at 2026-04-18T12:55:00Z
1
value 0.00375
scoring_system epss
scoring_elements 0.592
published_at 2026-04-11T12:55:00Z
2
value 0.00375
scoring_system epss
scoring_elements 0.59183
published_at 2026-04-12T12:55:00Z
3
value 0.00375
scoring_system epss
scoring_elements 0.59164
published_at 2026-04-13T12:55:00Z
4
value 0.00375
scoring_system epss
scoring_elements 0.59199
published_at 2026-04-16T12:55:00Z
5
value 0.00375
scoring_system epss
scoring_elements 0.59129
published_at 2026-04-02T12:55:00Z
6
value 0.00375
scoring_system epss
scoring_elements 0.59152
published_at 2026-04-04T12:55:00Z
7
value 0.00375
scoring_system epss
scoring_elements 0.59116
published_at 2026-04-07T12:55:00Z
8
value 0.00375
scoring_system epss
scoring_elements 0.59167
published_at 2026-04-08T12:55:00Z
9
value 0.00375
scoring_system epss
scoring_elements 0.5918
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-6774
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6774
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6774
2
reference_url https://issues.chromium.org/issues/346898524
reference_id 346898524
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-23T03:55:46Z/
url https://issues.chromium.org/issues/346898524
3
reference_url https://chromereleases.googleblog.com/2024/07/stable-channel-update-for-desktop.html
reference_id stable-channel-update-for-desktop.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-23T03:55:46Z/
url https://chromereleases.googleblog.com/2024/07/stable-channel-update-for-desktop.html
fixed_packages
0
url pkg:apk/alpine/qt6-qtwebengine@6.7.2-r2?arch=loongarch64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt6-qtwebengine@6.7.2-r2?arch=loongarch64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.7.2-r2%3Farch=loongarch64&distroversion=v3.23&reponame=community
aliases CVE-2024-6774
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dnjz-ad9c-tye8
11
url VCID-fbem-1qpe-aqda
vulnerability_id VCID-fbem-1qpe-aqda
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-6989
reference_id
reference_type
scores
0
value 0.00274
scoring_system epss
scoring_elements 0.50877
published_at 2026-04-18T12:55:00Z
1
value 0.00274
scoring_system epss
scoring_elements 0.50828
published_at 2026-04-09T12:55:00Z
2
value 0.00274
scoring_system epss
scoring_elements 0.50871
published_at 2026-04-16T12:55:00Z
3
value 0.00274
scoring_system epss
scoring_elements 0.50847
published_at 2026-04-12T12:55:00Z
4
value 0.00274
scoring_system epss
scoring_elements 0.50832
published_at 2026-04-13T12:55:00Z
5
value 0.00274
scoring_system epss
scoring_elements 0.50791
published_at 2026-04-02T12:55:00Z
6
value 0.00274
scoring_system epss
scoring_elements 0.50817
published_at 2026-04-04T12:55:00Z
7
value 0.00274
scoring_system epss
scoring_elements 0.50774
published_at 2026-04-07T12:55:00Z
8
value 0.00274
scoring_system epss
scoring_elements 0.50831
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-6989
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6989
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6989
2
reference_url https://issues.chromium.org/issues/349342289
reference_id 349342289
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T20:01:11Z/
url https://issues.chromium.org/issues/349342289
3
reference_url https://security.gentoo.org/glsa/202501-09
reference_id GLSA-202501-09
reference_type
scores
url https://security.gentoo.org/glsa/202501-09
4
reference_url https://chromereleases.googleblog.com/2024/07/stable-channel-update-for-desktop_23.html
reference_id stable-channel-update-for-desktop_23.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T20:01:11Z/
url https://chromereleases.googleblog.com/2024/07/stable-channel-update-for-desktop_23.html
fixed_packages
0
url pkg:apk/alpine/qt6-qtwebengine@6.7.2-r2?arch=loongarch64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt6-qtwebengine@6.7.2-r2?arch=loongarch64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.7.2-r2%3Farch=loongarch64&distroversion=v3.23&reponame=community
aliases CVE-2024-6989
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fbem-1qpe-aqda
12
url VCID-g442-up9e-z3f2
vulnerability_id VCID-g442-up9e-z3f2
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-7550
reference_id
reference_type
scores
0
value 0.00243
scoring_system epss
scoring_elements 0.47675
published_at 2026-04-18T12:55:00Z
1
value 0.00243
scoring_system epss
scoring_elements 0.47616
published_at 2026-04-12T12:55:00Z
2
value 0.00243
scoring_system epss
scoring_elements 0.4764
published_at 2026-04-11T12:55:00Z
3
value 0.00243
scoring_system epss
scoring_elements 0.47625
published_at 2026-04-13T12:55:00Z
4
value 0.00243
scoring_system epss
scoring_elements 0.47683
published_at 2026-04-16T12:55:00Z
5
value 0.00243
scoring_system epss
scoring_elements 0.47596
published_at 2026-04-02T12:55:00Z
6
value 0.00243
scoring_system epss
scoring_elements 0.47617
published_at 2026-04-04T12:55:00Z
7
value 0.00243
scoring_system epss
scoring_elements 0.47566
published_at 2026-04-07T12:55:00Z
8
value 0.00243
scoring_system epss
scoring_elements 0.47621
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-7550
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7550
2
reference_url https://issues.chromium.org/issues/355256380
reference_id 355256380
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T19:28:07Z/
url https://issues.chromium.org/issues/355256380
3
reference_url https://security.gentoo.org/glsa/202501-09
reference_id GLSA-202501-09
reference_type
scores
url https://security.gentoo.org/glsa/202501-09
4
reference_url https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop.html
reference_id stable-channel-update-for-desktop.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T19:28:07Z/
url https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop.html
fixed_packages
0
url pkg:apk/alpine/qt6-qtwebengine@6.7.2-r2?arch=loongarch64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt6-qtwebengine@6.7.2-r2?arch=loongarch64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.7.2-r2%3Farch=loongarch64&distroversion=v3.23&reponame=community
aliases CVE-2024-7550
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g442-up9e-z3f2
13
url VCID-kzf2-z6tv-w3hh
vulnerability_id VCID-kzf2-z6tv-w3hh
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-5836
reference_id
reference_type
scores
0
value 0.00467
scoring_system epss
scoring_elements 0.64437
published_at 2026-04-04T12:55:00Z
1
value 0.00467
scoring_system epss
scoring_elements 0.64478
published_at 2026-04-18T12:55:00Z
2
value 0.00467
scoring_system epss
scoring_elements 0.64466
published_at 2026-04-16T12:55:00Z
3
value 0.00467
scoring_system epss
scoring_elements 0.64432
published_at 2026-04-13T12:55:00Z
4
value 0.00467
scoring_system epss
scoring_elements 0.64472
published_at 2026-04-11T12:55:00Z
5
value 0.00467
scoring_system epss
scoring_elements 0.6446
published_at 2026-04-12T12:55:00Z
6
value 0.00467
scoring_system epss
scoring_elements 0.64445
published_at 2026-04-08T12:55:00Z
7
value 0.00467
scoring_system epss
scoring_elements 0.64396
published_at 2026-04-07T12:55:00Z
8
value 0.0061
scoring_system epss
scoring_elements 0.69696
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-5836
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5836
2
reference_url https://issues.chromium.org/issues/341875171
reference_id 341875171
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:58Z/
url https://issues.chromium.org/issues/341875171
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7VXA32LXMNK3DSK3JBRLTBPFUH7LTODU/
reference_id 7VXA32LXMNK3DSK3JBRLTBPFUH7LTODU
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:58Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7VXA32LXMNK3DSK3JBRLTBPFUH7LTODU/
4
reference_url https://security.gentoo.org/glsa/202501-09
reference_id GLSA-202501-09
reference_type
scores
url https://security.gentoo.org/glsa/202501-09
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MPU7AB53QQVNTBPGRMJRY5SXJNYWW3FX/
reference_id MPU7AB53QQVNTBPGRMJRY5SXJNYWW3FX
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:58Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MPU7AB53QQVNTBPGRMJRY5SXJNYWW3FX/
6
reference_url https://chromereleases.googleblog.com/2024/06/stable-channel-update-for-desktop.html
reference_id stable-channel-update-for-desktop.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-14T03:55:58Z/
url https://chromereleases.googleblog.com/2024/06/stable-channel-update-for-desktop.html
fixed_packages
0
url pkg:apk/alpine/qt6-qtwebengine@6.7.2-r2?arch=loongarch64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt6-qtwebengine@6.7.2-r2?arch=loongarch64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.7.2-r2%3Farch=loongarch64&distroversion=v3.23&reponame=community
aliases CVE-2024-5836
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kzf2-z6tv-w3hh
14
url VCID-rzcc-kwub-43f5
vulnerability_id VCID-rzcc-kwub-43f5
summary Use after free in Dawn in Google Chrome prior to 126.0.6478.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-6103
reference_id
reference_type
scores
0
value 0.00557
scoring_system epss
scoring_elements 0.68233
published_at 2026-04-18T12:55:00Z
1
value 0.00557
scoring_system epss
scoring_elements 0.68162
published_at 2026-04-04T12:55:00Z
2
value 0.00557
scoring_system epss
scoring_elements 0.68139
published_at 2026-04-07T12:55:00Z
3
value 0.00557
scoring_system epss
scoring_elements 0.68191
published_at 2026-04-08T12:55:00Z
4
value 0.00557
scoring_system epss
scoring_elements 0.68206
published_at 2026-04-09T12:55:00Z
5
value 0.00557
scoring_system epss
scoring_elements 0.68231
published_at 2026-04-11T12:55:00Z
6
value 0.00557
scoring_system epss
scoring_elements 0.68217
published_at 2026-04-12T12:55:00Z
7
value 0.00557
scoring_system epss
scoring_elements 0.68184
published_at 2026-04-13T12:55:00Z
8
value 0.00557
scoring_system epss
scoring_elements 0.68222
published_at 2026-04-16T12:55:00Z
9
value 0.00557
scoring_system epss
scoring_elements 0.68144
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-6103
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6103
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6103
2
reference_url https://issues.chromium.org/issues/344639860
reference_id 344639860
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-20T14:29:53Z/
url https://issues.chromium.org/issues/344639860
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6HYUEHZ35ZPY2EONVZCGO6LPT3AMLZCP/
reference_id 6HYUEHZ35ZPY2EONVZCGO6LPT3AMLZCP
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-20T14:29:53Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6HYUEHZ35ZPY2EONVZCGO6LPT3AMLZCP/
4
reference_url https://chromereleases.googleblog.com/2024/06/stable-channel-update-for-desktop_18.html
reference_id stable-channel-update-for-desktop_18.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-20T14:29:53Z/
url https://chromereleases.googleblog.com/2024/06/stable-channel-update-for-desktop_18.html
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U5NRNCEYS246CYGOR32MF7OGKWOWER22/
reference_id U5NRNCEYS246CYGOR32MF7OGKWOWER22
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-20T14:29:53Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U5NRNCEYS246CYGOR32MF7OGKWOWER22/
fixed_packages
0
url pkg:apk/alpine/qt6-qtwebengine@6.7.2-r2?arch=loongarch64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt6-qtwebengine@6.7.2-r2?arch=loongarch64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.7.2-r2%3Farch=loongarch64&distroversion=v3.23&reponame=community
aliases CVE-2024-6103
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rzcc-kwub-43f5
15
url VCID-rzpj-7mb5-cudf
vulnerability_id VCID-rzpj-7mb5-cudf
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-7536
reference_id
reference_type
scores
0
value 0.0035
scoring_system epss
scoring_elements 0.57536
published_at 2026-04-16T12:55:00Z
1
value 0.0035
scoring_system epss
scoring_elements 0.57535
published_at 2026-04-09T12:55:00Z
2
value 0.0035
scoring_system epss
scoring_elements 0.57551
published_at 2026-04-11T12:55:00Z
3
value 0.0035
scoring_system epss
scoring_elements 0.5753
published_at 2026-04-12T12:55:00Z
4
value 0.0035
scoring_system epss
scoring_elements 0.57509
published_at 2026-04-13T12:55:00Z
5
value 0.0035
scoring_system epss
scoring_elements 0.5748
published_at 2026-04-02T12:55:00Z
6
value 0.0035
scoring_system epss
scoring_elements 0.57502
published_at 2026-04-04T12:55:00Z
7
value 0.0035
scoring_system epss
scoring_elements 0.57479
published_at 2026-04-07T12:55:00Z
8
value 0.0035
scoring_system epss
scoring_elements 0.57531
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-7536
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7536
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7536
2
reference_url https://issues.chromium.org/issues/354847246
reference_id 354847246
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T20:36:54Z/
url https://issues.chromium.org/issues/354847246
3
reference_url https://security.gentoo.org/glsa/202501-09
reference_id GLSA-202501-09
reference_type
scores
url https://security.gentoo.org/glsa/202501-09
4
reference_url https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop.html
reference_id stable-channel-update-for-desktop.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T20:36:54Z/
url https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop.html
fixed_packages
0
url pkg:apk/alpine/qt6-qtwebengine@6.7.2-r2?arch=loongarch64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt6-qtwebengine@6.7.2-r2?arch=loongarch64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.7.2-r2%3Farch=loongarch64&distroversion=v3.23&reponame=community
aliases CVE-2024-7536
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rzpj-7mb5-cudf
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.7.2-r2%3Farch=loongarch64&distroversion=v3.23&reponame=community